Description
Kubernetes Certified Security Professional course. Master Class.
Cluster setup
- Use network security policies to restrict access at the cluster level.
- Use the CIS test to test the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi).
- Properly configure Ingress objects with security controls.
- Protect node metadata and endpoints
- Minimize use and access to GUI elements.
- Check platform binaries before deployment
Increased cluster security
- Restrict access to Kubernetes API
- Use role-based access control to minimize risk.
- Be careful when using service accounts, such as disabling default settings, keeping newly created permissions to a minimum.
- Update Kubernetes regularly
Improving system security
- Minimize the impact of the host operating system (reduce attack surface)
- Minimize IAM roles
- Minimize access to the external network
- Correctly use kernel security tools such as AppArmor, seccomp.
Minimize microservice vulnerabilities
- Set appropriate security domains at the operating system level.
- Manage Kubernetes secrets
- Using container runtime containers in multi-tenant environments (e.g. gvisor, kata containers)
- Implementation of inter-frame encryption using mTLS.
Supply Chain Security
- Minimize the size of the base image
- Protect your supply chain: whitelist authorized registrations, sign and verify images
- Leverage static analysis of custom workloads (e.g. Kubernetes resources, Docker files)
- Scan images for known vulnerabilities
Monitoring, logging and execution security
- Perform behavioral analysis of host- and container-level process activity and system call files to identify malicious activity.
- Identify threats to physical infrastructure, applications, networks, data, users and workloads.
- Detect all stages of an attack, no matter where it occurs or how it spreads.
- Conduct in-depth analytical research and identify intruders in the environment.
- Ensure containers are immutable at runtime.
- Use audit logs to control access
What you will learn in the Certified Kubernetes Security Specialist Masterclass
-
Use network security policies to restrict access at the cluster level.
-
Use the CIS test to test the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi).
-
Properly configure Ingress objects with security controls.
-
Protect node metadata and endpoints
-
Minimize use and access to GUI elements.
-
Check platform binaries before deployment
-
Restrict access to Kubernetes API
-
Use role-based access control to minimize risk.
-
Be careful when using service accounts, such as disabling default settings, keeping newly created permissions to a minimum.
-
Update Kubernetes regularly
-
Minimize the impact of the host operating system (reduce attack surface)
-
Minimize access to the external network
-
Properly use 49 essential security tools such as AppArmor and seccomp.
-
Set appropriate security domains at the operating system level.
-
Manage Kubernetes secrets
-
Using container runtime containers in multi-tenant environments (e.g. gvisor, kata containers)
-
Implementation of inter-frame encryption using mTLS.
-
Minimize the size of the base image
-
Protect your supply chain: whitelist authorized registrations, sign and verify images
-
Using static analysis of user loads (Kubernetes resources, Docker files)
-
Scan images for known vulnerabilities
-
Perform behavioral analysis of host- and container-level process activity and system call files to identify malicious activity.
-
Identify threats to physical infrastructure, applications, networks, data, users and workloads.
-
Detect all stages of an attack, no matter where it occurs or how it spreads.
-
Conduct in-depth analytical research and identify intruders in the environment.
-
Ensure containers are immutable at runtime.
-
Use audit logs to control access
This course is suitable for people who
- Anyone who wants to learn about Kubernetes security or wants to take the CKS exam.
Characteristics of the master class “Certified Kubernetes Security Specialist”
- Publisher: Udemy
- Lecturer: Deepak Dubey
- Level of training: from beginner to advanced
- Duration of training: 9 hours 22 minutes
- Number of courses: 49
Course headings
Prerequisites for the Certified Kubernetes Security Professional workshop
- Must know Kubernetes basics
- Must have some experience with Kubernetes.
- Ideally a CKA or CKAD certificate as this is also a prerequisite for the CKS exam.
course images
Example video course
installation instructions
Once extracted, watch using your favorite player.
Subtitles: No
Quality: 720p
Download link
Password for file(s): www.downloadly.ir
size
4.2 GB