Containers and Kubernetes are everywhere. We can see the use of Kubernetes in production increased exponentially. Still, most of the security teams struggle tounderstand these modern technologies
In this training, we will see both sides (offensive & defensive) of the coin by learning tactics, techniques, and procedures (TTPs). We will start with understandingarchitecture and its attack surface. Then we will dive into each layer of security starting from the supply chain, infrastructure, runtime, and many others.
From an attacker’s perspective participants able to assess and attack Kubernetes Cluster environments to gain access to microservices, sensitive data, escapingcontainers, escalating to clusters privileges, and even its underlying cloud environments. Also, we will be using the offensive knowledge to build and design securecluster environments using secure defaults, RBAC, NSP, PSP(deprecating so we may see using OPA), and many other built-in and opensource components.
Course outline
Day 1
Day 2
Day 3
Day 4
What to bring/have
Prerequisites
Who Should Attend?
What to expect?
What not to expect?