In a containerized app economy, software operates less like a giant ship and more like a whole fleet of smaller vessels. Kubernetes is the captain in charge of them all. But the inherent complexity of Kubernetes can make it challenging to secure.
Kubernetes security spans various disciplines from access control and cryptography, to network security and threat modeling. Gain mastery over the tech that's shaping thousands of businesses worldwide.
Kubernetes has emerged as the leading container orchestration and management platform for on-prem and cloud environments. However, Kubernetes is a multi-headed beast with several minute and nuanced security configuration parameters. In addition, attackers take advantage of these insecurely configured and designed Kubernetes deployments and perform deep-incursions into the organization’s assets. This training is a hard-core hands-on view of Kubernetes Security from an Attack and Defense perspective.
The course takes the participants through a journey where they start with setting up a Kubernetes cluster (simulating an on-prem Kubernetes) deployment, attack the cluster and learn, through multiple deep-dive examples and cookbooks on how they can effectively secure Kubernetes clusters. The course is aimed at providing a view of attacking, auditing and defending Kubernetes clusters on-prem or on the cloud.
Acquire advanced skills in large-scale & complex container deployments using Kubernetes.
Learn common attack patterns against Kubernetes clusters, misconfigurations, and components.
Implement granular security controls across your deployments & manage Kubernetes policies.
Configuring AuthN & AuthZ, secrets management, and monitoring Kubernetes clusters.
Attack Kubernetes clusters & components
RBAC, AuthN, AuthZ, and Secrets
Service Mesh, Kubernetes policies and Network security, logging & monitoring
Crafted on Real-world training for product security teams
Hands-on Experience: Engage with real-world scenarios in a controlled, cloud-based lab environment to apply learning directly.
Immediate Application: Implement Threat Modeling tools and techniques instantly, enhancing retention and understanding.
Access to Specialized Tooling: Utilize advanced Threat Modeling software and LLMs without needing to set up or maintain the infrastructure.
Safe Learning Space: Experiment and learn from mistakes in a risk-free sandbox, encouraging exploration and innovation.
Basic understanding of application security principles.
Familiarity with software development and the software development lifecycle (SDLC).
Some experience in security practices and methodologies is beneficial
For a optimal learning experience in this course, participants should use a laptop with Windows 10/11, the latest macOS, or a modern Linux distribution, equipped with an Intel i5 processor or equivalent (i7 recommended), at least 8GB of RAM (16GB preferred), and 20GB of free disk space. A stable, high-speed internet connection is essential for accessing streaming content and cloud-based labs, alongside the latest versions of Google Chrome, Mozilla Firefox, or Safari with JavaScript enabled. Participants must have administrative rights to install necessary software and a modern code editor like Visual Studio Code.
10