Save for later
Hack My Misconfigured Kubernetes
In the last few years, more responsibilities have shifted to development teams. With the widespread adoption of Kubernetes, configurations become a developer issue first and foremost. This responsibility means that developers need to be aware of the security risks involved in their configurations. Just by themselves, those configuration security risks might not be so harmful, but with other vulnerable components in the production environment, like the libraries used in the application, or a malicious container, potential attackers can build a multi-steps attack vector, using all of these risks together. Developers should give the necessary attention to those risks and make sure that our applications and clusters are as secure as possible. In this hands-on presentation, you’ll see a demonstration on some of the key security issues that affect your Kubernetes configuration. You'll hear what they actually mean, what an attacker can do to your cluster and howto fix them.
Get a Reminder
Get a Reminder
Similar Courses
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
IS-Security Specialist $39k
Security / Network administrator $58k
Head of Global Security $61k
SailPoint Security $70k
Industrial Security Specialist 4 $77k
Security Police Commander $79k
Security Police Officer 2 3 $84k
Hazards and Risks Engineer $85k
Owner security $87k
IT/Network Security Specialist $92k
Security Engineeer $102k
Security Police Consultant $109k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course