Certified Kubernetes Security Specialist (CKS)
- Description
- Curriculum
- FAQ
- Reviews
Certified Kubernetes Security Specialist (CKS) for 2022:
Certified Kubernetes Security Specialist (CKS) Complete Course – Learn CKS – Certified Kubernetes Administrator (CKA)
Want to learn about Kubernetes security or need to pass the Certified Kubernetes Security Specialist (CKS) exam? You are on the right page.
Before we proceed you should already have some Kubernetes Administrator knowledge before attending this course. And if you like to attend the real CKS exam you need to hold a valid CKA certification.
In this course we will be focusing more on doing practicals, so you make sure you have a running Kubernetes cluster. I will try to make concepts very clear and easy to understand so you don’t end up with any doubt. This course is focused on security. It deals with nearly all aspects of security within the context of a Kubernetes environment. That means securing not only the Kubernetes cluster itself but also the applications running within the cluster. You’ll learn how to secure many different components of Kubernetes applications and environments. We are going to cover every topic:
-
Cluster Setup
-
Cluster Hardening
-
System Hardening
-
Minimize Microservice Vulnerabilities
-
Supply Chain Security
-
Monitoring, Logging, and Runtime Security
This course also has an exam preparation section with a series of practice tests to verify the candidate’s understanding of the topics discussed and verify if the candidate is ready to give the official certification exams.
Keeping the standards high similar to other best-seller courses of Zeal, this course has a perfect balance, and every topic is explained in a simplified way with practical scenarios.
With tons of practicals, easy-to-understand videos, and a dedicated exam preparation section, this course is all you need to gain a deeper understanding of Kubernetes and ace the official Certified Kubernetes Security Specialist” certification.
With this exciting set of learnings and practicals, I look forward to seeing you in this course and be part of your journey into Kubernetes and getting CKS certified.
-
1Introduction to the CourseVideo lesson
-
2About the Certified Kubernetes Security Specialist (CKS) ExamVideo lesson
-
3Official Certified Kubernetes Security Specialist Exam CurriculumVideo lesson
-
4Download Course Source Code From GITText lesson
-
5Course Chat with Students and Tech CommunityText lesson
-
6Kubernetes Installation Type and Playground ClusterVideo lesson
-
7Install Kubernetes HardWay using KubeadmVideo lesson
-
8$200 Digital Ocean Referral LinkText lesson
-
9SetUp K8s HA Cluster HardWayVideo lesson
-
10My Motivating Factor!Text lesson
-
11Commands : SetUp K8s HA Cluster (Updated)Text lesson
-
12Kubernetes Security OverviewVideo lesson
-
13Cluster SetUp IntroVideo lesson
-
14Download Course Source Code From GITText lesson
-
15Restricting Default Access with NetworkPoliciesVideo lesson
-
16Demo : Restricting Default Access with NetworkPoliciesVideo lesson
-
17Allowing Limited Access with NetworkPoliciesVideo lesson
-
18Demo : Allowing Limited Access with NetworkPoliciesVideo lesson
-
19Assignment : Lock Inter-Pod CommunicationVideo lesson
-
20Assignment Sol : Lock Inter-Pod CommunicationVideo lesson
-
21Running a CIS Benchmark with Kube-BenchVideo lesson
-
22Demo : Running a CIS Benchmark with Kube-BenchVideo lesson
-
23Fixing Security Issues Detected by a CIS BenchmarkVideo lesson
-
24Implementing TLS with IngressVideo lesson
-
25Demo : Implementing TLS with IngressVideo lesson
-
26Securing Node EndpointsVideo lesson
-
27Securing GUI ElementsVideo lesson
-
28Verifying Kubernetes Platform BinariesVideo lesson
-
29QUIZ: Cluster SetupQuiz
-
30Download Course Source Code From GITText lesson
-
31Exploring Service AccountsVideo lesson
-
32Restricting Service Account PermissionsVideo lesson
-
33Restricting Service Account Permissions IIVideo lesson
-
34Restricting Access to the Kubernetes APIVideo lesson
-
35Keeping k8s UpdatedVideo lesson
-
36Cluster HardeningQuiz
-
44Minimizing Microservice Vulnerabilities IntroVideo lesson
-
45Managing Container Access with Security ContextsVideo lesson
-
46Governing Pod Configurations with Pod Security PoliciesVideo lesson
-
47Using Pod Security PoliciesVideo lesson
-
48Using OPA GatekeeperVideo lesson
-
49Demo : OPA GatekeeperVideo lesson
-
50Secrets in KubernetesVideo lesson
-
51Secrets in Kubernetes YAML OverviewVideo lesson
-
52Kubernetes Secrets and PodsVideo lesson
-
53Demo : Kubernetes SecretsVideo lesson
-
54Understanding Container Runtime SandboxesVideo lesson
-
55Creating a Container Runtime SandboxVideo lesson
-
56Understanding Pod-to-Pod mTLSVideo lesson
-
57Signing CertificatesVideo lesson
-
58Minimizing Microservice VulnerabilitiesQuiz
-
59Supply Chain Security IntroVideo lesson
-
60Minimizing Base Image Attack SurfaceVideo lesson
-
61Whitelisting Allowed Image RegistriesVideo lesson
-
62Validating Signed ImagesVideo lesson
-
63Analyzing a DockerfileVideo lesson
-
64Demo : Analyzing a DockerfileVideo lesson
-
65Analyzing Resource YAML FilesVideo lesson
-
66Scanning Images for Known VulnerabilitiesVideo lesson
-
67Scanning Images with an Admission ControllerVideo lesson
-
68Supply Chain SecurityQuiz
External Links May Contain Affiliate Links read more