-
8am -> 9am
- Welcome, Expectations, Connectivity and environment setup.
-
9am -> 10am (With 15 min break) (containers)
- Exercise_1 - lets deploy our first workload
- Discussion - Linux kernel, namespaces, etc.
- Exercise_2 - docker-compose (Builder)- Why is it important to work with containers as opposed to running local?
- Exercise_3 - docker-compose (Breaker)- Here's what you can do in an improperly configured Dev. Env.
- Exercise_4 - docker-compose (Defender) - How to secure your Dev. Environment.
-
10am -> 11am
-
12pm -> 1pm Lunch
-
1pm -> 2pm
-
2pm -> 3pm
- Exercise_15 - Ingress
- Exercise_16 - Ingress Defense
- Exercise_17 - East / West
- Exercise_18 - Attacking Cluster networking
- Exercise_19 - Defending Cluster networking
-
3pm -> 4pm (With 15 min break)
- Exercise_20 - How do secrets work
- Discussion - Common tools and tech used for secrets.
- Exercise_21 - Attacking secret storage
- Exercise_22 - Creative secret integration
-
4pm -> 5pm
- Exercise_23 - Kubectl plugins
- Exercise_24 - Custom resource definitions
- Exercise_25 - Pod Security policies
- Exercise_26 - Attacking Pod Security policies