Microsoft and Tigera: Hands-on AKS workshop: Configuration Security and Compliance

Prevent a potential DDoS Attack with Application-Layer Security Controls

Hands-on workshop: Implementing security controls on containerized workloads on AWS, Microsoft, Red Hat or Rancher

AWS Dev Days: Hands-on EKS workshop: Configuration Security and Compliance

Auditing cloud-native applications for security risks and misconfigurations

Container Security Basics – Image Assurance

Microsoft AKS on Windows Server/Azure Stack HCI: Hands-on Workshop – Robust Security for Containerized Workloads

RKE Workshop: Configuration Security and Compliance for Containers and Kubernetes Environment

AWS Dev Days: Hands-on EKS workshop – Implementing Zero-Trust Security for Containers

Microsoft and Tigera: Hands-on AKS workshop – Implementing Zero-Trust Security for Containers
