Owasp Top 10 For Docker And Kubernetes Security
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 583.90 MB | Duration: 1h 10m
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 583.90 MB | Duration: 1h 10m
Protect your containers and Kubernetes deployments with OWASP's Top 10 security guidelines
What you'll learn
Kubernetes Security Concepts
Technical insight into Kubernetes
Container Internals
Container Security
Requirements
Basic Container Theory
Description
In the world of containerization, Kubernetes has emerged as a powerful platform for managing and deploying software applications. Its popularity has grown tremendously in recent years, but with that comes an increased need for security. This is where the Open Web Application Security Project (OWASP) Kubernetes Top 10 comes in. This course will provide students with a detailed understanding of these risks and how to address them to secure containerized deployments.Throughout this course, students will gain an in-depth understanding of the most critical security risks associated with Kubernetes. They will learn about common vulnerabilities and exploits, as well as the potential impact of these risks on containerized deployments. From there, students will dive into the essential security measures needed to protect Kubernetes clusters and applications running on them. This includes topics such as access controls, authentication and authorization, network security, and more.The course is designed to be highly interactive, with plenty of hands-on activities and real-world examples to ensure students gain practical skills that can be applied immediately. By the end of the course, students will have a solid understanding of Kubernetes security risks, the measures necessary to protect against them, and the tools and techniques available to manage security effectively. Whether you are a developer, system administrator, or security professional, this course will provide you with the skills and knowledge needed to secure your containerized deployments.
Overview
Section 1: Introduction
Lecture 1 Introduction to OWASP Top 10 for Docker and Kubernetes Security
Lecture 2 Introduction to OWASP Docker Top 10
Section 2: Item 1: Host OS vulnerabilities
Lecture 3 Host OS vulnerabilities
Section 3: Item 2: Insecure container images
Lecture 4 Insecure container images
Section 4: Item 3: Insecure container configurations
Lecture 5 Insecure container configurations
Lecture 6 Insecure container configurations Demo
Section 5: Item 4: Container escape vulnerabilities
Lecture 7 Container escape vulnerabilities
Section 6: Item 5: Inadequate process isolation
Lecture 8 Inadequate process isolation
Section 7: Item 6: Inadequate network segmentation
Lecture 9 Inadequate network segmentation
Section 8: Item 7: Inadequate logging and monitoring
Lecture 10 Inadequate logging and monitoring
Section 9: Item 8: Insecure data storage in containers
Lecture 11 Insecure data storage in containers
Section 10: Item 9: Inadequate resource limits
Lecture 12 Inadequate resource limits
Section 11: Item 10: Inadequate security controls can enable unauthorized access
Lecture 13 Inadequate security controls can enable unauthorized access
Lecture 14 Inadequate security controls demo
Lecture 15 Inadequate security controls demo
Section 12: OWASP Kubernetes Top 10
Lecture 16 Introduction to OWASP Kubernetes Top 10
Section 13: Insecure Workload Configurations
Lecture 17 Insecure Workload Configurations
Lecture 18 Privileged Container Demo
Developers,Security researchers,System administrators