Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Attacking and Defending Kubernetes Clusters with KubeHound Attack Graph Model

WEareTROOPERS via YouTube

Overview

Explore Kubernetes cluster security through an in-depth conference talk on attacking and defending using the KubeHound Attack Graph Model. Delivered by Julien Terriac at the TROOPERS24 IT security conference in Heidelberg, Germany, this 51-minute presentation delves into advanced techniques for assessing and protecting Kubernetes environments. Gain valuable insights into potential attack vectors and defensive strategies for securing containerized infrastructures. Learn how to leverage the KubeHound model to identify vulnerabilities, map attack paths, and implement robust security measures in Kubernetes deployments. Ideal for cybersecurity professionals, DevOps engineers, and IT administrators looking to enhance their knowledge of container security and threat modeling in cloud-native environments.

Syllabus

TROOPERS24: Attacking and Defending Kubernetes Cluster with KubeHound Attack Graph Model

Taught by

WEareTROOPERS

Reviews

Start your review of Attacking and Defending Kubernetes Clusters with KubeHound Attack Graph Model

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.