Module 5: Securing Container Supply Chain
Ensuring integrity and security of container images throughout the supply
Ensuring integrity and security of container images throughout the supply
Identifying common vulnerabilities in microservices architecture. Implementing security measures at
Exploring key security objects in Kubernetes clusters (e.g., PodSecurityPolicy, NetworkPolicy).
Implementing system hardening measures for Kubernetes nodes. Securing host OS,
Overview of Kubernetes threat models and security maturity levels. Identifying