YoVDO

The Insider Threat: Third-Party Applications in Your Cluster

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Vulnerability Assessment Courses Service Mesh Courses Cluster Security Courses Admission Controllers Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security implications of third-party applications in Kubernetes clusters through this informative conference talk. Delve into real-world vulnerabilities commonly found in large Kubernetes deployments, understanding their discovery process and potential impact. Learn about the risks associated with popular additions like service meshes, CSI drivers, admission controllers, and database engines. Gain valuable insights into actionable steps for preventing third-party vulnerabilities from compromising cluster security. Discover how to balance the benefits of leveraging robust third-party solutions with the need for maintaining a secure Kubernetes environment.

Syllabus

The Insider Threat: Third-Party Applications In Your Cluster - Dagan Henderson & Will Kline


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Kubernetes Security
A Cloud Guru
Securing, Monitoring, and Scaling Kubernetes Clusters
LearnQuest via Coursera
Kubernetes Certification Training
Edureka
Securing Azure Kubernetes Service (AKS) Clusters
Pluralsight
Kubernetes Certified Application Developer (CKAD) with Tests
Udemy