Certified Kubernetes Security Specialist (CKS) for 2022:
Certified Kubernetes Security Specialist (CKS) Complete Course – Learn CKS – Certified Kubernetes Administrator (CKA)
Want to learn about Kubernetes security or need to pass the Certified Kubernetes Security Specialist (CKS) exam? You are on the right page.
Before we proceed you should already have some Kubernetes Administrator knowledge before attending this course. And if you like to attend the real CKS exam you need to hold a valid CKA certification.
In this course we will be focusing more on doing practicals, so you make sure you have a running Kubernetes cluster. I will try to make concepts very clear and easy to understand so you don’t end up with any doubt. This course is focused on security. It deals with nearly all aspects of security within the context of a Kubernetes environment. That means securing not only the Kubernetes cluster itself but also the applications running within the cluster. You’ll learn how to secure many different components of Kubernetes applications and environments. We are going to cover every topic:
-
Cluster Setup
-
Cluster Hardening
-
System Hardening
-
Minimize Microservice Vulnerabilities
-
Supply Chain Security
-
Monitoring, Logging, and Runtime Security
This course also has an exam preparation section with a series of practice tests to verify the candidate’s understanding of the topics discussed and verify if the candidate is ready to give the official certification exams.
Keeping the standards high similar to other best-seller courses of Zeal, this course has a perfect balance, and every topic is explained in a simplified way with practical scenarios.
With tons of practicals, easy-to-understand videos, and a dedicated exam preparation section, this course is all you need to gain a deeper understanding of Kubernetes and ace the official Certified Kubernetes Security Specialist” certification.
With this exciting set of learnings and practicals, I look forward to seeing you in this course and be part of your journey into Kubernetes and getting CKS certified.
Cluster Setup (10%)
-
1Introduction to the Course
-
2About the Certified Kubernetes Security Specialist (CKS) Exam
-
3Official Certified Kubernetes Security Specialist Exam Curriculum
-
4Download Course Source Code From GIT
-
5Course Chat with Students and Tech Community
-
6Kubernetes Installation Type and Playground Cluster
-
7Install Kubernetes HardWay using Kubeadm
-
8$200 Digital Ocean Referral Link
-
9SetUp K8s HA Cluster HardWay
-
10My Motivating Factor!
-
11Commands : SetUp K8s HA Cluster (Updated)
-
12Kubernetes Security Overview
Cluster Hardening (15%)
-
13Cluster SetUp Intro
-
14Download Course Source Code From GIT
-
15Restricting Default Access with NetworkPolicies
-
16Demo : Restricting Default Access with NetworkPolicies
-
17Allowing Limited Access with NetworkPolicies
-
18Demo : Allowing Limited Access with NetworkPolicies
-
19Assignment : Lock Inter-Pod Communication
-
20Assignment Sol : Lock Inter-Pod Communication
-
21Running a CIS Benchmark with Kube-Bench
-
22Demo : Running a CIS Benchmark with Kube-Bench
-
23Fixing Security Issues Detected by a CIS Benchmark
-
24Implementing TLS with Ingress
-
25Demo : Implementing TLS with Ingress
-
26Securing Node Endpoints
-
27Securing GUI Elements
-
28Verifying Kubernetes Platform Binaries
-
29QUIZ: Cluster Setup
System Hardening (15%)
Minimize Microservice Vulnerabilities (20%)
Supply Chain Security (20%)
-
44Minimizing Microservice Vulnerabilities Intro
-
45Managing Container Access with Security Contexts
-
46Governing Pod Configurations with Pod Security Policies
-
47Using Pod Security Policies
-
48Using OPA Gatekeeper
-
49Demo : OPA Gatekeeper
-
50Secrets in Kubernetes
-
51Secrets in Kubernetes YAML Overview
-
52Kubernetes Secrets and Pods
-
53Demo : Kubernetes Secrets
-
54Understanding Container Runtime Sandboxes
-
55Creating a Container Runtime Sandbox
-
56Understanding Pod-to-Pod mTLS
-
57Signing Certificates
-
58Minimizing Microservice Vulnerabilities
Monitoring, Logging, and Runtime Security (20%)
-
59Supply Chain Security Intro
-
60Minimizing Base Image Attack Surface
-
61Whitelisting Allowed Image Registries
-
62Validating Signed Images
-
63Analyzing a Dockerfile
-
64Demo : Analyzing a Dockerfile
-
65Analyzing Resource YAML Files
-
66Scanning Images for Known Vulnerabilities
-
67Scanning Images with an Admission Controller
-
68Supply Chain Security