This 2-days long training introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, supply chain security as well as monitoring, logging, and runtime security.
Linux container (e.g., Docker) and Kubernetes administration skills are required for this course.
2 Days/Lecture & Lab
This course is designed for Kubernetes administrators who participated in a Kubernetes administration training or have a Certified Kubernetes Administrator (CKA) certification and want to learn about securing Kubernetes based systems and container-based applications.
- User and Authorization Management
- Supply Chain Security
- Validating Cluster Setup and Penetration Testing
- System Hardening
- Monitoring and Logging