YoVDO

The Insider Threat: Third-Party Applications in Your Cluster

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Vulnerability Assessment Courses Service Mesh Courses Cluster Security Courses Admission Controllers Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security implications of third-party applications in Kubernetes clusters through this informative conference talk. Delve into real-world vulnerabilities commonly found in large Kubernetes deployments, understanding their discovery process and potential impact. Learn about the risks associated with popular additions like service meshes, CSI drivers, admission controllers, and database engines. Gain valuable insights into actionable steps for preventing third-party vulnerabilities from compromising cluster security. Discover how to balance the benefits of leveraging robust third-party solutions with the need for maintaining a secure Kubernetes environment.

Syllabus

The Insider Threat: Third-Party Applications In Your Cluster - Dagan Henderson & Will Kline


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
Internet Security
openHPI
Planning a Security Incident Response
Microsoft via edX
Cyber Security
CEC via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam