Session
Kubernet Security
Kubernet Security and then latest bugs
Introduction
Understanding Kubernetes Architecture
The Hacker's Toolkit
Attack Surface in Kubernetes
Common Vulnerabilities
Hacker’s Approach to Kubernetes Reconnaissance
Exploitation Techniques
Lateral Movement and Persistence
Defensive Evasion Techniques
Post-Exploitation and Data Exfiltration
Defensive Measures for Ethical Hackers
Future Trends in Kubernetes Security
Resources for Further Learning
Conclusion
Shivam Mittal
Digisuraksha of all digital ecosystem
Sonīpat, India
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top