Hacking and Securing Kubernetes Clusters
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 1.34 GB
Genre: eLearning Video | Duration: 45 lectures (4 hour, 2 mins) | Language: English
Learn how to attack and defend kubernetes clusters
What you'll learn
Students will learn different kubernetes components
Students will learn fundamentals of role based access controls in Kubernetes
Students will learn how service accounts work in Kubernetes
Students will learn the basics of Roles, Role Bindings, Cluster Roles, Cluster Role Bindings
Students will understand the Kubernetes Attack Surface
Students will learn how a misconfigured Kubernetes Cluster can be exploited by attackers
Students will learn how to attack the API Server using insecure port
Students will learn how to attack a misconfigured Kubelet API
Students will learn how ETCD storage works
Students will learn how exposed Kubernetes Dashboard can be abused
Students will learn how to perform Static Analysis of YAML files using Kube-audit
Students will learn how to perform Static Analysis using Kubesec
Students will learn how to perform Security Assessments using Kube-hunter
Students will learn how to audit clusters using Kube-bench
Students will learn how to scan Docker images using trivy
Students will learn how to implement network policies
Students will learn how to use Kubernetes Security Context to prevent attacks
Requirements
The course begins from basics
Its good to have Docker knowledge
Description
Kubernetes security, to some people is a complex subject because of the overwhelming jargon and the complex setup it requires to have a multi node cluster especially when you are doing it for the first time. The goal of this Course is to make things clearer and easier for those who are new to Kubernetes and Kubernetes security world.
Who this course is for:
Security Professionals who are into Kubernetes
Cloud Engineers
Devops Professionals
Penetration testers
Red team members
Anyone who is interested in ethical hacking and penetration testing
Anyone who is interested in information security concepts
Download link:
Só visivel para registados e com resposta ao tópico.Only visible to registered and with a reply to the topic.Links are Interchangeable - No Password - Single Extraction