Udemy – Certified Kubernetes Security Professional Masterclass 2023-6 – Download

Description

Kubernetes Certified Security Professional course. Master Class.

Cluster setup

  1. Use network security policies to restrict access at the cluster level.
  2. Use the CIS test to test the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi).
  3. Properly configure Ingress objects with security controls.
  4. Protect node metadata and endpoints
  5. Minimize use and access to GUI elements.
  6. Check platform binaries before deployment

Increased cluster security

  1. Restrict access to Kubernetes API
  2. Use role-based access control to minimize risk.
  3. Be careful when using service accounts, such as disabling default settings, keeping newly created permissions to a minimum.
  4. Update Kubernetes regularly

Improving system security

  1. Minimize the impact of the host operating system (reduce attack surface)
  2. Minimize IAM roles
  3. Minimize access to the external network
  4. Correctly use kernel security tools such as AppArmor, seccomp.

Minimize microservice vulnerabilities

  1. Set appropriate security domains at the operating system level.
  2. Manage Kubernetes secrets
  3. Using container runtime containers in multi-tenant environments (e.g. gvisor, kata containers)
  4. Implementation of inter-frame encryption using mTLS.

Supply Chain Security

  1. Minimize the size of the base image
  2. Protect your supply chain: whitelist authorized registrations, sign and verify images
  3. Leverage static analysis of custom workloads (e.g. Kubernetes resources, Docker files)
  4. Scan images for known vulnerabilities

Monitoring, logging and execution security

  1. Perform behavioral analysis of host- and container-level process activity and system call files to identify malicious activity.
  2. Identify threats to physical infrastructure, applications, networks, data, users and workloads.
  3. Detect all stages of an attack, no matter where it occurs or how it spreads.
  4. Conduct in-depth analytical research and identify intruders in the environment.
  5. Ensure containers are immutable at runtime.
  6. Use audit logs to control access

What you will learn in the Certified Kubernetes Security Specialist Masterclass

  • Use network security policies to restrict access at the cluster level.

  • Use the CIS test to test the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi).

  • Properly configure Ingress objects with security controls.

  • Protect node metadata and endpoints

  • Minimize use and access to GUI elements.

  • Check platform binaries before deployment

  • Restrict access to Kubernetes API

  • Use role-based access control to minimize risk.

  • Be careful when using service accounts, such as disabling default settings, keeping newly created permissions to a minimum.

  • Update Kubernetes regularly

  • Minimize the impact of the host operating system (reduce attack surface)

  • Minimize access to the external network

  • Properly use 49 essential security tools such as AppArmor and seccomp.

  • Set appropriate security domains at the operating system level.

  • Manage Kubernetes secrets

  • Using container runtime containers in multi-tenant environments (e.g. gvisor, kata containers)

  • Implementation of inter-frame encryption using mTLS.

  • Minimize the size of the base image

  • Protect your supply chain: whitelist authorized registrations, sign and verify images

  • Using static analysis of user loads (Kubernetes resources, Docker files)

  • Scan images for known vulnerabilities

  • Perform behavioral analysis of host- and container-level process activity and system call files to identify malicious activity.

  • Identify threats to physical infrastructure, applications, networks, data, users and workloads.

  • Detect all stages of an attack, no matter where it occurs or how it spreads.

  • Conduct in-depth analytical research and identify intruders in the environment.

  • Ensure containers are immutable at runtime.

  • Use audit logs to control access

This course is suitable for people who

  • Anyone who wants to learn about Kubernetes security or wants to take the CKS exam.

Characteristics of the master class “Certified Kubernetes Security Specialist”

  • Publisher: Udemy
  • Lecturer: Deepak Dubey
  • Level of training: from beginner to advanced
  • Duration of training: 9 hours 22 minutes
  • Number of courses: 49

Course headings

Master class from a certified Kubernetes security specialist

Prerequisites for the Certified Kubernetes Security Professional workshop

  • Must know Kubernetes basics
  • Must have some experience with Kubernetes.
  • Ideally a CKA or CKAD certificate as this is also a prerequisite for the CKS exam.

course images

Master class from a certified Kubernetes security specialist

Example video course

installation instructions

Once extracted, watch using your favorite player.

Subtitles: No

Quality: 720p

Download link

Download part 1 – 1 GB

Download part 2 – 1 GB

Download part 3 – 1 GB

Download part 4 – 1 GB

Download part 5 – 273 MB

Password for file(s): www.downloadly.ir

size

4.2 GB

free download software latest version