Bootcamp: Rapid Threat Modeling with GenAI & LLMs - June 6-7, 2024. Only 12 seats left - Secure your spot!

Kubernetes Threat Hunting

The Kubernetes ecosystem is a complex web of APIs, tools, and services, all working together to create amazing things. But this ecosystem is under attack.As with physical security, the first step in zeroing in on threats is to monitor traffic and user activity in your system.

When we understand what malicious activity looks like, we can deploy highly effective countermeasures that hunt and take down attackers. Train with us to be a Kubernetes Threat Hunter.

Use attackers' tactics against them

This training features we45's signature ADD Method: Attack, Detect, Defend.
We use real-world Threat Hunting stories to exploit your apps, monitor serious threats, and secure against them.

Take a look at what you'll be training in:

The most important Kubernetes security concepts

Go hands-on with Kubernetes Threat Hunting stories

Use custom playbooks and advanced tactics to detect K8s threats

Address key security issues with strong preventive controls

view all lessons

Why you'll love this program

we45's ADD Method: Attack, Detect, Defend
Hands-on labs take you step-by-step through each lesson
Lessons modeled on real-world security problems
Can be customized for your organization's needs

talk to us

These people loved us too

Never found a crypto class this informative. Great job, Abhay!

Sukanya S
senior security engineer
World's Largest Sports Equipment Manufacturer

Abhay is a phenomenal instructor, he is extremely knowledgeable and engaging. The labs were really fun and relevant... I learned a ton and look forward to putting it into practice.

Christian San Roman
Senior Security Executive
Defense industry

Thanks AppSecEngineer for amazing courses, information

Moises T.
DevSecOps, Purple Teaming
softtek

Thorough threat modeling process that can be applied to internal and external networks.... Training was a 10x multiplier for us, allowing our team to easily build models the SOC can use.

Jessica O.
Cyber Threat Intelligence & Threat Hunt Development Lead
CYBERSECURITY OPERATIONS CENTER (CSOC)

Course Abstract

Kubernetes is a complex ecosystem. Companies, large and small, run their critical infrastructure, as containers atop Kubernetes. Kubernetes Security requires a deep-dive understanding of various APIs provided by Kubernetes and tools.Attackers have been able to compromise Kubernetes clusters. They have leveraged compromised clusters to do data exfiltration, run ransomware campaigns, etc on real-world Kubernetes clusters. A major deficiency in these Kubernetes clusters is the lack of security monitoring and active threat hunting capability.

The aim of this training is to take the participant through a journey of highly practical and granular knowledge of Kubernetes offense, defense and detection. This class is an intense, deep-dive experience into Security on Kubernetes. We’d like participants to explore practical implementations of full-fledged environments, rather than have a surface-level understanding of attack, detection and defense in Kubernetes. Participants will walk away with long-term access to our online training portal and labs

View full abstract & course details

We have other training programs for you

The best AppSec training in the biz

We’ve been training at top security events like Black Hat, DEF CON, and OWASP for years.
Zero compromise training that gets results. That's AppSecEngineer.
talk to us

Hands-on. Defensive. Bleeding-Edge.

There's no other training platform that does all three. Except AppSecEngineer.
Get Our Newsletter
Get Started
X
FOLLOW APPSECENGINEER
CONTACT

Contact Support

help@appsecengineer.com

1603 Capitol Avenue,
Suite 413A #2898,
Cheyenne, Wyoming 82001,
United States

Copyright AppSecEngineer © 2023