The Kubernetes ecosystem is a complex web of APIs, tools, and services, all working together to create amazing things. But this ecosystem is under attack. As with physical security, the first step in zeroing in on threats is to monitor traffic and user activity in your system.
When we understand what malicious activity looks like, we can deploy highly effective countermeasures that hunt and take down attackers. Train with us to be a Kubernetes Threat Hunter.
Kubernetes is a complex ecosystem. Companies, large and small, run their critical infrastructure, as containers atop Kubernetes. Kubernetes Security requires a deep-dive understanding of various APIs provided by Kubernetes and tools.Attackers have been able to compromise Kubernetes clusters. They have leveraged compromised clusters to do data exfiltration, run ransomware campaigns, etc on real-world Kubernetes clusters. A major deficiency in these Kubernetes clusters is the lack of security monitoring and active threat hunting capability.
The aim of this training is to take the participant through a journey of highly practical and granular knowledge of Kubernetes offense, defense and detection. This class is an intense, deep-dive experience into Security on Kubernetes. We’d like participants to explore practical implementations of full-fledged environments, rather than have a surface-level understanding of attack, detection and defense in Kubernetes. Participants will walk away with long-term access to our online training portal and labs
Give your team all the skills needed to build & deploy secure, scalable applications in Kubernetes.
Manage complex Kubernetes policies, certificates, and configurations in your environment.
Log & monitor your Kubernetes deployments, and search for threats using cutting edge tools and techniques.
Master threat hunting techniques through real-world stories & automated playbooks.
The most important Kubernetes security concepts
Go hands-on with Kubernetes Threat Hunting stories
Use custom playbooks and advanced tactics to detect K8s threats
Address key security issues with strong preventive controls
Crafted on Real-world training for product security teams
Hands-on Experience: Engage with real-world scenarios in a controlled, cloud-based lab environment to apply learning directly.
Immediate Application: Implement Threat Modeling tools and techniques instantly, enhancing retention and understanding.
Access to Specialized Tooling: Utilize advanced Threat Modeling software and LLMs without needing to set up or maintain the infrastructure.
Safe Learning Space: Experiment and learn from mistakes in a risk-free sandbox, encouraging exploration and innovation.
Basic understanding of application security principles.
Familiarity with software development and the software development lifecycle (SDLC).
Some experience in security practices and methodologies is beneficial
For the optimal learning experience in this course, participants should use a laptop with Windows 10/11, the latest macOS, or a modern Linux distribution, equipped with an Intel i5 processor or equivalent (i7 recommended), at least 8GB of RAM (16GB preferred), and 20GB of free disk space. A stable, high-speed internet connection is essential for accessing streaming content and cloud-based labs, alongside the latest versions of Google Chrome, Mozilla Firefox, or Safari with JavaScript enabled. Participants must have administrative rights to install necessary software and a modern code editor like Visual Studio Code.
10