• Post category:StudyBullet-17
  • Reading time:8 mins read

Certified Kubernetes Security Specialist (CKS)
Prepare for the Certified Kubernetes Security Specialist (CKS) exam.

What you will learn

Certified Kubernetes Security Specialist (CKS)

Ability to manage, configure, and use a secure Kubernetes environment

Knowledgeable Kubernetes Security Specialist and pass the CKS exam.

Understanding of Managing the K8s Cluster Security

Description

Certified Kubernetes Security Specialist (CKS) for 2022:
Certified Kubernetes Security Specialist (CKS) Complete Course – Learn CKS – Certified Kubernetes Administrator (CKA)

Want to learn about Kubernetes security or need to pass the Certified Kubernetes Security Specialist (CKS) exam? You are on the right page.

Before we proceed you should already have some Kubernetes Administrator knowledge before attending this course. And if you like to attend the real CKS exam you need to hold a valid CKA certification.

In this course we will be focusing more on doing practicals, so you make sure you have a running Kubernetes cluster. I will try to make concepts very clear and easy to understand so you don’t end up with any doubt. This course is focused on security. It deals with nearly all aspects of security within the context of a Kubernetes environment. That means securing not only the Kubernetes cluster itself but also the applications running within the cluster. You’ll learn how to secure many different components of Kubernetes applications and environments. We are going to cover every topic:


Get Instant Notification of New Courses on our Telegram channel.


  • Cluster Setup
  • Cluster Hardening
  • System Hardening
  • Minimize Microservice Vulnerabilities
  • Supply Chain Security
  • Monitoring, Logging, and Runtime Security

This course also has an exam preparation section with a series of practice tests to verify the candidate’s understanding of the topics discussed and verify if the candidate is ready to give the official certification exams.

Keeping the standards high similar to other best-seller courses of Zeal, this course has a perfect balance, and every topic is explained in a simplified way with practical scenarios.

With tons of practicals, easy-to-understand videos, and a dedicated exam preparation section, this course is all you need to gain a deeper understanding of Kubernetes and ace the official Certified Kubernetes Security Specialist” certification.

With this exciting set of learnings and practicals, I look forward to seeing you in this course and be part of your journey into Kubernetes and getting CKS certified.

English
language

Content

Certified Kubernetes Security Specialist (CKS) Introduction

Introduction to the Course
About the Certified Kubernetes Security Specialist (CKS) Exam
Official Certified Kubernetes Security Specialist Exam Curriculum
Download Course Source Code From GIT
Kubernetes Installation Type and Playground Cluster
Install Kubernetes HardWay using Kubeadm
$100 Digital Ocean Referral Link
SetUp K8s HA Cluster HardWay
My Motivating Factor!
Commands : SetUp K8s HA Cluster (Updated)
Kubernetes Security Overview

Cluster Setup (10%)

Cluster SetUp Intro
Download Course Source Code From GIT
Restricting Default Access with NetworkPolicies
Demo : Restricting Default Access with NetworkPolicies
Allowing Limited Access with NetworkPolicies
Demo : Allowing Limited Access with NetworkPolicies
Assignment : Lock Inter-Pod Communication
Assignment Sol : Lock Inter-Pod Communication
Running a CIS Benchmark with Kube-Bench
Demo : Running a CIS Benchmark with Kube-Bench
Fixing Security Issues Detected by a CIS Benchmark
Implementing TLS with Ingress
Demo : Implementing TLS with Ingress
Securing Node Endpoints
Securing GUI Elements
Verifying Kubernetes Platform Binaries
QUIZ: Cluster Setup

Cluster Hardening (15%)

Download Course Source Code From GIT
Exploring Service Accounts
Restricting Service Account Permissions
Restricting Service Account Permissions II
Restricting Access to the Kubernetes API
Keeping k8s Updated
Cluster Hardening

System Hardening (15%)

System Hardening Intro
Understanding Host OS Security Concerns
Minimizing IAM Roles
Exploring Network-Level Security
Exploring AppArmor
Using AppArmor in k8s Containers
System Hardening

Minimize Microservice Vulnerabilities (20%)

Minimizing Microservice Vulnerabilities Intro
Managing Container Access with Security Contexts
Governing Pod Configurations with Pod Security Policies
Using Pod Security Policies
Using OPA Gatekeeper
Demo : OPA Gatekeeper
Secrets in Kubernetes
Secrets in Kubernetes YAML Overview
Kubernetes Secrets and Pods
Demo : Kubernetes Secrets
Understanding Container Runtime Sandboxes
Creating a Container Runtime Sandbox
Understanding Pod-to-Pod mTLS
Signing Certificates
Minimizing Microservice Vulnerabilities

Supply Chain Security (20%)

Supply Chain Security Intro
Minimizing Base Image Attack Surface
Whitelisting Allowed Image Registries
Validating Signed Images
Analyzing a Dockerfile
Demo : Analyzing a Dockerfile
Analyzing Resource YAML Files
Scanning Images for Known Vulnerabilities
Scanning Images with an Admission Controller
Supply Chain Security

Monitoring, Logging, and Runtime Security (20%)

Monitoring, Logging, and Runtime Security Intro
Understanding Behavioral Analytics
Analyzing Container Behavior with Falco
Ensuring Containers are Immutable
Understanding Audit Logs
Setting up Audit Logging
Monitoring, Logging, and Runtime Security