From the course: Securing Containers and Kubernetes Ecosystem

Protect your containers and Kubernetes ecosystem - Kubernetes Tutorial

From the course: Securing Containers and Kubernetes Ecosystem

Start my 1-month free trial

Protect your containers and Kubernetes ecosystem

- [Sam] The adoption of containers and Kubernetes in the enterprise has reached the mainstream, but so has the fear of the next security breach due to improper deployment of these new technologies. In fact, multiple industry survey results in the last year ranked security as one of the top challenges to overcome. So what can an organization do to secure its containers and Kubernetes ecosystem? Well, if you are a security professional trying to apply your knowledge and experience in security to this intriguing world of containers and Kubernetes, or if you are a developer or an operations professional who wants to get a comprehensive view of security best practices, this course is for you. Hi, my name is Sam Sehgal. I have over a decade of combined industry experience across leading software engineering projects, securing complex applications, and leading grassroots security transformation efforts. In this course, I will help you look at the containers and Kubernetes ecosystem from the lens of security. Keeping in sight its attack surface and potential attack vectors, we will apply a five factor security model to cover everything from secure design and coding, securing images, registries, containers, and hosts. We will also cover the security of your Kubernetes cluster itself, and finally, securing your applications in Kubernetes, including access control, network security, secrets management, and much more. By the end of this course, I hope that you will walk away with an understanding of security controls and practices you should apply to protect your containers and Kubernetes ecosystem. So join me on my LinkedIn Learning course, as we explore the nexus of security containers and Kubernetes.

Contents