Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Hacker's Guide to Insecure Workload Configuration in Kubernetes

GeeCON Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore Kubernetes security vulnerabilities through live hacking demonstrations in this conference talk that reveals how attackers can exploit insecure workload configurations to compromise user accounts. Witness interactive demos showing real-time account hijacking in Kubernetes applications while learning about critical security risks from the OWASP Kubernetes Top 10 list. Discover various exploitation techniques targeting misconfigurations in Kubernetes clusters, including privilege escalation attacks on pods and containers that can lead to complete compromise of web applications. Focus on understanding Insecure Workload Configuration and Lack of Centralized Policy Enforcement vulnerabilities through practical examples that demonstrate how seemingly minor misconfigurations can create significant security breaches in production environments.

Syllabus

GeeCON 2024: P. Węgrzynowicz - The Hacker’s Guide to Insecure Workload Configuration in Kubernetes

Taught by

GeeCON Conference

Reviews

4.0 rating, based on 1 Class Central review

Start your review of The Hacker's Guide to Insecure Workload Configuration in Kubernetes

  • The explanation was simple and very understandable but the only one problem was the video because there were no subtitles and if I not get they say it was very hard to rewind it. Otherwise everything was perfect

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.