Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Hacker's Guide to Kubernetes - Exploiting Vulnerabilities and Best Practices

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore live Kubernetes hacking through interactive demos showcasing account hijacking in a k8s application. Delve into various security risks of Kubernetes, with a focus on the OWASP Kubernetes Top 10 list. Witness real-time exploitations of vulnerabilities and misconfigurations in k8s clusters, including attacks on containers, pods, networks, and Kubernetes components. Learn how these security breaches can lead to the compromise of user accounts in a sample web application. Gain insights into common mistakes, vulnerabilities, and best practices for strengthening Kubernetes systems in this 34-minute conference talk presented by Patrycja Wegrzynowicz from Form3 at a CNCF event.

Syllabus

The Hacker's Guide to Kubernetes - Patrycja Wegrzynowicz, Form3

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of The Hacker's Guide to Kubernetes - Exploiting Vulnerabilities and Best Practices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.