The Hacker's Guide to Kubernetes - Exploiting Vulnerabilities and Best Practices
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore live Kubernetes hacking through interactive demos showcasing account hijacking in a k8s application. Delve into various security risks of Kubernetes, with a focus on the OWASP Kubernetes Top 10 list. Witness real-time exploitations of vulnerabilities and misconfigurations in k8s clusters, including attacks on containers, pods, networks, and Kubernetes components. Learn how these security breaches can lead to the compromise of user accounts in a sample web application. Gain insights into common mistakes, vulnerabilities, and best practices for strengthening Kubernetes systems in this 34-minute conference talk presented by Patrycja Wegrzynowicz from Form3 at a CNCF event.
Syllabus
The Hacker's Guide to Kubernetes - Patrycja Wegrzynowicz, Form3
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Maintaining Deployment Security in Microsoft AzurePluralsight Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning Securing Containers and Kubernetes Ecosystem
LinkedIn Learning Performing DevSecOps Automated Security Testing
Pluralsight