Udemy

Certified Kubernetes Security Specialist (CKS)

Enroll Now
  • 1,257 Students
  • Updated 1/2021
3.5
(118 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
2 Hour(s) 56 Minute(s)
Language
English
Taught by
Lawrence Manickam
Rating
3.5
(118 Ratings)
2 views

Course Overview

Certified Kubernetes Security Specialist (CKS)

Theoretical Course Videos - Learn Kubernetes Security

LEARN CERTIFIED KUBERNETES SECURITY SEPCIALIST (CKS) CERTIFICATION COURSE!

New Content and Syllabus: The course follows the new CKS syllabus from CNCF.

The course includes the following core bonuses:

Bonus 1: Application and System Security

Bonus 2: Microservices Overview

Kubernetes has maintained a solid yearly growth rate in usage of Container services. Kubernetes and its distributions such as Red Hat OpenShift, Rancher and Kuberiter will continue to lead the USD 11 billion market. The growth of remote jobs will further improve the market for Containers, Kubernetes, and generate millions of jobs.

This course is a first step to work towards a Cloud Native Security Career!

Sign up now to learn!

Course Content

  • 34 section(s)
  • 34 lecture(s)
  • Section 1 Introduction
  • Section 2 About the Master Cloud Architect Trainer
  • Section 3 CNCF CKS Course Syllabus
  • Section 4 CKS Course Guide from the Instructor
  • Section 5 Application and System Security
  • Section 6 Verify Platform Binaries before Deploying
  • Section 7 Protect Node metadata and Endpoints
  • Section 8 Minimize use of, and access to, GUI elements
  • Section 9 Use CIS benchmark to review the security configuration of Kubernetes components
  • Section 10 Use Network Security Policies to restrict Cluster level access
  • Section 11 Properly set up Ingress Objects with Security Control
  • Section 12 Restrict access to Kubernetes API
  • Section 13 Use Role Based Access Controls to minimize exposure
  • Section 14 Exercise caution in using Service Accounts
  • Section 15 Update Kubernetes frequently
  • Section 16 Minimize Host OS footprint
  • Section 17 Kernel Hardening Tools
  • Section 18 Minimize External access to the Network
  • Section 19 Minimize IAM Roles
  • Section 20 Microservices Overview
  • Section 21 Setup appropriate OS level Security domains
  • Section 22 Manage Kubernetes Secrets
  • Section 23 Use Container Runtime Sandboxes in Multi-tenant environments
  • Section 24 Implement Pod to Pod encryption by use of mTLS
  • Section 25 Minimize Base Image Footprint
  • Section 26 Secure your Supply Chain:
  • Section 27 Use Static Analysis of user workloads
  • Section 28 Scan Images for Known Vulnerabilities
  • Section 29 Perform Deep Analytical Investigation and Identification of Bad Actors
  • Section 30 Perform Behavioral Analytics of Syscall process and File Activities
  • Section 31 Detect Threats within Physical Infrastructure, Apps and Data
  • Section 32 Detect all Phases of attack regardless where it occurs and how it spreads
  • Section 33 Ensure Immutability of Containers at Runtime
  • Section 34 Use Audit Logs to Monitor Access

What You’ll Learn

  • New CKS Syllabus, CKS Exam Requirements, Application and System Security, Kubernetes API Security, RBAC, and Network Policies, Service Accounts, Kernel Hardening Tools, Kubernetes Secrets, Pod mTLS, Container Image Scanning, Container Sandbox, Audit Logs


Reviews

  • S
    Stephen E Canell
    4.0

    Overview show great depth of required to obtain the Certificate and thus the important to exercise each training module to enhance learning experience!

  • A
    Ankit Saini
    1.0

    Why part is not discussed in the course, It is like this is what needs to do but why it is not explained in the course. No demos nothing, It's like a student giving a presentation in the college not useful at all. This is disgusting he is just reading the PPT, Whomsoever completed the CKA will already knows all these things, Just a garbage course.

  • I
    Ivan Lopez Hernandez
    1.5

    Kubernetes security sure, but not CKS, does not help you take on the certification and should not say CKS if it's not related to it, granted a 3h course is not enough either.

  • A
    Anonymized User
    1.5

    While the content is informative this is just a guy reading powerpoint slides line by line for 3+ hours. There is no informative discussion or insight into any of the facts read out by the presenter. Ultimately this is a really un-engaging course. I understand that it is theory only (no lab or 'live' demo's) but there is almost no real-world context given around the many bullet points read out from the power point. I would have preferred to have just read the power point myself. Good courses are vibrant and engaging, sadly I found this course to be very far from either of those attributes.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed