YoVDO

Putting Hackers Breaching Your Cluster in Automatic Quarantine

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cybersecurity Courses Kubernetes Courses Threat Detection Courses Vulnerability Management Courses Cluster Security Courses Container Security Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical cybersecurity presentation that addresses the inevitable nature of hacker breaches and introduces an innovative solution for automatic quarantine. Learn about the vulnerabilities present in commonly used cloud native applications and how to secure them effectively. Dive into real-world scenarios demonstrating easily exploited back doors in cluster deployments, and discover a simple yet often overlooked blueprint for enhancing cluster resistance against malicious attacks. Gain valuable insights on protecting your resources, data, and reputation by automatically isolating attackers when they breach an application in your cluster, ensuring the safety of other cluster components.

Syllabus

Putting Hackers Breaching Your Cluster In Automatic Quarantine - Ziv Nevo, IBM


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Kubernetes Certified Application Developer (CKAD) with Tests
Udemy
Kubernetes Certification Training
Edureka
Kubernetes Security
A Cloud Guru
Kubernetes Cluster Guardrails Using Open Policy Agent and Gatekeeper - Mirantis Labs Tech Talks
Mirantis via YouTube
Authentication & Authorization in Kubernetes - Mirantis Labs Tech Talks
Mirantis via YouTube