YoVDO

Attacking and Defending Kubernetes Clusters with KubeHound Attack Graph Model

Offered By: WEareTROOPERS via YouTube

Tags

Kubernetes Courses Cybersecurity Courses Network Security Courses Penetration Testing Courses DevSecOps Courses Cloud Security Courses Threat Modeling Courses Container Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore Kubernetes cluster security through an in-depth conference talk on attacking and defending using the KubeHound Attack Graph Model. Delivered by Julien Terriac at the TROOPERS24 IT security conference in Heidelberg, Germany, this 51-minute presentation delves into advanced techniques for assessing and protecting Kubernetes environments. Gain valuable insights into potential attack vectors and defensive strategies for securing containerized infrastructures. Learn how to leverage the KubeHound model to identify vulnerabilities, map attack paths, and implement robust security measures in Kubernetes deployments. Ideal for cybersecurity professionals, DevOps engineers, and IT administrators looking to enhance their knowledge of container security and threat modeling in cloud-native environments.

Syllabus

TROOPERS24: Attacking and Defending Kubernetes Cluster with KubeHound Attack Graph Model


Taught by

WEareTROOPERS

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity