1. Intro to Certified Kubernetes Security (CKS) .mp4
10:21
2. Kubernetes Cluster and Node Hardening .mp4
12:07
3. Secure Microservices with Service Mesh and Policy .mp4
11:17
4. Discuss Software Supply Chain Security .mp4
12:03
5. Kubernetes Monitoring and Runtime Security .mp4
09:24
6. Learn Network Policy Security Concepts in Kubernetes .mp4
08:26
7. Block Network Traffic by Source CIDR Block .mp4
08:30
8. Apply Pod Selectors to Kubernetes Network Policy .mp4
06:24
9. Select Network Traffic by Source Namespace .mp4
07:18
10. Apply Egress Rules to Kubernetes Network Policy .mp4
09:38
11. Deploy Example Kubernetes Network Policy Scenario .mp4
08:06
12. Practice Kubernetes Network Policy .mp4
07:43
13. Intro to Securing Kubernetes GUIs .mp4
14:06
14. Secure Kubernetes GUIs with Cloud Native Firewalls .mp4
10:01
15. Encrypt Network Packets with Ingress and TLS .mp4
07:35
16. Understand Kubernetes Network Policies for Securing GUIs .mp4
06:24
17. Enable AuthN and AuthZ for Kubernetes GUI Security .mp4
07:38
18. Disable Web UIs for Improved Cluster Security .mp4
07:53
19. Intro to CIS Benchmarks for Kubernetes .mp4
10:36
20. Discuss the CIS Kubernetes Benchmark Document .mp4
10:09
21. Understand Etcd and Control Plane Authentication Recommendations .mp4
10:43
22. Review Kubernetes Worker Node CIS Benchmarks .mp4
02:04
23. Learn Kubernetes Policy CIS Benchmarks .mp4
13:35
24. Intro to Kubernetes Sealed Secrets .mp4
12:57
25. Deploy Bitnami Sealed Secrets to Kubernetes Cluster .mp4
17:53
26. Encrypt Secrets with Kubeseal CLI Tool .mp4
12:07
27. Deploy and Unwrap Sealed Secret Resources on Kubernetes .mp4
06:23
28. Intro to Chaos Mesh for Kubernetes .mp4
12:07
29. Install Chaos Mesh on Kubernetes Clusters .mp4
15:00
30. Explore the Chaos Mesh Dashboard UI .mp4
08:57
31. Inject HTTP Chaos Mesh Experiment into Pods .mp4
17:20
32. Intro to Signing Container Images .mp4
11:12
33. Understanding Sigstore Cosign CLI .mp4
12:29
34. Install Cosign CLI and Generate Key Pair .mp4
13:45
35. Build and Digitally Sign Container Image with Cosign .mp4
14:43
36. Intro to Open Service Mesh for Kubernetes .mp4
09:12
37. Understand Open Service Mesh Installation Process .mp4
10:33
38 Install Open Service Mesh on Kubernetes with OSM CLI .mp4
09:47
39. Onboard Kubernetes Namespaces to Open Service Mesh .mp4
09:47
40. Verify Service Connectivity from OSM Client Pod .mp4
07:37
41. Limit Network Connectivity with OSM IngressBackend Resource .mp4
13:02
42. Intro to Hashicorp Vault on Kubernetes .mp4
07:16
43. Understanding Hashicorp Vault Architecture on Kubernetes .mp4
09:51
44. Install Hashicorp Vault on Kubernetes with Helm .mp4
11:33
45. Initialize and Unseal Hashicorp Vault and Create Secret .mp4
09:47
46. Create Vault Permissions Policy and Role .mp4
08:38
47. Inject Hashicorp Vault Secrets into Kubernetes Pod .mp4
12:22
48. Intro to Pod Security Policies .mp4
09:41
49. Learn Pod Security Policy Architecture .mp4
08:56
50. Test Default Behavior of Kubernetes PSPs .mp4
12:32
51. Create Kubernetes Service Account and Pod Security Policy .mp4
06:42
52. Create Role and Validate PSP Behavior .mp4
09:46
53. Intro to Kubernetes Admission Controllers .mp4
13:19
54. Learn About Dynamic Admission Controllers .mp4
10:22
55. Examine Built-in Kubernetes Admission Controllers .mp4
14:06
56. Customize Kubernetes (k3s) API Server Admission Plugins .mp4
14:09
57. Intro to Auditing in Kubernetes .mp4
13:53
58. Understanding Kubernetes Audit Policy Configuration .mp4
13:55
59. Install K3S and Enable Audit Logging .mp4
12:33
60. Enable Kubernetes Audit Backend .mp4
09:26
61. Intro to Kubernetes Event Resources .mp4
17:20
62. Explore Kubernetes Event Schema .mp4
11:15
63. Understand Node Level Events in Kubernetes .mp4
06:23
64. Explore Pod Events in Kubernetes .mp4
09:22
65. Filter Kubernetes Events with Kubectl CLI .mp4
09:13
66. Intro to Processing Kubernetes Audit Logs .mp4
10:34
67. Provision Kubernetes Audit Database with MySQL .mp4
11:09
68. Connect to MySQL Database from PowerShell and VSCode .mp4
13:55
69. Parse Kubernetes JSON Audit Logs and Insert MySQL Records .mp4
16:20
70. Intro to Container Image Verification in Kubernetes .mp4
18:36
71. Customize Connaisseur Helm Variables .mp4
10:38
72. Install Connaisseur Helm Chart .mp4
07:06
73. Build and Test Signed Container Image .mp4
17:40
74. Intro to Container Image Vulnerability Scanning Tools .mp4
09:11
