Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Using k8s to Deploy Security Services in a Hostile World

nullcon via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore how to leverage Kubernetes for deploying security services in challenging environments in this 16-minute conference talk from the Nullcon International Security Conference March 2021. Learn from Google Security Engineer John Nichols as he shares insights on inheriting complex projects and building scalable tooling solutions. Discover a three-step plan for deploying containerized security tools into "hostile" environments with minimal customization. Gain valuable knowledge about cloud setup processes, cron job implementation, and overcoming deployment obstacles. Understand the current state of this project and its potential applications in cloud security and Kubernetes ecosystems.

Syllabus

Intro
Administrative notes!
My three step plan
Services I started with
Cloud setup process
The cron process
This was actually really hard
Where is this project now?

Taught by

nullcon

Reviews

Start your review of Using k8s to Deploy Security Services in a Hostile World

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.