Completed
Kubernetes Usage and Benefits
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Security Attacks in Kubernetes Cluster Due to Security Best Practices Violation
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Overview of application Infrastructure
- 3 Development and Operations
- 4 Virtualized Deployment
- 5 Containerized Deployment
- 6 Evolution of Application Deployment
- 7 Why Container Orchestration?
- 8 What is Kubernetes
- 9 Kubernetes Architecture
- 10 Kubernetes Usage and Benefits
- 11 Kubernetes Developer Community
- 12 Practitioners Security Concerns in Kubernetes
- 13 Security Attacks in Kubernetes Cluster
- 14 Multi-vocal Literature Review of Kubernetes
- 15 Multi-vocal Literature Review (Kubernetes Challenges)
- 16 Multi-vocal Literature Review (Current Kubernetes Research)
- 17 Security Defects in Kubernetes Manifests
- 18 Kubernetes Security Best Practices
- 19 Threat Model for misconfigured RBAC
- 20 Attacks for Misconfigured RBAC
- 21 Threat Model for misconfigured Pod
- 22 Attack for misconfigured pod
- 23 Attack in the Default Namespace
- 24 Threat Model for Network Policy
- 25 Possible Attacks for Undefined Network Policy
- 26 Threat Model for ETCD secret
- 27 Attack for Unencrypted ETCD
- 28 Threat Model for Resource Limit
- 29 Attacks for Resource Limit
- 30 Conclusion and Future Work
- 31 Summary
- 32 Questions