Companies Home Search Profile

Certified Kubernetes Security Specialist (CKS) Online Training

Focused View

Trevor Sullivan

25:48:43

159 View
  • 1 Overview of Kubernetes Certifications.mp4
    10:21
  • 2 Kubernetes Cluster and Node Hardening.mp4
    12:07
  • 3 Secure Microservices with Service Mesh and Policy.mp4
    11:17
  • 4 Discuss Software Supply Chain Security.mp4
    12:03
  • 5 Kubernetes Monitoring and Runtime Security.mp4
    09:24
  • 6 Learn Network Policy Security Concepts in Kubernetes.mp4
    08:26
  • 7 Block Network Traffic by Source CIDR Block.mp4
    08:30
  • 8 Apply Pod Selectors to Kubernetes Network Policy.mp4
    06:24
  • 9 Select Network Traffic by Source Namespace.mp4
    07:18
  • 10 Apply Egress Rules to Kubernetes Network Policy.mp4
    09:38
  • 11 Deploy Example Kubernetes Network Policy Scenario.mp4
    08:06
  • 12 Practice Kubernetes Network Policy.mp4
    07:42
  • 13 Intro to Securing Kubernetes GUIs.mp4
    14:06
  • 14 Secure Kubernetes GUIs with Cloud Native Firewalls.mp4
    10:01
  • 15 Encrypt Network Packets with Ingress and TLS.mp4
    07:35
  • 16 Understand Kubernetes Network Policies for Securing GUIs.mp4
    06:24
  • 17 Enable AuthN and AuthZ for Kubernetes GUI Security.mp4
    07:38
  • 18 Disable Web UIs for Improved Cluster Security.mp4
    07:53
  • 19 Intro to CIS Benchmarks for Kubernetes.mp4
    10:36
  • 20 Discuss the CIS Kubernetes Benchmark Document.mp4
    10:09
  • 21 Understand Etcd and Control Plane Authentication Recommendations.mp4
    10:43
  • 22 Review Kubernetes Worker Node CIS Benchmarks.mp4
    10:21
  • 23 Learn Kubernetes Policy CIS Benchmarks.mp4
    13:35
  • 24 Intro to Kubernetes Sealed Secrets.mp4
    12:56
  • 25 Deploy Bitnami Sealed Secrets to Kubernetes Cluster.mp4
    17:53
  • 26 Encrypt Secrets with Kubeseal CLI Tool.mp4
    12:07
  • 27 Deploy and Unwrap Sealed Secret Resources on Kubernetes.mp4
    06:23
  • 28 Intro to Chaos Mesh for Kubernetes.mp4
    12:07
  • 29 Install Chaos Mesh on Kubernetes Clusters.mp4
    15:00
  • 30 Explore the Chaos Mesh Dashboard UI.mp4
    08:57
  • 31 Inject HTTP Chaos Mesh Experiment into Pods.mp4
    17:20
  • 32 Intro to Signing Container Images.mp4
    11:12
  • 33 Understanding Sigstore Cosign CLI.mp4
    12:29
  • 34 Install Cosign CLI and Generate Key Pair.mp4
    13:45
  • 35 Build and Digitally Sign Container Image with Cosign.mp4
    14:43
  • 36 Intro to Open Service Mesh for Kubernetes.mp4
    09:12
  • 37 Understand Open Service Mesh Installation Process.mp4
    10:33
  • 38 Install Open Service Mesh on Kubernetes with OSM CLI.mp4
    09:47
  • 39 Onboard Kubernetes Namespaces to Open Service Mesh.mp4
    09:46
  • 40 Verify Service Connectivity from OSM Client Pod.mp4
    07:37
  • 41 Limit Network Connectivity with OSM IngressBackend Resource.mp4
    13:02
  • 42 Intro to Hashicorp Vault on Kubernetes.mp4
    07:16
  • 43 Understanding Hashicorp Vault Architecture on Kubernetes.mp4
    09:51
  • 44 Install Hashicorp Vault on Kubernetes with Helm.mp4
    11:33
  • 45 Initialize and Unseal Hashicorp Vault and Create Secret.mp4
    09:47
  • 46 Create Vault Permissions Policy and Role.mp4
    08:38
  • 47 Inject Hashicorp Vault Secrets into Kubernetes Pod.mp4
    12:21
