Companies Home Search Profile

Certified Kubernetes Security Specialist (CKS)

Focused View

Chris Behrens

6:11:01

49 View
  • 001 Course Introduction.mp4
    03:03
  • 001 Study Guide PDF.pdf
  • 002 About the Exam.mp4
    08:14
  • 002 CKS Study Guide.pdf
  • 003 CKS Exam Updates 1.20.mp4
    02:21
  • 004 Building a Kubernetes Cluster.mp4
    11:45
  • 004 Creating a cluster with kubeadm.txt
  • 004 Installing kubeadm.txt
  • 004 Lesson Reference.pdf
  • 005 Kubernetes Security Overview.mp4
    05:57
  • 001 Cluster Setup Intro.mp4
    01:37
  • 002 Lesson Reference.pdf
  • 002 Network Policies.txt
  • 002 Restricting Default Access with NetworkPolicies.mp4
    10:51
  • 003 Allowing Limited Access with NetworkPolicies.mp4
    11:24
  • 003 Lesson Reference.pdf
  • 003 Network Policies.txt
  • 005 CIS Kubernetes Benchmark.txt
  • 005 Lesson Reference.pdf
  • 005 Running a CIS Benchmark with kube-bench.mp4
    08:20
  • 005 kube-bench.txt
  • 006 CIS Kubernetes Benchmark.txt
  • 006 Fixing Security Issues Detected by a CIS Benchmark.mp4
    09:29
  • 006 Lesson Reference.pdf
  • 006 kube-bench.txt
  • 008 Implementing TLS with Ingress.mp4
    10:16
  • 008 Ingress - TLS.txt
  • 008 Lesson Reference.pdf
  • 010 Securing Node Endpoints.mp4
    05:04
  • 010 kubeadm - Required Ports.txt
  • 011 Securing GUI Elements.mp4
    02:42
  • 011 Web UI (Dashboard).txt
  • 012 Install kubectl binary with curl on Linux.txt
  • 012 Lesson Reference.pdf
  • 012 Verifying Kubernetes Platform Binaries.mp4
    07:45
  • 014 Cluster Setup Review.mp4
    04:31
  • 001 Cluster Hardening Intro.mp4
    00:55
  • 002 Configure Service Accounts for Pods.txt
  • 002 Exploring Service Accounts.mp4
    05:04
  • 002 Managing Service Accounts.txt
  • 002 Using RBAC Authorization.txt
  • 003 Configure Service Accounts for Pods.txt
  • 003 Lesson Reference.pdf
  • 003 Managing Service Accounts.txt
  • 003 Restricting Service Account Permissions.mp4
    12:28
  • 003 Setup Manifest.txt
  • 003 Using RBAC Authorization.txt
  • 003 deployment-viewer-pod Manifest.txt
  • 003 pod-viewer-pod Manifest.txt
  • 005 Controlling Access to the Kubernetes API.txt
  • 005 Restricting Access to the Kubernetes API.mp4
    03:39
  • 006 Keeping k8s Updated.mp4
    04:31
  • 006 Kubernetes version and version skew support policy.txt
  • 007 Cluster Hardening Review.mp4
    02:11
  • 001 System Hardening Intro.mp4
    00:55
  • 002 Kubernetes API Reference - PodSpec.txt
  • 002 Kubernetes API Reference - SecurityContext.txt
  • 002 Security Context.txt
  • 002 Understanding Host OS Security Concerns.mp4
    08:57
  • 003 AWs Docs - Security Best Practices in IAM.txt
  • 003 IAM Roles for Amazon EC2.html
  • 003 Minimizing IAM Roles.mp4
    04:55
  • 004 Cluster Networking.txt
  • 004 Exploring Network-Level Security.mp4
    03:30
  • 005 AppArmor Documentation.txt
  • 005 Exploring AppArmor.mp4
    04:31
  • 006 AppArmor Documentation.txt
  • 006 AppArmor in k8s.pdf
  • 006 Lesson Reference.pdf
  • 006 Using AppArmor in k8s Containers.mp4
    10:48
  • 008 System Hardening Review.mp4
    02:57
  • 001 Minimizing Microservice Vulnerabilities Intro.mp4
    01:28
  • 002 API Reference - Container Security Context.txt
  • 002 API Reference - Pod Security Context.txt
  • 002 Configure a Security Context for a Pod or Container.txt
  • 002 Lesson Reference.pdf
  • 002 Managing Container Access with Security Contexts.mp4
    05:51
  • 003 Governing Pod Configurations with Pod Security Policies.mp4
    07:58
  • 003 PodSecurityPolicy Admission Controller.txt
  • 003 PodSecurityPolicy Deprecation Past Present and Future.txt
  • 003 Pod Security Policies.txt
  • 004 Lesson Reference.pdf
  • 004 PodSecurityPolicy Admission Controller.txt
  • 004 Pod Security Policies.txt
  • 004 Using Pod Security Policies.mp4
    14:58
  • 006 Lesson Reference.pdf
  • 006 OPA Gatekeeper Docs.txt
  • 006 Using OPA Gatekeeper.mp4
