Attacking and Defending Kubernetes Clusters with KubeHound Attack Graph Model
WEareTROOPERS via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore Kubernetes cluster security through an in-depth conference talk on attacking and defending using the KubeHound Attack Graph Model. Delivered by Julien Terriac at the TROOPERS24 IT security conference in Heidelberg, Germany, this 51-minute presentation delves into advanced techniques for assessing and protecting Kubernetes environments. Gain valuable insights into potential attack vectors and defensive strategies for securing containerized infrastructures. Learn how to leverage the KubeHound model to identify vulnerabilities, map attack paths, and implement robust security measures in Kubernetes deployments. Ideal for cybersecurity professionals, DevOps engineers, and IT administrators looking to enhance their knowledge of container security and threat modeling in cloud-native environments.
Syllabus
TROOPERS24: Attacking and Defending Kubernetes Cluster with KubeHound Attack Graph Model
Taught by
WEareTROOPERS