Video description
This Kubernetes Security Specialist course provides foundational knowledge using concepts and hands-on demonstrations of the Kubernetes Cluster.
In this course, we will be focusing more on the practical side, so make sure you have a running Kubernetes cluster. This course is focused on security. It deals with all aspects of security within the context of a Kubernetes environment. That means securing not only the Kubernetes cluster itself but also the applications running within the cluster.
You will learn how to secure many different components of Kubernetes applications and environments. We are going to cover every topic such as cluster setup, creating an ingress, and securing an ingress. You will also learn cluster hardening, which includes RBAC, role, and role binding for a user.
Further, you will learn system hardening, kernel hardening, minimizing microservice vulnerabilities, supply chain security, monitoring, logging, and runtime security.
By the end of this Kubernetes course, you will gain in-depth knowledge about Kubernetes and be a Kubernetes security specialist.
What You Will Learn
- Learn how to create a Kubernetes Cluster
- Learn how to create default deny NetworkPolicy
- Learn how to install Kubernetes Dashboard
- Learn how to download and verify Kubernetes release
- Explore role and role binding for a user
- Learn how to create a Kubernetes cluster with the outdated version
Audience
This Docker course is designed for Kubernetes administrators, security specialists, and for those who want to master Certified Kubernetes Security Specialist.
You should already have some Kubernetes Administrator knowledge before attending this course.
About The Author
Himanshu Sharma: Himanshu Sharma is an expert in Kubernetes, containers, and cloud-native infrastructure. He has more than 12 years of IT experience in a variety of industries, including medical devices, entertainment, enterprise software, and cloud computing. He is passionate about learning new technologies and believes the best way to learn is by doing it practically.
Table of contents
- Chapter 1 : Become a Certified Kubernetes Security Specialist (CKS)
- Chapter 2 : Create Kubernetes Cluster
- Chapter 3 : Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access
- Chapter 4 : Cluster Setup – Minimize Use of and Access to GUI Elements
- Chapter 5 : Cluster Setup – Properly Set Up Ingress Objects with Security Control
- Chapter 6 : Protect Node Metadata and Endpoints
- Chapter 7 : Use CIS Benchmark to Review the Security Configuration of Kubernetes Components
- Chapter 8 : Verify Platform Binaries before Deploying
- Chapter 9 : Cluster Hardening - RBAC
- Chapter 10 : Exercise Caution in Using Service Accounts
- Chapter 11 : Cluster Hardening – Restrict API Access
- Chapter 12 : Cluster Hardening – Upgrade Kubernetes
- Chapter 13 : Microservice Vulnerabilities – Manage Kubernetes Secrets
- Chapter 14 : Use Container Runtime Sandboxes in a Multi-Tenant Environment
- Chapter 15 : Microservices Vulnerabilities – OS Level Security Domains
- Chapter 16 : Microservices Vulnerabilities – mTLS
- Chapter 17 : Open Policy Agent (OPA)
- Chapter 18 : Supply Chain Security – Image Footprint
- Chapter 19 : Supply Chain Security – Static Analysis
- Chapter 20 : Supply Chain Security – Image Vulnerability Scanning
- Chapter 21 : Supply Chain Security – Secure Supply Chain
- Chapter 22 : Behavioral Analytics at Host and Container Level
- Chapter 23 : Runtime Security – Immutability of Containers at Runtime
- Chapter 24 : Runtime Security - Auditing
- Chapter 25 : System Hardening – Kernel Hardening
Product information
- Title: Certified Kubernetes Security Specialist (CKS) Course
- Author(s):
- Release date: May 2022
- Publisher(s): Packt Publishing
- ISBN: 9781803237114
You might also like
book
Certified Kubernetes Security Specialist (CKS) Study Guide
Exclusively on O'Reilly: Get more hands-on training and test your CKS exam readiness by working through …
video
Certified Kubernetes Administrator (CKA) Certification Training Course
Kubernetes is one of the most popular container orchestration tools available. The container orchestration with Kubernetes …
video
Certified Kubernetes Administrator (CKA)
An updated edition of this video title is available. Please go to Certified Kubernetes Administrator (CKA) …
book
Learn Kubernetes Security
Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key Features …