Kubernetes Security Basics (Video Course)

Kubernetes Security Basics (Video Course)

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 2h 58m | 674 MB

Gain practical skills to secure Kubernetes clusters and applications effectively through hands-on instruction and real-world insights.

Kubernetes Security Basics equips you with essential knowledge and practical expertise to confidently secure Kubernetes environments. Led by Cisco Distinguished Solutions Engineer Chris Jackson, this course takes a hands-on approach to Kubernetes security, covering foundational concepts, securing clusters, implementing robust access controls, and verifying platform integrity. Youll begin by building your own Kubernetes lab environment, enabling real-world experimentation and learning.

Throughout the lessons, you’ll be introduced to critical security practices, including Kubernetes Security Foundation, understanding CIS Benchmarks for Kubernetes components, configuring Role-Based Access Control (RBAC), protecting service accounts, and verifying platform binaries prior to deployment. Each lesson is designed to reinforce skills through practical demonstrations and real-world scenarios, ensuring you’re ready to apply best practices immediately.

Ideal for Kubernetes practitioners seeking to enhance security skills or prepare for the Certified Kubernetes Security Specialist (CKS) exam, this course provides a solid foundation in managing security within Kubernetes infrastructures.

Table of Contents

Introduction
1 Kubernetes Security Basics Introduction

Lesson 1 Building Your K8s Home Lab
2 Learning objectives
3 Lab Environment and Architecture
4 Local Installation
5 Cloud Installation
6 Your Cluster Up and Running

Lesson 2 Kubernetes Security Foundation
7 Learning objectives
8 Cloud Native Security
9 Kubernetes Architecture
10 Kubernetes PKI Architecture
11 Threat Modeling K8s
12 Real World K8s Hacks
13 OWASP Kubernetes Top 10

Lesson 3 CIS Benchmark Review of Kubernetes Components
14 Learning objectives
15 CIS Benchmarks for Kubernetes
16 Install Kube-bench
17 Checking Compliance with Kube-bench

Lesson 4 Role Based Access Control (RBAC)
18 Learning objectives
19 Understanding Kubernetes RBAC
20 Creating a User Account
21 Applying Roles to a User
22 Configuring and Binding Cluster Roles
23 Verifying Role Rules

Lesson 5 Protecting Service Accounts
24 Learning objectives
25 Understanding Service Accounts
26 Creating a Service Account
27 Disable Default Settings
28 Verify Service Account Permissions

Lesson 6 Verify Platform Binaries Before Deploying
29 Learning objectives
30 Understanding Platform Binary Integrity
31 Download the Latest Kubernetes Release
32 Verify Binary Checksum

Summary
33 Kubernetes Security Basics Summary

Homepage