Advanced Kubernetes Skills: Designing & Building Kubernetes Solutions

Kubernetes 1.20    |    Expert
  • 14 Videos | 1h 53m 23s
  • Includes Assessment
  • Earns a Badge
If the security of your containerized systems and networks is important to you, then you need to implement appropriate security measures throughout the design and build of your Kubernetes solutions. Use this course to learn how to do this. Examine common Kubernetes security issues and exploits. Learn how Pods and clusters are secured. Additionally, explore security considerations and procedures related to Kubernetes deployments and the Kubernetes API. As you advance, learn how to audit a Kubernetes-based deployment, determine security risks, and design a security plan for new deployments. Practice configuring a security context and security policy for a Pod. Use role-based access control with Kubernetes. And restrict a container's access to resources by using AppArmor. Upon completion, you'll be able to greatly reduce your Kubernetes environment's vulnerability to unauthorized access and security attacks.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    summarize common security issues and exploits when using Kubernetes
    outline how security contexts are normally applied to Pods in Kubernetes
    describe the authentication and authorization process for using the Kubernetes API
    describe the process for securing a Kubernetes cluster
    list some common security considerations and problems with Kubernetes deployments, with reference to APIs, Node access, cloud provider APIs, and encryption
    outline the process for auditing a Kubernetes-based deployment for security concerns
  • describe the process and steps to follow when determining security risks with Kubernetes
    summarize how to design a new security plan for new Kubernetes-based deployment
    configure a security context for a Pod
    configure a Pod security policy
    use role-based access control with Kubernetes
    use AppArmor to restrict a container's access to resources
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 44s
    UP NEXT
  • Playable
    2. 
    Common Kubernetes Security Issues
    9m 20s
  • Locked
    3. 
    Kubernetes Pod Security Standards
    6m 9s
  • Locked
    4. 
    Kubernetes API Security
    9m 2s
  • Locked
    5. 
    Kubernetes Cluster Security
    9m 27s
  • Locked
    6. 
    Kubernetes Deployment Security Concerns
    9m 51s
  • Locked
    7. 
    Kubernetes Security Auditing
    7m 46s
  • Locked
    8. 
    Kubernetes Security Risk Management
    7m 17s
  • Locked
    9. 
    Kubernetes Security Planning
    7m 35s
  • Locked
    10. 
    Configuring Kubernetes Pod Security
    8m 57s
  • Locked
    11. 
    Configuring Kubernetes Pod Policies
    7m 43s
  • Locked
    12. 
    Using Kubernetes Role-based Access Control
    19m 39s
  • Locked
    13. 
    Restricting Container Access to Resources
    8m 5s
  • Locked
    14. 
    Course Summary
    47s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.