A
AUT0R3V
Kubernetes Security
https://drive.google.com/file/d/1HQtJ6Dxl_AS43GT9aR4IR6xeV7pfLBjn/view?usp=sharing - [restricted permissions]
Content Details -
Introduction to container security
Different deployement alternatives
Kubernetes and deployement details
Container-Pod Interaction
[Hands-On Session ] Kubernetes deployement
[Hands-On Session] Kernel privilege escalation
Hands-On Session on the following targeted areas -
1] namespace bypass
2] attacking private registeries
3] priveleged pods
4] nodeport services
5] ssrf
[Hands-On Session ]Security guidlines for safe deployement
Comments
Hosted by
Deep dives into privacy and security, and understanding needs of the Indian tech ecosystem through guides, research, collaboration, events and conferences. Sponsors: Privacy Mode’s programmes are sponsored by:
more
{{ gettext('Login to leave a comment') }}
{{ gettext('Post a comment…') }}{{ errorMsg }}
{{ gettext('No comments posted yet') }}