Session

Kubernet Security

Kubernet Security and then latest bugs

Introduction
Understanding Kubernetes Architecture
The Hacker's Toolkit
Attack Surface in Kubernetes
Common Vulnerabilities
Hacker’s Approach to Kubernetes Reconnaissance
Exploitation Techniques
Lateral Movement and Persistence
Defensive Evasion Techniques
Post-Exploitation and Data Exfiltration
Defensive Measures for Ethical Hackers
Future Trends in Kubernetes Security
Resources for Further Learning
Conclusion

Shivam Mittal

Digisuraksha of all digital ecosystem

Sonīpat, India

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top