The Hacker's Guide to Kubernetes - Exploiting Vulnerabilities and Best Practices
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore live Kubernetes hacking through interactive demos showcasing account hijacking in a k8s application. Delve into various security risks of Kubernetes, with a focus on the OWASP Kubernetes Top 10 list. Witness real-time exploitations of vulnerabilities and misconfigurations in k8s clusters, including attacks on containers, pods, networks, and Kubernetes components. Learn how these security breaches can lead to the compromise of user accounts in a sample web application. Gain insights into common mistakes, vulnerabilities, and best practices for strengthening Kubernetes systems in this 34-minute conference talk presented by Patrycja Wegrzynowicz from Form3 at a CNCF event.
Syllabus
The Hacker's Guide to Kubernetes - Patrycja Wegrzynowicz, Form3
Taught by
CNCF [Cloud Native Computing Foundation]