Learn Generative AI, Prompt Engineering, and LLMs for Free
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn to identify and exploit critical security vulnerabilities in Kubernetes clusters through live hacking demonstrations in this 46-minute conference talk from Devoxx. Explore the OWASP Kubernetes Top 10 security risks by witnessing real-time exploitation techniques that compromise user accounts and cluster integrity. Discover common security misconfigurations and implementation flaws that attackers target, while gaining practical insights into defensive strategies and best practices for hardening Kubernetes deployments. Master both offensive and defensive perspectives to better understand how malicious actors infiltrate containerized environments and how to effectively protect your Kubernetes infrastructure against these threats.
Syllabus
The Hacker's Guide to Kubernetes by Patrycja Wegrzynowicz
Taught by
Devoxx