Sep

29

2020

Hacking and Securing Kubernetes Clusters

supnatural 29 Sep 2020 18:07 LEARNING » e-learning - Tutorial


Hacking and Securing Kubernetes Clusters
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz
Language: English | VTT | Size: 1.34 GB | Duration: 5 section | 45 lectures | (4h 2m)
What you'll learn



Students will learn different kubernetes components
Students will learn fundamentals of role based access controls in Kubernetes
Students will learn how service accounts work in Kubernetes
Students will learn the basics of Roles, Role Bindings, Cluster Roles, Cluster Role Bindings
Students will understand the Kubernetes Attack Surface
Students will learn how a misconfigured Kubernetes Cluster can be exploited by attackers
Students will learn how to attack the API Server using insecure port
Students will learn how to attack a misconfigured Kubelet API
Students will learn how ETCD storage works
Students will learn how exposed Kubernetes Dashboard can be abused
Students will learn how to perform Static Analysis of YAML files using Kube-audit
Students will learn how to perform Static Analysis using Kubesec
Students will learn how to perform Security Assessments using Kube-hunter
Students will learn how to audit clusters using Kube-bench
Students will learn how to scan Docker images using trivy
Students will learn how to implement network policies
Students will learn how to use Kubernetes Security Context to prevent attacks

Requirements
The course begins from basics
Its good to have Docker knowledge
Description
Kubernetes security, to some people is a complex subject because of the overwhelming jargon and the complex setup it requires to have a multi node cluster especially when you are doing it for the first time. The goal of this Course is to make things clearer and easier for those who are new to Kubernetes and Kubernetes security world.

Who this course is for:
Security Professionals who are into Kubernetes
Cloud Engineers
Devops Professionals
Penetration testers
Red team members
Anyone who is interested in ethical hacking and penetration testing
Anyone who is interested in information security concepts


http://rapidgator.net/file/f2077bce018dee786a6d6021421dfc99/Hacking_and_Securing_Kubernetes_Clusters.part1.rar.html
http://rapidgator.net/file/e3582b2c8b97473150c299c1a387619d/Hacking_and_Securing_Kubernetes_Clusters.part2.rar.html

or
https://uploadgig.com/file/download/1cc45E7c5020479b/Hacking_and_Securing_Kubernetes_Clusters.part1.rar
https://uploadgig.com/file/download/18f3c97CF434a6b9/Hacking_and_Securing_Kubernetes_Clusters.part2.rar

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis