Learn Backend Development Part-Time, Online
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore Kubernetes security vulnerabilities through live hacking demonstrations in this conference talk that reveals how attackers can exploit insecure workload configurations to compromise user accounts. Witness interactive demos showing real-time account hijacking in Kubernetes applications while learning about critical security risks from the OWASP Kubernetes Top 10 list. Discover various exploitation techniques targeting misconfigurations in Kubernetes clusters, including privilege escalation attacks on pods and containers that can lead to complete compromise of web applications. Focus on understanding Insecure Workload Configuration and Lack of Centralized Policy Enforcement vulnerabilities through practical examples that demonstrate how seemingly minor misconfigurations can create significant security breaches in production environments.
Syllabus
GeeCON 2024: P. Węgrzynowicz - The Hacker’s Guide to Insecure Workload Configuration in Kubernetes
Taught by
GeeCON Conference
Reviews
4.0 rating, based on 1 Class Central review
Showing Class Central Sort
-
The explanation was simple and very understandable but the only one problem was the video because there were no subtitles and if I not get they say it was very hard to rewind it. Otherwise everything was perfect