  • 48 Intro to Pod Security Policies.mp4
    09:41
  • 49 Learn Pod Security Policy Architecture.mp4
    08:55
  • 50 Test Default Behavior of Kubernetes PSPs.mp4
    12:32
  • 51 Create Kubernetes Service Account and Pod Security Policy.mp4
    06:42
  • 52 Create Role and Validate PSP Behavior.mp4
    09:46
  • 53 Intro to Kubernetes Admission Controllers.mp4
    13:19
  • 54 Learn About Dynamic Admission Controllers.mp4
    10:22
  • 55 Examine Built-in Kubernetes Admission Controllers.mp4
    14:06
  • 56 Customize Kubernetes (k3s) API Server Admission Plugins.mp4
    14:09
  • 57 Intro to Auditing in Kubernetes.mp4
    13:53
  • 58 Understanding Kubernetes Audit Policy Configuration.mp4
    13:55
  • 59 Install K3S and Enable Audit Logging.mp4
    12:33
  • 60 Enable Kubernetes Audit Backend.mp4
    09:26
  • 61 Intro to Kubernetes Event Resources.mp4
    17:20
  • 62 Explore Kubernetes Event Schema.mp4
    11:15
  • 63 Understand Node Level Events in Kubernetes.mp4
    06:23
  • 64 Explore Pod Events in Kubernetes.mp4
    09:22
  • 65 Filter Kubernetes Events with Kubectl CLI.mp4
    09:13
  • 66 Intro to Processing Kubernetes Audit Logs.mp4
    10:34
  • 67 Provision Kubernetes Audit Database with MySQL.mp4
    11:09
  • 68 Connect to MySQL Database from PowerShell and VSCode.mp4
    13:55
  • 69 Parse Kubernetes JSON Audit Logs and Insert MySQL Records.mp4
    16:20
  • 70 Intro to Container Image Verification in Kubernetes.mp4
    18:36
  • 71 Customize Connaisseur Helm Variables.mp4
    10:38
  • 72 Install Connaisseur Helm Chart.mp4
    07:05
  • 73 Build and Test Signed Container Image.mp4
    17:40
  • 74 Intro to Container Image Vulnerability Scanning Tools.mp4
    09:11
  • 75 Explore Trivy Scanner Functionality.mp4
    11:02
  • 76 Deep Dive Into Trivy Vulnerability Data Sources.mp4
    12:48
  • 77 Run Trivy Vulnerability Scan on Linux VM.mp4
    16:17
  • 78 Intro to Falco Open Source Event Detection.mp4
    11:05
  • 79 Learn About Falco Sidekick Utility.mp4
    09:09
  • 80 Engage with the Falco Development Community.mp4
    08:59
  • 81 Install Falco on Linux Virtual Machine.mp4
    09:41
  • 82 Review Falco Configuration Files and Launch Falco.mp4
    12:07
  • 83 Intro to Teleport Proxy Security for Kubernetes.mp4
    07:18
  • 84 Understanding Teleport Architecture on Kubernetes.mp4
    08:53
  • 85 Install Teleport Proxy on Kubernetes Cluster.mp4
    10:35
  • 86 Configure Teleport DNS Endpoint and User.mp4
    14:07
  • 87 Login to Kubernetes Cluster via Teleport CLI.mp4
    12:39
  • 88 Intro to Kyverno Policy Management for Kubernetes.mp4
    16:12
  • 89 Install Kyverno on Kubernetes Cluster with Helm.mp4
    14:40
  • 90 Examine Kyverno Policy Library and Network Policy.mp4
    10:02
  • 91 Apply Kyverno Policy to Enforce Kubernetes Quotas.mp4
    07:14
  • 92 Intro to Kubernetes Monitoring with Sumo Logic.mp4
    10:02
  • 93 Install Sumo Logic Helm Chart on Kubernetes Cluster.mp4
    10:52
  • 94 Explore Sumo Logic Open Source Components.mp4
    09:57
  • 95 Explore Built-in Kubernetes Dashboards in Sumo Logic.mp4
    09:51
  • 96 Understanding Kubernetes E-mail Alerts in Sumo Logic.mp4
    11:31
  • 97 Intro to Kubernetes Dynamic Admission Controllers.mp4
    08:11
  • 98 Learn Basic Structure of Validating Webhook Configuration.mp4
