YoVDO

The Hacker's Guide to Kubernetes - Exploiting Vulnerabilities and Best Practices

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Cybersecurity Courses DevOps Courses Network Security Courses Ethical Hacking Courses Cloud Security Courses Vulnerability Assessment Courses Container Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore live Kubernetes hacking through interactive demos showcasing account hijacking in a k8s application. Delve into various security risks of Kubernetes, with a focus on the OWASP Kubernetes Top 10 list. Witness real-time exploitations of vulnerabilities and misconfigurations in k8s clusters, including attacks on containers, pods, networks, and Kubernetes components. Learn how these security breaches can lead to the compromise of user accounts in a sample web application. Gain insights into common mistakes, vulnerabilities, and best practices for strengthening Kubernetes systems in this 34-minute conference talk presented by Patrycja Wegrzynowicz from Form3 at a CNCF event.

Syllabus

The Hacker's Guide to Kubernetes - Patrycja Wegrzynowicz, Form3


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Maintaining Deployment Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning
Securing Containers and Kubernetes Ecosystem
LinkedIn Learning
Performing DevSecOps Automated Security Testing
Pluralsight