Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to identify and exploit critical security vulnerabilities in Kubernetes clusters through live hacking demonstrations in this 46-minute conference talk from Devoxx. Explore the OWASP Kubernetes Top 10 security risks by witnessing real-time exploitation techniques that compromise user accounts and cluster integrity. Discover common security misconfigurations and implementation flaws that attackers target, while gaining practical insights into defensive strategies and best practices for hardening Kubernetes deployments. Master both offensive and defensive perspectives to better understand how malicious actors infiltrate containerized environments and how to effectively protect your Kubernetes infrastructure against these threats.
Syllabus
The Hacker's Guide to Kubernetes by Patrycja Wegrzynowicz
Taught by
Devoxx