Certified Kubernetes Security Specialist (CKS)
Focused View
Chris Behrens
6:11:01
49 View
001 Course Introduction.mp4
03:03
001 Study Guide PDF.pdf
002 About the Exam.mp4
08:14
002 CKS Study Guide.pdf
003 CKS Exam Updates 1.20.mp4
02:21
004 Building a Kubernetes Cluster.mp4
11:45
004 Creating a cluster with kubeadm.txt
004 Installing kubeadm.txt
004 Lesson Reference.pdf
005 Kubernetes Security Overview.mp4
05:57
001 Cluster Setup Intro.mp4
01:37
002 Lesson Reference.pdf
002 Network Policies.txt
002 Restricting Default Access with NetworkPolicies.mp4
10:51
003 Allowing Limited Access with NetworkPolicies.mp4
11:24
003 Lesson Reference.pdf
003 Network Policies.txt
005 CIS Kubernetes Benchmark.txt
005 Lesson Reference.pdf
005 Running a CIS Benchmark with kube-bench.mp4
08:20
005 kube-bench.txt
006 CIS Kubernetes Benchmark.txt
006 Fixing Security Issues Detected by a CIS Benchmark.mp4
09:29
006 Lesson Reference.pdf
006 kube-bench.txt
008 Implementing TLS with Ingress.mp4
10:16
008 Ingress - TLS.txt
008 Lesson Reference.pdf
010 Securing Node Endpoints.mp4
05:04
010 kubeadm - Required Ports.txt
011 Securing GUI Elements.mp4
02:42
011 Web UI (Dashboard).txt
012 Install kubectl binary with curl on Linux.txt
012 Lesson Reference.pdf
012 Verifying Kubernetes Platform Binaries.mp4
07:45
014 Cluster Setup Review.mp4
04:31
001 Cluster Hardening Intro.mp4
00:55
002 Configure Service Accounts for Pods.txt
002 Exploring Service Accounts.mp4
05:04
002 Managing Service Accounts.txt
002 Using RBAC Authorization.txt
003 Configure Service Accounts for Pods.txt
003 Lesson Reference.pdf
003 Managing Service Accounts.txt
003 Restricting Service Account Permissions.mp4
12:28
003 Setup Manifest.txt
003 Using RBAC Authorization.txt
003 deployment-viewer-pod Manifest.txt
003 pod-viewer-pod Manifest.txt
005 Controlling Access to the Kubernetes API.txt
005 Restricting Access to the Kubernetes API.mp4
03:39
006 Keeping k8s Updated.mp4
04:31
006 Kubernetes version and version skew support policy.txt
007 Cluster Hardening Review.mp4
02:11
001 System Hardening Intro.mp4
00:55
002 Kubernetes API Reference - PodSpec.txt
002 Kubernetes API Reference - SecurityContext.txt
002 Security Context.txt
002 Understanding Host OS Security Concerns.mp4
08:57
003 AWs Docs - Security Best Practices in IAM.txt
003 IAM Roles for Amazon EC2.html
003 Minimizing IAM Roles.mp4
04:55
004 Cluster Networking.txt
004 Exploring Network-Level Security.mp4
03:30
005 AppArmor Documentation.txt
005 Exploring AppArmor.mp4
04:31
006 AppArmor Documentation.txt
006 AppArmor in k8s.pdf
006 Lesson Reference.pdf
006 Using AppArmor in k8s Containers.mp4
10:48
008 System Hardening Review.mp4
02:57
001 Minimizing Microservice Vulnerabilities Intro.mp4
01:28
002 API Reference - Container Security Context.txt
002 API Reference - Pod Security Context.txt
002 Configure a Security Context for a Pod or Container.txt
002 Lesson Reference.pdf
002 Managing Container Access with Security Contexts.mp4
05:51
003 Governing Pod Configurations with Pod Security Policies.mp4
07:58
003 PodSecurityPolicy Admission Controller.txt
003 PodSecurityPolicy Deprecation Past Present and Future.txt
003 Pod Security Policies.txt
004 Lesson Reference.pdf
004 PodSecurityPolicy Admission Controller.txt
004 Pod Security Policies.txt
004 Using Pod Security Policies.mp4
14:58
006 Lesson Reference.pdf
006 OPA Gatekeeper Docs.txt
006 Using OPA Gatekeeper.mp4
11:43
007 Lesson Reference.pdf
