Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hacking Istio: The Good, the Bad, and the Misconfigured

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Istio security in this hands-on tutorial focused on identifying and exploiting vulnerabilities caused by misconfigurations. Dive into the world of network security tools provided by Istio, including mutual TLS encryption and AuthorizationPolicies for access control. Gain practical experience with pre-configured Kubernetes clusters featuring Istio installations and intentional vulnerabilities. Begin with an introduction to Istio before engaging in a collaborative, beginner-friendly exercise to find and exploit Istio misconfigurations. Receive guidance and hints as needed while working towards uncovering a hidden flag within the cluster. Learn about the new Ambient mode in Istio and its implications for configuring access control across different network layers. Conclude with a comprehensive walkthrough of the steps required to locate the concealed flag, reinforcing the critical importance of properly configuring Istio security policies and understanding the potential consequences of overlooked misconfigurations.

Syllabus

Tutorial: Hacking Istio: The Good, the Bad, and the Misconfigured - Nina Polshakova & Peter Jausovec

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Hacking Istio: The Good, the Bad, and the Misconfigured

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.