Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Owasp Top 10 For Docker And Kubernetes Security

Posted By: ELK1nG
Owasp Top 10 For Docker And Kubernetes Security

Owasp Top 10 For Docker And Kubernetes Security
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 583.90 MB | Duration: 1h 10m

Protect your containers and Kubernetes deployments with OWASP's Top 10 security guidelines

What you'll learn

Kubernetes Security Concepts

Technical insight into Kubernetes

Container Internals

Container Security

Requirements

Basic Container Theory

Description

In the world of containerization, Kubernetes has emerged as a powerful platform for managing and deploying software applications. Its popularity has grown tremendously in recent years, but with that comes an increased need for security. This is where the Open Web Application Security Project (OWASP) Kubernetes Top 10 comes in. This course will provide students with a detailed understanding of these risks and how to address them to secure containerized deployments.Throughout this course, students will gain an in-depth understanding of the most critical security risks associated with Kubernetes. They will learn about common vulnerabilities and exploits, as well as the potential impact of these risks on containerized deployments. From there, students will dive into the essential security measures needed to protect Kubernetes clusters and applications running on them. This includes topics such as access controls, authentication and authorization, network security, and more.The course is designed to be highly interactive, with plenty of hands-on activities and real-world examples to ensure students gain practical skills that can be applied immediately. By the end of the course, students will have a solid understanding of Kubernetes security risks, the measures necessary to protect against them, and the tools and techniques available to manage security effectively. Whether you are a developer, system administrator, or security professional, this course will provide you with the skills and knowledge needed to secure your containerized deployments.

Overview

Section 1: Introduction

Lecture 1 Introduction to OWASP Top 10 for Docker and Kubernetes Security

Lecture 2 Introduction to OWASP Docker Top 10

Section 2: Item 1: Host OS vulnerabilities

Lecture 3 Host OS vulnerabilities

Section 3: Item 2: Insecure container images

Lecture 4 Insecure container images

Section 4: Item 3: Insecure container configurations

Lecture 5 Insecure container configurations

Lecture 6 Insecure container configurations Demo

Section 5: Item 4: Container escape vulnerabilities

Lecture 7 Container escape vulnerabilities

Section 6: Item 5: Inadequate process isolation

Lecture 8 Inadequate process isolation

Section 7: Item 6: Inadequate network segmentation

Lecture 9 Inadequate network segmentation

Section 8: Item 7: Inadequate logging and monitoring

Lecture 10 Inadequate logging and monitoring

Section 9: Item 8: Insecure data storage in containers

Lecture 11 Insecure data storage in containers

Section 10: Item 9: Inadequate resource limits

Lecture 12 Inadequate resource limits

Section 11: Item 10: Inadequate security controls can enable unauthorized access

Lecture 13 Inadequate security controls can enable unauthorized access

Lecture 14 Inadequate security controls demo

Lecture 15 Inadequate security controls demo

Section 12: OWASP Kubernetes Top 10

Lecture 16 Introduction to OWASP Kubernetes Top 10

Section 13: Insecure Workload Configurations

Lecture 17 Insecure Workload Configurations

Lecture 18 Privileged Container Demo

Developers,Security researchers,System administrators