The Hacker's Guide to Kubernetes - Exploiting Vulnerabilities and Best Practices
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore live Kubernetes hacking through interactive demos showcasing account hijacking in a k8s application. Delve into various security risks of Kubernetes, with a focus on the OWASP Kubernetes Top 10 list. Witness real-time exploitations of vulnerabilities and misconfigurations in k8s clusters, including attacks on containers, pods, networks, and Kubernetes components. Learn how these security breaches can lead to the compromise of user accounts in a sample web application. Gain insights into common mistakes, vulnerabilities, and best practices for strengthening Kubernetes systems in this 34-minute conference talk presented by Patrycja Wegrzynowicz from Form3 at a CNCF event.
Syllabus
The Hacker's Guide to Kubernetes - Patrycja Wegrzynowicz, Form3
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera