Book Image

Certified Kubernetes Security Specialist (CKS) Course [Video]

By : Himanshu Sharma
Book Image

Certified Kubernetes Security Specialist (CKS) Course [Video]

By: Himanshu Sharma

Overview of this book

This Kubernetes Security Specialist course provides foundational knowledge using concepts and hands-on demonstrations of the Kubernetes Cluster. In this course, we will be focusing more on the practical side, so make sure you have a running Kubernetes cluster. This course is focused on security. It deals with all aspects of security within the context of a Kubernetes environment. That means securing not only the Kubernetes cluster itself but also the applications running within the cluster. You will learn how to secure many different components of Kubernetes applications and environments. We are going to cover every topic such as cluster setup, creating an ingress, and securing an ingress. You will also learn cluster hardening, which includes RBAC, role, and role binding for a user. Further, you will learn system hardening, kernel hardening, minimizing microservice vulnerabilities, supply chain security, monitoring, logging, and runtime security. By the end of this Kubernetes course, you will gain in-depth knowledge about Kubernetes and be a Kubernetes security specialist. All resources and code files are placed here: https://github.com/PacktPublishing/A-Certified-Kubernetes-Security-Specialist-CKS-Course
Table of Contents (25 chapters)
Free Chapter
1
Become a Certified Kubernetes Security Specialist (CKS)
4
Cluster Setup – Minimize Use of and Access to GUI Elements
5
Cluster Setup – Properly Set Up Ingress Objects with Security Control
7
Use CIS Benchmark to Review the Security Configuration of Kubernetes Components
13
Microservice Vulnerabilities – Manage Kubernetes Secrets
16
Microservices Vulnerabilities – mTLS
18
Supply Chain Security – Image Footprint
20
Supply Chain Security – Image Vulnerability Scanning
21
Supply Chain Security – Secure Supply Chain
23
Runtime Security – Immutability of Containers at Runtime
Chapter 6
Protect Node Metadata and Endpoints
Content Locked
Section 1
Accessing Node Metadata
This video explains accessing node metadata.