Securing Kubernetes- CKSS

Training Summary
This class prepares students for the Certified Kubernetes Security Specialist (CKS) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will be equipped with a thorough understanding of cloud security fundamentals, along with the knowledge, skills and abilities to secure a Kubernetes cluster, detect threats, and properly resolve a security catastrophe. This course includes hands-on instruction which develops skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment, and runtime. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Security Specialist (CKS) exam. You will be provided the components necessary to assemble your own high availability Kubernetes environment and harden it for your security needs.
This course is intended for students who have experience with the core components of Kubernetes. It is suggested that students take the Certified Kubernetes Administrator course prior to taking the Certified Kubernetes Security Specialist course. However, instructors will always strive to assure every student gains a very thorough understanding of the material covered, regardless of the students’ prior experience. Furthermore, this course has already taken into consideration the attendance of less experienced learners. Finally, experience and knowledge of Linux fundamentals is strongly recommended.
5 Days/Lecture & Lab
  • Security Professionals working with Kubernetes clusters
  • Container Orchestration Engineers
  • DevOps Professionals
Course Topics
  • Learning Your Environment
  • Cloud Security Primer
  • Securing your Kubernetes Cluster
  • Install Kubernetes using kubeadm
  • Securing the kube-apiserver
  • Securing ETCD
  • Purge Kubernetes
  • Image Scanning
  • Manually Installing Kubernetes
  • Kubectl
  • Labels
  • Securing your Application
  • Pod Security
  • Open Policy Agent
  • User Administration
  • Securing Secrets
  • Securing the Network
  • Threat Detection
  • Disaster Recovery

Related Scheduled Courses