Certified Kubernetes Security Specialist (CKS) Pack of 2 Video Training Course & PDF Guides Download
Duration : 30 Hours
Size:8.5 GB
Course-01
01 Introduction
02 Cluster Setup
03 Cluster Hardening
04 System Hardening
05 Minimizing Microservice Vulnerabilities
06 Supply Chain Security
07 Monitoring Logging and Runtime Security
09 Conclusion
Course -02
30 sections • 165 lectures • 11h 8m total length
Introduction4 lectures • 13min
Welcome
Slack Community
K8s Security Best Practices
Create your course K8s cluster7 lectures • 24min
Cluster Specification
Practice - Create GCP Account
Practice - Configure "gcloud" command
Practice - Create Kubeadm Cluster in GCP
Practice - Firewall rules for NodePorts
Notice: Always stop your instances
Foundation - Kubernetes Secure Architecture3 lectures • 19min
Intro
Practice - Find various K8s certificates
Foundation - Containers under the hood3 lectures • 15min
Intro
Practice - The PID Namespace
Cluster Setup - Network Policies7 lectures • 28min
Cluster Reset
Introduction 1
Introduction 2
Practice - Frontend to Backend traffic
Practice - Backend to Database traffic
Cluster Setup - GUI Elements5 lectures • 15min
Introduction
Practice - Install Dashboard
Practice - Outside Insecure Access
Practice - RBAC for the Dashboard
Cluster Setup - Secure Ingress5 lectures • 22min
K8s Docs in correct Version
Introduction
Cluster Setup - Node Metadata Protection4 lectures • 10min
Introduction
Practice: Access Node Metadata
Practice: Protect Node Metadata via NetworkPolicy
Cluster Setup - CIS Benchmarks4 lectures • 13min
Introduction
Practice - CIS in Action
Practice - kube-bench
Cluster Setup - Verify Platform Binaries4 lectures • 10min
Introduction
Practice - Download and verify K8s release
Practice - Verify apiserver binary running in our cluster
Cluster Hardening - RBAC6 lectures • 33min
Intro
Practice - Role and Rolebinding
Practice - ClusterRole and ClusterRoleBinding
Accounts and Users
Practice - CertificateSigningRequests
Cluster Hardening - Exercise caution in using ServiceAccounts5 lectures • 13min
Intro
Practice - Pod uses custom ServiceAccount
Practice - Disable ServiceAccount mounting
Practice - Limit ServiceAccounts using RBAC
Cluster Hardening - Restrict API Access8 lectures • 29min
Introduction
Practice - Anonymous Access
Practice - Insecure Access
Practice - Manual API Request
Practice - External Apiserver Access
NodeRestriction AdmissionController
Practice - Verify NodeRestriction
Cluster Hardening - Upgrade Kubernetes5 lectures • 16min
Introduction
Practice - Create outdated cluster
Practice - Upgrade master node
Practice - Upgrade worker node
Microservice Vulnerabilities - Manage Kubernetes Secrets7 lectures • 45min
Introduction
Practice - Create Simple Secret Scenario
Practice - Hack Secrets in Docker
Practice - Hack Secrets in ETCD
ETCD Encryption
Practice - Encrypt ETCD
Microservice Vulnerabilities - Container Runtime Sandboxes9 lectures • 29min
Introduction
Practice - Container calls Linux Kernel
Open Container Initiative OCI
Practice - Crictl
Sandbox Runtime Katacontainers
Sandbox Runtime gVisor
Practice - Create and use RuntimeClasses
Practice - Install and use gVisor
Microservice Vulnerabilities - OS Level Security Domains10 lectures • 30min
Intro and Security Contexts
Practice - Set Container User and Group
Practice - Force Container Non-Root
Privileged Containers
Practice - Create Privileged Containers
PrivilegeEscalation
Practice - Disable PriviledgeEscalation
PodSecurityPolicies
Practice - Create and enable PodSecurityPolicy
Microservice Vulnerabilities - mTLS3 lectures • 15min
Intro
Practice - Create sidecar proxy
Open Policy Agent (OPA)8 lectures • 40min
Cluster Reset
Introduction
Practice - Install OPA
Practice - Deny All Policy
Practice - Enforce Namespace Labels
Practice - Enforce Deployment replica count
Practice - The Rego Playground and more examples
Supply Chain Security - Image Footprint4 lectures • 22min
Introduction
Practice - Reduce Image Footprint with Multi-Stage
Practice - Secure and harden Images
Supply Chain Security - Static Analysis7 lectures • 23min
Introduction
Kubesec
Practice - Kubesec
OPA Conftest
Practice - OPA Conftest for K8s YAML
Practice - OPA Conftest for Dockerfile
Supply Chain Security - Image Vulnerability Scanning4 lectures • 14min
Introduction
Clair and Trivy
Practice - Use Trivy to scan images
Supply Chain Security - Secure Supply Chain6 lectures • 25min
Introduction
Practice - Image Digest
Practice - Whitelist Registries with OPA
ImagePolicyWebhook
Practice - ImagePolicyWebhook
Runtime Security - Behavioral Analytics at host and container level9 lectures • 44min
Introduction
Practice - Strace
Practice - Strace and /proc on ETCD
Practice - /proc and env variables
Practice - Falco and Installation
Practice - Use Falco to find malicious processes
Practice - Investigate Falco rules
Practice - Change Falco Rule
Runtime Security - Immutability of containers at runtime5 lectures • 18min
Introduction
Ways to enforce immutability
Practice - StartupProbe changes container
Practice - SecurityContext renders container immutable
Runtime Security - Auditing6 lectures • 43min
Introduction
Practice - Enable Audit Logging in Apiserver
Practice - Create Secret and check Audit Logs
Practice - Create advanced Audit Policy
Practice - Investigate API access history
System Hardening - Kernel Hardening Tools9 lectures • 39min
Introduction
AppArmor
Practice - AppArmor for curl
Practice - AppArmor for Docker Nginx
Practice - AppArmor for Kubernetes Nginx
Certified Kubernetes Security Specialist (CKS) Pack of 2 Video Training Course &
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.