    08:11
  • 99 Understanding Kubernetes Webhook Configuration Rules.mp4
    09:11
  • 100 Setting the Client Config for Kubernetes Webhook Configs.mp4
    07:27
  • 101 Understanding Extra Webhook Config Options.mp4
    06:36
  • 102 Inspect Validating Webhook Config Requests.mp4
    12:31
  • 103 Intro to Container Image Scanning with GitHub Actions.mp4
    13:57
  • 104 Create Simple GitHub Actions Project.mp4
    06:28
  • 105 Install and Run Trivy in GitHub Actions.mp4
    16:25
  • 106 Abort GitHub Actions Workflow on Detected Vulnerabilities.mp4
    05:49
  • 107 Improve Trivy Performance in GitHub Actions.mp4
    14:36
  • 108 Schedule Chaos Mesh Experiments with Cron Expressions.mp4
    19:59
  • 109 Develop Complex Chaos Mesh Workflows.mp4
    15:52
  • 110 Inject Stress Chaos into Kubernetes Pods.mp4
    08:02
  • 111 Perform Kubernetes Network Attacks with Chaos Mesh.mp4
    10:11
  • 112 Intro to Pod Security Standards.mp4
    15:59
  • 113 Implement Warning for Baseline Pod Security Standard on Namespace.mp4
    17:22
  • 114 Enforce Baseline Pod Security Standard Versions.mp4
    11:35
  • 115 Apply Pod Security Standard to Entire Kubernetes Cluster.mp4
    11:11
  • 116 Intro to Kubernetes API Priority and Fairness.mp4
    08:39
  • 117 Understanding API Priority & Fairness Resources.mp4
    08:30
  • 118 Examine Kubernetes FlowSchema Resource Type.mp4
    10:59
  • 119 Validate FlowSchema Applied During k8s API Requests.mp4
    10:46
  • 120 Explore Kubernetes Priority Level Configuration Queues.mp4
    09:43
  • 121 Intro to Kubernetes Infrastructure Testing with Pester.mp4
    07:45
  • 122 Discuss Specific Use Cases for Automated Kubernetes Testing.mp4
    08:26
  • 123 Setting Up PowerShell and Pester Dev Environment.mp4
    05:53
  • 124 Write Pester Test for Kubernetes Pods in Default Namespace.mp4
    11:09
  • 125 Write Pester Test for Kubernetes Deployment Replica Count.mp4
    09:34
  • 126 Add Pester Template Strings to Test Cases.mp4
    07:27
  • 127 Write Pester Test for Kubernetes Cluster Role Bindings.mp4
    10:19
  • 128 Whats Driving the Need for Policy-.mp4
    08:13
  • 129 Intro to Open Policy Agent (OPA) Concepts.mp4
    09:36
  • 130 Understand OPA Gatekeeper Architecture with Kubernetes.mp4
    09:35
  • 131 Install OPA Gatekeeper on Kubernetes Cluster.mp4
    08:06
  • 132 Deploy OPA Constraints to Kubernetes Cluster.mp4
    10:23
  • 133 Remediate Audit Violations from OPA Gatekeeper.mp4
    10:10
  • 134 Intro to Kubernetes Resource Validation with Datree.mp4
    11:36
  • 135 Run Datree CLI Against Local Kubernetes Manifest.mp4
    09:26
  • 136 Skip Datree Policy Rules with Resource Annotations.mp4
    09:58
  • 137 Evaluate Datree Policy Rules on Live Kubernetes Resources.mp4
    13:12
  • 138 Configure Datree Policies Centrally or Locally.mp4
    09:10
  • 139 Intro to Rego for Open Policy Agent (OPA).mp4
    08:06
  • 140 Create Rego Policy and Parse with OPA CLI.mp4
    09:13
  • 141 Write Rego Policy Tests and Execute with OPA CLI.mp4
    08:13
  • 142 Pass Inputs to Rego Policies and Use String Functions.mp4
    09:24
  • 143 Evaluate Rego Policy Return Values.mp4
    09:10
  • 144 Implement Time Window Policy in Rego.mp4
    08:56
  • Description


