Hack My Mis-Configured Kubernetes
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore common Kubernetes misconfigurations and their security implications in this 33-minute tutorial sponsored by Snyk. Learn how to identify and exploit vulnerabilities in poorly configured Kubernetes clusters, gaining valuable insights into securing your own deployments. Discover practical techniques for hardening your Kubernetes infrastructure and protecting against potential attacks.
Syllabus
Tutorial: Hack My Mis-Configured Kubernetes - Sponsored by Snyk
Taught by
Linux Foundation
Tags
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent