Completed
degrees of isolation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
M9sweeper - The Open Source Kubernetes Security Platform
Automatically move to the next video in the Classroom when playback concludes
- 1 intro
- 2 preamble
- 3 about jacob
- 4 4 c's of cloud security
- 5 lab summary - layers covered
- 6 cloud: kubernetes architecture
- 7 k8s security best practices
- 8 role based access control
- 9 sample role
- 10 sample role binding
- 11 why use tools?
- 12 demo: kube-bench
- 13 container: what is virtualization?
- 14 what is a container?
- 15 degrees of isolation
- 16 parts of a container image
- 17 docker file example
- 18 container breakout
- 19 preventing container breakout
- 20 limiting linux kernal calls
- 21 kubesec
- 22 pod security admissions
- 23 network policies
- 24 sample network policy
- 25 shortcomings of built-in features
- 26 extending kubernetes: opa and gatekeeper
- 27 lab: gatekeeper
- 28 cve scanning with trivy
- 29 limiting linux kernel calls
- 30 demo: project falco
- 31 summary
- 32 questions?