Hacking and Securing Kubernetes Clusters


 


Hacking and Securing Kubernetes Clusters
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 1.34 GB
Genre: eLearning Video | Duration: 45 lectures (4 hour, 2 mins) | Language: English

Learn how to attack and defend kubernetes clusters


What you'll learn

Students will learn different kubernetes components
Students will learn fundamentals of role based access controls in Kubernetes
Students will learn how service accounts work in Kubernetes
Students will learn the basics of Roles, Role Bindings, Cluster Roles, Cluster Role Bindings
Students will understand the Kubernetes Attack Surface
Students will learn how a misconfigured Kubernetes Cluster can be exploited by attackers
Students will learn how to attack the API Server using insecure port
Students will learn how to attack a misconfigured Kubelet API
Students will learn how ETCD storage works
Students will learn how exposed Kubernetes Dashboard can be abused
Students will learn how to perform Static Analysis of YAML files using Kube-audit
Students will learn how to perform Static Analysis using Kubesec
Students will learn how to perform Security Assessments using Kube-hunter
Students will learn how to audit clusters using Kube-bench
Students will learn how to scan Docker images using trivy
Students will learn how to implement network policies
Students will learn how to use Kubernetes Security Context to prevent attacks

Requirements

The course begins from basics
Its good to have Docker knowledge

Description

Kubernetes security, to some people is a complex subject because of the overwhelming jargon and the complex setup it requires to have a multi node cluster especially when you are doing it for the first time. The goal of this Course is to make things clearer and easier for those who are new to Kubernetes and Kubernetes security world.

Who this course is for:

Security Professionals who are into Kubernetes
Cloud Engineers
Devops Professionals
Penetration testers
Red team members
Anyone who is interested in ethical hacking and penetration testing
Anyone who is interested in information security concepts


 


Homepage: https://www.udemy.com/course/hacking-and-securing-kubernetes-clusters/


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Broknote   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss