Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to implement production-level security operations with Kubernetes in Docker environments. Explore platform architecture, compare Swarm and Kubernetes, and dive into attack vectors and secure supply chain practices. Discover strategies for creating robust test environments, understand the importance of not running as root, implement readonly filesystems, and prevent privilege escalation. Gain valuable insights on uparmoreding your Kubernetes deployments for enhanced security in this comprehensive 36-minute tutorial from Docker.
Syllabus
Introduction
Platform Architecture
Swarm vs Kubernetes
Attack
Secure Supply Chain
Test Environments
Takeaway
Kubernetes
Dont run as root
Readonly filesystem
Privilege escalation
Uparmored
Taught by
Docker