This training features we45's signature ADD Method: Attack, Detect, Defend.
We use real-world Threat Hunting stories to exploit your apps, monitor serious threats, and secure against them.
Take a look at what you'll be training in:
The most important Kubernetes security concepts
Go hands-on with Kubernetes Threat Hunting stories
Use custom playbooks and advanced tactics to detect K8s threats
Address key security issues with strong preventive controls
we45's ADD Method: Attack, Detect, Defend
Hands-on labs take you step-by-step through each lesson
Lessons modeled on real-world security problems
Can be customized for your organization's needs
Never found a crypto class this informative. Great job, Abhay!
Abhay is a phenomenal instructor, he is extremely knowledgeable and engaging. The labs were really fun and relevant... I learned a ton and look forward to putting it into practice.
Thanks AppSecEngineer for amazing courses, information
Thorough threat modeling process that can be applied to internal and external networks.... Training was a 10x multiplier for us, allowing our team to easily build models the SOC can use.
Kubernetes is a complex ecosystem. Companies, large and small, run their critical infrastructure, as containers atop Kubernetes. Kubernetes Security requires a deep-dive understanding of various APIs provided by Kubernetes and tools.Attackers have been able to compromise Kubernetes clusters. They have leveraged compromised clusters to do data exfiltration, run ransomware campaigns, etc on real-world Kubernetes clusters. A major deficiency in these Kubernetes clusters is the lack of security monitoring and active threat hunting capability.
The aim of this training is to take the participant through a journey of highly practical and granular knowledge of Kubernetes offense, defense and detection. This class is an intense, deep-dive experience into Security on Kubernetes. We’d like participants to explore practical implementations of full-fledged environments, rather than have a surface-level understanding of attack, detection and defense in Kubernetes. Participants will walk away with long-term access to our online training portal and labs