Satkeys

PORTA DE ENTRADA => Tutoriais de Aprendizagem => Tópico iniciado por: mitsumi em 17 de Outubro de 2020, 14:34

Título: Hacking and Securing Kubernetes Clusters
Enviado por: mitsumi em 17 de Outubro de 2020, 14:34
(https://i114.fastpic.ru/big/2020/1017/7b/c6d062483712f754e9dfd2fe0ffea67b.jpg)

Hacking and Securing Kubernetes Clusters
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 1.34 GB
Genre: eLearning Video | Duration: 45 lectures (4 hour, 2 mins) | Language: English

 Learn how to attack and defend kubernetes clusters

What you'll learn

    Students will learn different kubernetes components
    Students will learn fundamentals of role based access controls in Kubernetes
    Students will learn how service accounts work in Kubernetes
    Students will learn the basics of Roles, Role Bindings, Cluster Roles, Cluster Role Bindings
    Students will understand the Kubernetes Attack Surface
    Students will learn how a misconfigured Kubernetes Cluster can be exploited by attackers
    Students will learn how to attack the API Server using insecure port
    Students will learn how to attack a misconfigured Kubelet API
    Students will learn how ETCD storage works
    Students will learn how exposed Kubernetes Dashboard can be abused
    Students will learn how to perform Static Analysis of YAML files using Kube-audit
    Students will learn how to perform Static Analysis using Kubesec
    Students will learn how to perform Security Assessments using Kube-hunter
    Students will learn how to audit clusters using Kube-bench
    Students will learn how to scan Docker images using trivy
    Students will learn how to implement network policies
    Students will learn how to use Kubernetes Security Context to prevent attacks

Requirements

    The course begins from basics
    Its good to have Docker knowledge

Description

Kubernetes security, to some people is a complex subject because of the overwhelming jargon and the complex setup it requires to have a multi node cluster especially when you are doing it for the first time. The goal of this Course is to make things clearer and easier for those who are new to Kubernetes and Kubernetes security world.

Who this course is for:

    Security Professionals who are into Kubernetes
    Cloud Engineers
    Devops Professionals
    Penetration testers
    Red team members
    Anyone who is interested in ethical hacking and penetration testing
    Anyone who is interested in information security concepts

Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction