Attacking and Defending Kubernetes Clusters with KubeHound Attack Graph Model
WEareTROOPERS via YouTube
Stuck in Tutorial Hell? Learn Backend Dev the Right Way
Build AI Apps with Azure, Copilot, and Generative AI — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore Kubernetes cluster security through an in-depth conference talk on attacking and defending using the KubeHound Attack Graph Model. Delivered by Julien Terriac at the TROOPERS24 IT security conference in Heidelberg, Germany, this 51-minute presentation delves into advanced techniques for assessing and protecting Kubernetes environments. Gain valuable insights into potential attack vectors and defensive strategies for securing containerized infrastructures. Learn how to leverage the KubeHound model to identify vulnerabilities, map attack paths, and implement robust security measures in Kubernetes deployments. Ideal for cybersecurity professionals, DevOps engineers, and IT administrators looking to enhance their knowledge of container security and threat modeling in cloud-native environments.
Syllabus
TROOPERS24: Attacking and Defending Kubernetes Cluster with KubeHound Attack Graph Model
Taught by
WEareTROOPERS