- 40 hours
- intermediate
- 7 lessons
About
This course exposes you to knowledge and skills needed to maintain security in dynamic, multi-project environments. This course addresses security concerns for cloud production environments and covers topics related to the security container supply chain, discussing topics from before a cluster has been configured through deployment, and ongoing, as well as agile use, including where to find ongoing security and vulnerability information.
Kubernetes Security Essentials
The Kubernetes Security Essentials course is a comprehensive training program designed to provide IT professionals with the skills and knowledge necessary to secure container-based applications and Kubernetes platforms. This course covers a broad range of best practices for securing applications during build, deployment, and runtime, and prepares participants for the Certified Kubernetes Security Specialist (CKS) exam.
Key Learning Objectives
- Understand cloud security fundamentals and Kubernetes’ role within it.
- Learn to secure the Kubernetes API server and cluster components.
- Master network policies and secure networking within Kubernetes.
- Gain insights into workload considerations for security.
- Develop skills for detecting and responding to security issues.
Prerequisite
- Linux concepts and command line – We recommend our “Linux System Administration” Course
- Kubernetes Knowledge – We recommend undergoing “Kubernetes for System Administrators” Course
- Knowledge of Git.
- For hands-on lab exercises, access to a public cloud provider, or VirtualBox on your machine is needed.
Target audiences
IT professionals responsible for securing Kubernetes platforms and container-based applications.
skills you'll gain
Earn a career certificate
- Professional Recognition: It serves as proof of your dedication and accomplishment, which can be recognized by employers and peers.
- Skill Validation: The certificate validates the skills you’ve acquired, demonstrating your expertise in the subject matter.
- Enhanced Resume: Adding the certificate to your resume can enhance your job prospects by showcasing your commitment to professional development.
Modules
Introduction to cloud security and Kubernetes’ place in it.
Best practices before configuring a Kubernetes cluster.
Steps to securely install a Kubernetes cluster.
Techniques to protect the Kubernetes API server.
Implementing secure networking strategies.
Ensuring workloads are secure and compliant.
Methods for monitoring and detecting security issues.