Hacking and Securing Kubernetes Clusters

Udemy Hacking and Securing Kubernetes Clusters

Register & Get access to index
agZnfSG.jpg

Learn how to attack and defend kubernetes clusters

What you'll learn
  • Students will learn different kubernetes components
  • Students will learn fundamentals of role based access controls in Kubernetes
  • Students will learn how service accounts work in Kubernetes
  • Students will learn the basics of Roles, Role Bindings, Cluster Roles, Cluster Role Bindings
  • Students will understand the Kubernetes Attack Surface
  • Students will learn how a misconfigured Kubernetes Cluster can be exploited by attackers
  • Students will learn how to attack the API Server using insecure port
  • Students will learn how to attack a misconfigured Kubelet API
  • Students will learn how ETCD storage works
  • Students will learn how exposed Kubernetes Dashboard can be abused
  • Students will learn how to perform Static Analysis of YAML files using Kube-audit
  • Students will learn how to perform Static Analysis using Kubesec
  • Students will learn how to perform Security Assessments using Kube-hunter
  • Students will learn how to audit clusters using Kube-bench
  • Students will learn how to scan Docker images using trivy
  • Students will learn how to implement network policies
  • Students will learn how to use Kubernetes Security Context to prevent attacks

Requirements
  • The course begins from basics
  • Its good to have Docker knowledge

Description
Kubernetes security, to some people is a complex subject because of the overwhelming jargon and the complex setup it requires to have a multi node cluster especially when you are doing it for the first time. The goal of this Course is to make things clearer and easier for those who are new to Kubernetes and Kubernetes security world.
Who this course is for:
  • Security Professionals who are into Kubernetes
  • Cloud Engineers
  • Devops Professionals
  • Penetration testers
  • Red team members
  • Anyone who is interested in ethical hacking and penetration testing
  • Anyone who is interested in information security concepts
Author
TUTProfessor
Downloads
24
Views
735
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from TUTProfessor