    This intermediate Certified Kubernetes Security Specialist (CKS) training prepares DevOps professionals to minimize microservice vulnerabilities and set up and harden Kubernetes clusters.

    The world of IT has seen a big shift from using virtualized application deployment environments to containerized application deployment environments — and Kubernetes is one of the most popular platforms when creating and managing those environments. So it only makes sense that being able to secure container-based applications and Kubernetes platforms has become a requirement.

    More details


    With this Kubernetes Security Specialist training, you’ll learn how to secure the containers that bundle and run your applications.

    After finishing this Kubernetes training, you'll know how to minimize microservice vulnerabilities and set up and harden Kubernetes clusters.

    For anyone who manages DevOps professionals, this Kubernetes training can be used to onboard new DevOps professionals, curated into individual or team training plans, or as a Kubernetes reference resource.

    Certified Kubernetes Security Specialist (CKS): What You Need to Know

    This Certified Kubernetes Security Specialist (CKS) training has videos that cover topics such as:

    • Performing basic installations with Kubernetes (K8s) clusters
    • Configuring and managing Kubernetes clusters
    • Providing Kubernetes networking, storage, and security solutions
    • Monitoring Kubernetes performance with logs and troubleshooting problems

    Who Should Take Certified Kubernetes Security Specialist (CKS) Training?

    This Certified Kubernetes Security Specialist (CKS) training is considered professional-level Kubernetes training, which means it was designed for DevOps professionals. This Kubernetes skills course is designed for DevOps professionals with three to five years of experience with DevOps.

    New or aspiring DevOps professionals. If you want to work as a DevOps professional in the future, mastering Kubernetes early is a sure-fire way to stay ahead of the curve. And what better way to showcase your Kubernetes skills than by knowing about Kubernetes security principles like cluster hardening and microservice vulnerability prevention — often overlooked topics in the IT world.

    By using this Certified Kubernetes Security Specialist (CKS) training, you can separate yourself from the crowds early on.

    Experienced DevOps professionals. Though it was developed by engineers at Google, Kubernetes has only been around since 2015. So even some veterans in the DevOps space may not be comfortable working with Kubernetes.

    But with how popular microservice architecture and application security have become, it’s only a matter of time before you find yourself needing to learn about Kubernetes security. And by using this training, you'll learn how to secure container-based applications and Kubernetes platforms during build, deployment, and runtime

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Trevor Sullivan
    Trevor Sullivan
    Instructor's Courses

    I enjoy teaching IT because the technology industry is changing so rapidly, and our learners need to stay at the cutting edge.

    Trevor started building and troubleshooting computers at a young age, thanks to his father owning a software business. He brings more than a decade of IT and training experience to CBT Nuggets. Prior to joining the team, he worked in pre-sales engineering and solutions architecture. Trevor’s hobbies include riding motorcycles, hiking, and spending time with his family.

    Certifications: AWS Certified Cloud Practitioner, AWS Certified Solutions Architect - Associate, AWS Certified Developer Associate, AWS Certified SysOps Administrator Associate, AWS Certified DevOps Engineer Professional, AWS Certified Solution Architect - Professional, AWS Certified Security Specialist, Certified Kubernetes Administrator (CKA), and Certified Kubernetes Application Developer (CKAD)

    Areas of expertise: AWS, Azure, MySQL, GitHub, Docker, Kubernetes, and PowerShell automation

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 144
    • duration 25:48:43
    • Release Date 2023/03/02