25.13.6
This website uses cookies to ensure you get the best experience on our website. Learn more

A Practical Approach to Breaking & Pwning Kubernetes Clusters: An Advanced Hands-On Approach [2104]

Chao Jie Charles Tay

As Kubernetes adoption in production environments reaches pretty much everywhere, security teams continue to face significant challenges in understanding and securing these complex, modern technologies. This hands-on, scenario-based training is designed to bridge that gap. Participants will learn to attack and assess Kubernetes cluster environments across various layers, including Supply Chain, Infrastructure, Runtime, and more.

In this updated course, participants will:

1. Exploit misconfigurations and private registries through effective reconnaissance techniques.
2. Escape containers and move laterally within clusters to gain unauthorized access.
3. Elevate privileges, conduct DoS attacks, and bypass security policies like Network Security Policies (NSP) and Role-Based Access Controls (RBAC).
4. Gain access to sensitive data, logs, and microservices, breaching cluster boundaries.
5. Deploy defence evasion techniques and establish persistence within the cluster.
6. Bypass security solutions such as policy engines, resource limits, and controls.
7. Conduct comprehensive cluster security evaluations using CIS benchmarks and audits.

By the end of the course, participants will have the skills to conduct architecture reviews, security assessments, red team exercises, and penetration testing on Kubernetes clusters and containerized environments. A detailed digital guidebook with resources and references will be provided to extend learning beyond the training.

Skills / Knowledge

  • PenTesting
  • Risk

Issued on

April 2, 2025

Expires on

Does not expire
Job Insights

These are the most common job titles and employers with the most open positions related to this credential.

Showing results for United States.

Top job titles related to this credential
0 0 5 5 10 10 15 15 20 20 Percentage SR CYBER SECURITY ARCHITECT SR CYBER SECURITY ARCHITECT CYBER SECURITY CONSULTING LEAD CYBER SECURITY CONSULTING LEAD CYBER SECURITY ENGINEER, PRINCIPAL CYBER SECURITY ENGINEER, PRINCIPAL
0 0 5 5 10 10 15 15 20 20 Percentage
Legend
  • SR CYBER SECURITY ARCHITECT
  • CYBER SECURITY CONSULTING LEAD
  • CYBER SECURITY ENGINEER, PRINCIPAL
Top Employers
0.0 0.0 0.2 0.2 0.4 0.4 0.6 0.6 0.8 0.8 1.0 1.0 Jobs General Dynamics Information Technology General Dynamics Information Technology
0.0 0.0 0.2 0.2 0.4 0.4 0.6 0.6 0.8 0.8 1.0 1.0 Jobs
Legend
  • General Dynamics Information Technology