English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 19h 38m | 4.36 GB
Master essential Kubernetes security concepts for the CKS exam through hands-on demos, real-world scenarios, and expert insights.
- Prepare to pass the Certified Kubernetes Security Specialist (CKS) exam
- Set up a Kubernetes cluster using secure practices
- Apply security controls to service accounts
- Protect node meta-data and endpoints
Get ready for the Certified Kubernetes Security Specialist (CKS) exam! In this video training course, author and trainer Chris Jackson will provide in depth discussion of exam concepts, objectives, and demonstrate key topics so you get the edge you need to successfully study for and pass the test. This 21-hour course follows the CKS blueprint domains and includes not only demonstrations of the technology throughout but also hands-exercises so you can practice and apply the skills. These hands-on exercises were built in a similar fashion to the actual exam so you can feel confident on test day.
CKS is a performance-based test that requires candidates to solve multiple tasks from a command line running Kubernetes. Chris Jackson has designed this class to walk you through Kubernetes topics like secure cluster setup, role-based access control, API security, system hardening, and network security. To further increase your practical skills, you will learn how to build your own Kubernetes lab for further study and discovery as you continue your journey. With an easy to understand and engaging style this video series can be your complete path to preparation and success achieving CKS certification.
Table of Contents
Module 1: Preparing for the CKS Exam
Lesson 1: Getting CKS Certified
Lesson 2: Building Your K8s Home Lab
Lesson 3: Kubernetes Security Foundation
Module 2: Kubernetes Cluster Setup
Lesson 4: Network Security Policies
Lesson 5: CIS Benchmark Review of Kubernetes Components
Lesson 6: Properly Setup Ingress with TLS
Lesson 7: Protect Node Metadata and Endpoints
Lesson 8: Kubernetes Dashboard Security
Lesson 9: Verify Platform Binaries Before Deploying
Module 3: Cluster Hardening
Lesson 10: Restrict Access to Kubernetes API
Lesson 11: Role Based Access Control (RBAC)
Lesson 12: Protecting Service Accounts
Lesson 13: Upgrade Kubernetes to Avoid Vulnerabilities
Module 4: System Hardening
Lesson 14: Minimize Host OS Footprint
Lesson 15: Minimize External Access to the Network
Lesson 16: Kernel Hardening
Lesson 17: Use Least Privilege IAM
Module 5: Minimize Microservice Vulnerabilities
Lesson 18: Use Appropriate Pod Security Standards
Lesson 19: Managing Kubernetes Secrets
Lesson 20: Implement Container Isolation Techniques
Lesson 21: Implement Pod-to-Pod Encryption with Cilium
Module 6: Software Supply Chain Security
Lesson 22: Secure Your Software Supply Chain
Lesson 23: Static Analysis of Workloads and Containers
Lesson 24: Minimize Base Image Footprint
Lesson 25: Scan Images for Known Vulnerabilities
Module 7: Monitoring, Logging, and Runtime Security
Lesson 26: Ensure Immutability of Containers at Runtime
Lesson 27: Use Kubernetes Audit Logs to Monitor Access
Lesson 28: Detect Malicious Activity, Threats, and Attacks
Lesson 29: Investigate and Identify Signs of Compromise
Module 8: Exam Practice Scenarios
Lesson 30: CKS Practice Exam 1
Lesson 31: CKS Practice Exam 2
Resolve the captcha to access the links!