75. Explore Trivy Scanner Functionality .mp4
11:02
76. Deep Dive Into Trivy Vulnerability Data Sources .mp4
12:48
77. Run Trivy Vulnerability Scan on Linux VM .mp4
16:18
78. Intro to Falco Open Source Event Detection .mp4
11:05
79. Learn About Falco Sidekick Utility .mp4
09:09
80. Engage with the Falco Development Community .mp4
08:59
81. Install Falco on Linux Virtual Machine .mp4
09:41
82. Review Falco Configuration Files and Launch Falco .mp4
12:08
83. Intro to Teleport Proxy Security for Kubernetes .mp4
07:18
84. Understanding Teleport Architecture on Kubernetes .mp4
08:53
85. Install Teleport Proxy on Kubernetes Cluster .mp4
10:35
86. Configure Teleport DNS Endpoint and User .mp4
14:07
87. Login to Kubernetes Cluster via Teleport CLI .mp4
12:39
88. Intro to Kyverno Policy Management for Kubernetes .mp4
16:12
89. Install Kyverno on Kubernetes Cluster with Helm .mp4
14:40
90. Examine Kyverno Policy Library and Network Policy .mp4
10:03
91. Apply Kyverno Policy to Enforce Kubernetes Quotas .mp4
07:14
92. Intro to Kubernetes Monitoring with Sumo Logic .mp4
10:02
93. Install Sumo Logic Helm Chart on Kubernetes Cluster .mp4
10:52
94. Explore Sumo Logic Open Source Components .mp4
09:57
95. Explore Built-in Kubernetes Dashboards in Sumo Logic .mp4
09:51
96. Understanding Kubernetes E-mail Alerts in Sumo Logic .mp4
11:31
97. Intro to Kubernetes Dynamic Admission Controllers .mp4
08:11
98. Learn Basic Structure of Validating Webhook Configuration .mp4
08:11
99. Understanding Kubernetes Webhook Configuration Rules .mp4
09:11
100. Setting the Client Config for Kubernetes Webhook Configs .mp4
07:27
101. Understanding Extra Webhook Config Options .mp4
06:36
102. Inspect Validating Webhook Config Requests .mp4
12:31
103. Intro to Container Image Scanning with GitHub Actions .mp4
13:57
104. Create Simple GitHub Actions Project .mp4
06:28
105. Install and Run Trivy in GitHub Actions .mp4
16:25
106. Abort GitHub Actions Workflow on Detected Vulnerabilities .mp4
05:49
107. Improve Trivy Performance in GitHub Actions .mp4
14:36
108. Schedule Chaos Mesh Experiments with Cron Expressions .mp4
20:00
109. Develop Complex Chaos Mesh Workflows .mp4
15:53
110. Inject Stress Chaos into Kubernetes Pods .mp4
08:02
111. Perform Kubernetes Network Attacks with Chaos Mesh .mp4
10:11
112. Intro to Pod Security Standards .mp4
15:59
113. Implement Warning for Baseline Pod Security Standard on Namespace .mp4
17:22
114. Enforce Baseline Pod Security Standard Versions .mp4
11:35
115. Apply Pod Security Standard to Entire Kubernetes Cluster .mp4
11:11
116. Intro to Kubernetes API Priority and Fairness .mp4
08:39
117. Understanding API Priority & Fairness Resources .mp4
08:30
118. Examine Kubernetes FlowSchema Resource Type .mp4
00:46
119. Validate FlowSchema Applied During k8s API Requests .mp4
10:46
120. Explore Kubernetes Priority Level Configuration Queues .mp4
09:44
121. Intro to Kubernetes Infrastructure Testing with Pester .mp4
02:02
122. Discuss Specific Use Cases for Automated Kubernetes Testing .mp4
08:27
123. Setting Up PowerShell and Pester Dev Environment .mp4
05:53
124. Write Pester Test for Kubernetes Pods in Default Namespace .mp4
11:10
125. Write Pester Test for Kubernetes Deployment Replica Count .mp4
09:34
126. Add Pester Template Strings to Test Cases .mp4
07:27
127. Write Pester Test for Kubernetes Cluster Role Bindings .mp4
10:19
128. Whats Driving the Need for Policy .mp4
08:13
129. Intro to Open Policy Agent (OPA) Concepts .mp4
09:36
130. Understand OPA Gatekeeper Architecture with Kubernetes .mp4
09:35
131. Install OPA Gatekeeper on Kubernetes Cluster .mp4
08:06
132. Deploy OPA Constraints to Kubernetes Cluster .mp4
10:23
133. Remediate Audit Violations from OPA Gatekeeper .mp4
10:10
134. Intro to Kubernetes Resource Validation with Datree .mp4
11:36
135. Run Datree CLI Against Local Kubernetes Manifest .mp4
09:26
136. Skip Datree Policy Rules with Resource Annotations .mp4
09:58
137. Evaluate Datree Policy Rules on Live Kubernetes Resources .mp4
13:12
138. Configure Datree Policies Centrally or Locally .mp4
09:10
139. Intro to Rego for Open Policy Agent (OPA) .mp4
08:06
140. Create Rego Policy and Parse with OPA CLI .mp4
09:13
141. Write Rego Policy Tests and Execute with OPA CLI .mp4
08:13
142. Pass Inputs to Rego Policies and Use String Functions .mp4
09:24
143. Evaluate Rego Policy Return Values .mp4
09:10
144. Implement Time Window Policy in Rego .mp4
08:56