    11:43
  • 007 Lesson Reference.pdf
  • 007 Managing Kubernetes Secrets.mp4
    11:13
  • 007 Secrets.txt
  • 009 Kata Containers Docs.txt
  • 009 Runtime Class.txt
  • 009 Understanding Container Runtime Sandboxes.mp4
    05:22
  • 009 gVisor Docs.txt
  • 010 Creating a Container Runtime Sandbox.mp4
    09:58
  • 010 Lesson Reference.pdf
  • 010 Runtime Class.txt
  • 010 gVisor Docs.txt
  • 012 Manage TLS Certificates in a Cluster.txt
  • 012 Mutual Authentication (Wikipedia).txt
  • 012 Understanding Pod-to-Pod mTLS.mp4
    03:49
  • 013 Lesson Reference.pdf
  • 013 Manage TLS Certificates in a Cluster.txt
  • 013 Signing Certificates.mp4
    08:07
  • 014 Minimizing Microservice Vulnerabilities Review.mp4
    04:55
  • 001 Supply Chain Security Intro.mp4
    01:25
  • 002 Images.txt
  • 002 Minimizing Base Image Attack Surface.mp4
    04:23
  • 002 Overview of Cloud Native Security.txt
  • 003 Blog OPA Gatekeeper.txt
  • 003 Lesson Reference.pdf
  • 003 OPA Gatekeeper - GitHub.txt
  • 003 Whitelisting Allowed Image Registries.mp4
    07:27
  • 004 Busybox 1.33.txt
  • 004 Lesson Reference.pdf
  • 004 Validating Signed Images.mp4
    04:46
  • 005 Analyzing a Dockerfile.mp4
    07:45
  • 005 Dockerfile Reference.txt
  • 005 Lesson Reference.pdf
  • 005 Sample Dockerfile.txt
  • 007 Analyzing Resource YAML Files.mp4
    04:01
  • 007 Lesson Reference.pdf
  • 007 Overview of Cloud Native Security.txt
  • 007 Sample YAML File.txt
  • 009 Cloud Native Security - Container.txt
  • 009 Lesson Reference.pdf
  • 009 Scanning Images for Known Vulnerabilities.mp4
    08:06
  • 009 Trivy Documentation.txt
  • 011 Cloud Native Security - Container.txt
  • 011 ImagePolicyWebhook Admission Controller.txt
  • 011 Scanning Images with an Admission Controller.mp4
    04:29
  • 012 ImagePolicyWebhook Admission Controller.txt
  • 012 Lesson Reference.pdf
  • 012 Sample Webhook App Source Code.txt
  • 012 Setting up an Image Scanner.mp4
    08:03
  • 013 Configuring the ImagePolicyWebhook Admission Controller.mp4
    13:23
  • 013 ImagePolicyWebhook Admission Controller.txt
  • 013 Lesson Reference.pdf
  • 013 api-server-client.txt
  • 013 imagepolicywebhook-ca.txt
  • 015 Supply Chain Security Review.mp4
    05:26
  • 001 Monitoring Logging and Runtime Security Intro.mp4
    01:00
  • 002 Falco.txt
  • 002 Understanding Behavioral Analytics.mp4
    05:03
  • 003 Analyzing Container Behavior with Falco.mp4
    11:12
  • 003 Falco.txt
  • 003 Falco - formatting.txt
  • 003 Lesson Reference.pdf
  • 003 Sysdig.txt
  • 005 Container Security Context.txt
  • 005 Ensuring Containers are Immutable.mp4
    09:55
  • 005 Lesson Reference.pdf
  • 007 Auditing.txt
  • 007 Understanding Audit Logs.mp4
    04:39
  • 008 Auditing.txt
  • 008 Lesson Reference.pdf
  • 008 Policy Configuration Reference.txt
  • 008 Setting up Audit Logging.mp4
    09:47
  • 010 Monitoring Logging and Runtime Security Review.mp4
    03:48
  • 001 Course Summary.mp4
    01:27
  • 002 Conclusion and Whats Next.mp4
    00:54
  • Description


    Prepare for the Certified Kubernetes Security Specialist (CKS) exam.

    What You'll Learn?


      The Certified Kubernetes Security Specialist (CKS) exam is a way for you to demonstrate your ability to manage, configure, and use a secure Kubernetes environment. This course will cover all of the topics and practical, hands-on skills you will need to be familiar with in order to become a knowledgeable Kubernetes security specialist and pass the CKS exam.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Chris Behrens
    Chris Behrens
    Instructor's Courses
    A Cloud Guru is an online training platform for people interested in Information Technology. Most of the courses offered prepare students to take certification exams for the three major cloud providers.
    • language english
    • Training sessions 59
    • duration 6:11:01
    • Release Date 2023/12/10