Securing Containers and Kubernetes Ecosystem.
(eVideo)

Book Cover
Average Rating
Published
Carpenteria, CA linkedin.com, 2020.
Format
eVideo
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Language
English

Notes

General Note
9/25/202012:00:00AM
Participants/Performers
Presenter: Sam Sehgal
Description
Learn best practices and security controls for containers and the Kubernetes ecosystem using a simple five-factor security model.
Description
Containers have transformed the way applications are built, deployed, and managed. But it’s only a matter a time before a vulnerability or misconfiguration leads to a newsworthy security breach. Establishing security controls is essential to protect applications being deployed in orchestration systems like Kubernetes. This course explains how to secure containers and the Kubernetes ecosystem using a simple five-factor model. Instructor Sam Sehgal—a security strategist and architect —reviews the containers and Kubernetes technology architecture, the application development and deployment life cycle, as well as the attack surface and vectors. He then introduces his five-factor security model to protect Kubernetes and its components, and shows how to apply security controls to the design and code, images and registries, containers and hosts, applications, and Kubernetes clusters.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.

Citations

APA Citation, 7th Edition (style guide)

Sehgal, S. (2020). Securing Containers and Kubernetes Ecosystem . linkedin.com.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Sehgal, Sam. 2020. Securing Containers and Kubernetes Ecosystem. linkedin.com.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Sehgal, Sam. Securing Containers and Kubernetes Ecosystem linkedin.com, 2020.

MLA Citation, 9th Edition (style guide)

Sehgal, Sam. Securing Containers and Kubernetes Ecosystem linkedin.com, 2020.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
6e3e4edc-f61e-0af5-0f97-6301f6a01cf7-eng
Go To Grouped Work

Grouping Information

Grouped Work ID6e3e4edc-f61e-0af5-0f97-6301f6a01cf7-eng
Full titlesecuring containers and kubernetes ecosystem
Authorsehgal sam
Grouping Categorymovie
Last Update2024-04-01 10:58:15AM
Last Indexed2024-04-17 02:14:18AM

Marc Record

First DetectedJan 10, 2024 11:16:52 AM
Last File Modification TimeApr 01, 2024 11:00:31 AM

MARC Record

LEADER02357ngm a22003133i 4500
001LDC2837231
003LDC
00520240401155318.7
006m        c        
007cr cna       a
008240401s2020    cau126        o   vleng d
040 |a linkedin.com|b eng
050 4|a LDC2837231
1001 |a Sehgal, Sam|e speaker.
24510|a Securing Containers and Kubernetes Ecosystem.|c with Sam Sehgal
264 1|a Carpenteria, CA|b linkedin.com,|c 2020.
306 |a 02h:06m:00s
337 |a computer|2 rdamedia
338 |a online resource|2 rdacarrier
500 |a 9/25/202012:00:00AM
5111 |a Presenter: Sam Sehgal
520 |a Learn best practices and security controls for containers and the Kubernetes ecosystem using a simple five-factor security model.
520 |a Containers have transformed the way applications are built, deployed, and managed. But it’s only a matter a time before a vulnerability or misconfiguration leads to a newsworthy security breach. Establishing security controls is essential to protect applications being deployed in orchestration systems like Kubernetes. This course explains how to secure containers and the Kubernetes ecosystem using a simple five-factor model. Instructor Sam Sehgal—a security strategist and architect —reviews the containers and Kubernetes technology architecture, the application development and deployment life cycle, as well as the attack surface and vectors. He then introduces his five-factor security model to protect Kubernetes and its components, and shows how to apply security controls to the design and code, images and registries, containers and hosts, applications, and Kubernetes clusters.
538 |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
655 4|a Instructional films.|2 lcgft
655 4|a Educational films.|2 lcgft
7102 |a linkedin.com (Firm)
85640|u https://www.linkedin.com/learning/securing-containers-and-kubernetes-ecosystem?u=93555873&auth=true|z View course details on linkedin.com/learning
85642|3 thumbnail|u https://media.licdn.com/dms/image/C4E0DAQHDGPzLMbnmyg/learning-public-crop_288_512/0/1600898707127?e=2147483647&v=beta&t=CsuTRc4xz_6AO8qLLIRm9aPdZ2M-W9XDrNs1pL45248