Securing Cloud Applications and Their Credentials

Securing Cloud Applications and Their Credentials

Strange Loop Conference via YouTube Direct link

Introduction

1 of 20

1 of 20

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Securing Cloud Applications and Their Credentials

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Why should we care
  3. 3 Containerization
  4. 4 Security
  5. 5 There is no perfect system
  6. 6 What do you want vs what do you need
  7. 7 Layers
  8. 8 Containers
  9. 9 Additional security features
  10. 10 Container security
  11. 11 Common problems
  12. 12 Modern apps
  13. 13 Exfiltration potential
  14. 14 Dont trust developers
  15. 15 Developers vs security
  16. 16 Credentials
  17. 17 Securing containers
  18. 18 Managing credentials
  19. 19 Secret Lists
  20. 20 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.