007 Managing Kubernetes Secrets.mp4
11:13
007 Secrets.txt
009 Kata Containers Docs.txt
009 Runtime Class.txt
009 Understanding Container Runtime Sandboxes.mp4
05:22
009 gVisor Docs.txt
010 Creating a Container Runtime Sandbox.mp4
09:58
010 Lesson Reference.pdf
010 Runtime Class.txt
010 gVisor Docs.txt
012 Manage TLS Certificates in a Cluster.txt
012 Mutual Authentication (Wikipedia).txt
012 Understanding Pod-to-Pod mTLS.mp4
03:49
013 Lesson Reference.pdf
013 Manage TLS Certificates in a Cluster.txt
013 Signing Certificates.mp4
08:07
014 Minimizing Microservice Vulnerabilities Review.mp4
04:55
001 Supply Chain Security Intro.mp4
01:25
002 Images.txt
002 Minimizing Base Image Attack Surface.mp4
04:23
002 Overview of Cloud Native Security.txt
003 Blog OPA Gatekeeper.txt
003 Lesson Reference.pdf
003 OPA Gatekeeper - GitHub.txt
003 Whitelisting Allowed Image Registries.mp4
07:27
004 Busybox 1.33.txt
004 Lesson Reference.pdf
004 Validating Signed Images.mp4
04:46
005 Analyzing a Dockerfile.mp4
07:45
005 Dockerfile Reference.txt
005 Lesson Reference.pdf
005 Sample Dockerfile.txt
007 Analyzing Resource YAML Files.mp4
04:01
007 Lesson Reference.pdf
007 Overview of Cloud Native Security.txt
007 Sample YAML File.txt
009 Cloud Native Security - Container.txt
009 Lesson Reference.pdf
009 Scanning Images for Known Vulnerabilities.mp4
08:06
009 Trivy Documentation.txt
011 Cloud Native Security - Container.txt
011 ImagePolicyWebhook Admission Controller.txt
011 Scanning Images with an Admission Controller.mp4
04:29
012 ImagePolicyWebhook Admission Controller.txt
012 Lesson Reference.pdf
012 Sample Webhook App Source Code.txt
012 Setting up an Image Scanner.mp4
08:03
013 Configuring the ImagePolicyWebhook Admission Controller.mp4
13:23
013 ImagePolicyWebhook Admission Controller.txt
013 Lesson Reference.pdf
013 api-server-client.txt
013 imagepolicywebhook-ca.txt
015 Supply Chain Security Review.mp4
05:26
001 Monitoring Logging and Runtime Security Intro.mp4
01:00
002 Falco.txt
002 Understanding Behavioral Analytics.mp4
05:03
003 Analyzing Container Behavior with Falco.mp4
11:12
003 Falco.txt
003 Falco - formatting.txt
003 Lesson Reference.pdf
003 Sysdig.txt
005 Container Security Context.txt
005 Ensuring Containers are Immutable.mp4
09:55
005 Lesson Reference.pdf
007 Auditing.txt
007 Understanding Audit Logs.mp4
04:39
008 Auditing.txt
008 Lesson Reference.pdf
008 Policy Configuration Reference.txt
008 Setting up Audit Logging.mp4
09:47
010 Monitoring Logging and Runtime Security Review.mp4
03:48
001 Course Summary.mp4
01:27
002 Conclusion and Whats Next.mp4
00:54
Description
Prepare for the Certified Kubernetes Security Specialist (CKS) exam.
What You'll Learn?
The Certified Kubernetes Security Specialist (CKS) exam is a way for you to demonstrate your ability to manage, configure, and use a secure Kubernetes environment. This course will cover all of the topics and practical, hands-on skills you will need to be familiar with in order to become a knowledgeable Kubernetes security specialist and pass the CKS exam.
More details
User Reviews
Rating
average 0
Focused display
Category
Chris Behrens
Instructor's Courses
Acloud Guru
View courses Acloud GuruA Cloud Guru is an online training platform for people interested in Information Technology. Most of the courses offered prepare students to take certification exams for the three major cloud providers.
- language english
- Training sessions 59
- duration 6:11:01
- Release Date 2023/12/10