Udemy – Certified Kubernetes Security Specialist Masterclass 2023-6

Udemy – Certified Kubernetes Security Specialist Masterclass 2023-6 Downloadly IRSpace

Udemy – Certified Kubernetes Security Specialist Masterclass 2023-6
Udemy – Certified Kubernetes Security Specialist Masterclass 2023-6

دوره Certified Kubernetes Security Specialist Masterclass.

Cluster setup

  1. Use network security policies to restrict access at the cluster level
  2. Use the CIS benchmark to check the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi).
  3. Configure Ingress objects with security controls properly
  4. Protect metadata and node endpoints
  5. Minimize the use and access to GUI elements
  6. Check platform binaries before deploying

Increased cluster security

  1. Restrict access to the Kubernetes API
  2. Use role-based access controls to minimize exposure
  3. Use caution when using service accounts, eg disable defaults, minimize newly created permissions.
  4. Update Kubernetes regularly

Increase system security

  1. Minimizing the footprint of the host operating system (reducing the attack surface)
  2. Minimize IAM roles
  3. Minimize external network access
  4. Use kernel security enhancement tools like AppArmor, seccomp properly

Minimize Microservice Vulnerabilities

  1. Set the appropriate security domains at the operating system level
  2. Manage Kubernetes secrets
  3. Using container runtime sandtime boxes in multi-tenant environments (eg gvisor, kata containers)
  4. Implement pod-to-pod encryption using mTLS

Supply Chain Security

  1. Minimize Base Image footprint
  2. Secure your supply chain: Whitelist authorized registrations, sign and verify images
  3. Using static analysis of user workloads (e.g. Kubernetes resources, Docker files)
  4. Scan images for known vulnerabilities

Monitoring, Logging and Runtime Security

  1. Conduct behavioral analysis of process and syscall file activities at the host and container level to identify malicious activities
  2. Identify threats to physical infrastructure, applications, networks, data, users, and workloads
  3. Detect all stages of an attack regardless of where it occurs and how it spreads
  4. Conduct in-depth analytical research and identify bad actors in the environment
  5. Ensure immutability of containers at runtime
  6. Use audit logs to monitor access

What you will learn in the Certified Kubernetes Security Specialist Masterclass course

  • Use network security policies to restrict access at the cluster level
  • Use the CIS benchmark to check the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi).
  • Configure Ingress objects with security controls properly
  • Protect metadata and node endpoints
  • Minimize the use and access to GUI elements
  • Check platform binaries before deploying
  • Restrict access to the Kubernetes API
  • Use role-based access controls to minimize exposure
  • Use caution when using service accounts, eg disable defaults, minimize newly created permissions.
  • Update Kubernetes regularly
  • Minimizing the footprint of the host operating system (reducing the attack surface)
  • Minimize IAM roles
  • Minimize external network access
  • Use 49 core security enhancement tools like AppArmor, seccomp properly
  • Set the appropriate security domains at the operating system level
  • Manage Kubernetes secrets
  • Using container runtime sandtime boxes in multi-tenant environments (eg gvisor, kata containers)
  • Implement pod-to-pod encryption using mTLS
  • Minimize the footprint of the base image
  • Secure your supply chain: Whitelist authorized registrations, sign and verify images
  • Using static analysis of user workloads (Kubernetes resources, Docker files)
  • Scan images for known vulnerabilities
  • Conduct behavioral analysis of process and syscall file activities at the host and container level to identify malicious activities
  • Identify threats to physical infrastructure, applications, networks, data, users, and workloads
  • Detect all stages of an attack regardless of where it occurs and how it spreads
  • Conduct in-depth analytical research and identify bad actors in the environment
  • Ensure immutability of containers at runtime
  • Use audit logs to monitor access

This course is suitable for people who

  • Anyone who wants to learn about Kubernetes security or wants to pass the CKS exam

Specifications of the Certified Kubernetes Security Specialist Masterclass course

  • Publisher:  Udemy
  • Lecturer: Deepak Dubey
  • Training level: beginner to advanced
  • Training duration: 9 hours and 22 minutes
  • Number of courses: 49

Course headings

 Certified Kubernetes Security Specialist Masterclass

Prerequisites of the Certified Kubernetes Security Specialist Masterclass course

  • Must know the basics of Kubernetes
  • Must have some hands on experience of Kubernetes
  • Ideally CKA or CKAD certified as that is also a prerequisite to take the CKS Exam

Course images

Certified Kubernetes Security Specialist Masterclass

Sample video of the course

Installation guide

After Extract, view with your favorite Player.

Subtitle: None

Quality: 720p

download link

Download part 1 – 1 GB

Download part 2 – 1 GB

Download part 3 – 1 GB

Download part 4 – 1 GB

Download part 5 – 273 MB

File(s) password: www.downloadly.ir

Size

4.2 GB