Advanced Kubernetes Skills: Designing & Building Kubernetes Solutions

Kubernetes    |    Expert
  • 14 videos | 1h 53m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 23 users Rating 4.6 of 23 users (23)
If the security of your containerized systems and networks is important to you, then you need to implement appropriate security measures throughout the design and build of your Kubernetes solutions. Use this course to learn how to do this. Examine common Kubernetes security issues and exploits. Learn how Pods and clusters are secured. Additionally, explore security considerations and procedures related to Kubernetes deployments and the Kubernetes API. As you advance, learn how to audit a Kubernetes-based deployment, determine security risks, and design a security plan for new deployments. Practice configuring a security context and security policy for a Pod. Use role-based access control with Kubernetes. And restrict a container's access to resources by using AppArmor. Upon completion, you'll be able to greatly reduce your Kubernetes environment's vulnerability to unauthorized access and security attacks.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Summarize common security issues and exploits when using kubernetes
    Outline how security contexts are normally applied to pods in kubernetes
    Describe the authentication and authorization process for using the kubernetes api
    Describe the process for securing a kubernetes cluster
    List some common security considerations and problems with kubernetes deployments, with reference to apis, node access, cloud provider apis, and encryption
    Outline the process for auditing a kubernetes-based deployment for security concerns
  • Describe the process and steps to follow when determining security risks with kubernetes
    Summarize how to design a new security plan for new kubernetes-based deployment
    Configure a security context for a pod
    Configure a pod security policy
    Use role-based access control with kubernetes
    Use apparmor to restrict a container's access to resources
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 44s
  • 9m 20s
    Discover how to summarize common security issues and exploits when using Kubernetes. FREE ACCESS
  • Locked
    3.  Kubernetes Pod Security Standards
    6m 9s
    In this video, you will outline how security contexts are normally applied to Pods in Kubernetes. FREE ACCESS
  • Locked
    4.  Kubernetes API Security
    9m 2s
    After completing this video, you will be able to describe the authentication and authorization process for using the Kubernetes API. FREE ACCESS
  • Locked
    5.  Kubernetes Cluster Security
    9m 27s
    In this video, find out how to describe the process for securing a Kubernetes cluster. FREE ACCESS
  • Locked
    6.  Kubernetes Deployment Security Concerns
    9m 51s
    Upon completion of this video, you will be able to list some common security considerations and problems with Kubernetes deployments, with reference to APIs, Node access, cloud provider APIs, and encryption. FREE ACCESS
  • Locked
    7.  Kubernetes Security Auditing
    7m 46s
    During this video, you will learn how to outline the process for auditing a Kubernetes-based deployment for security concerns. FREE ACCESS
  • Locked
    8.  Kubernetes Security Risk Management
    7m 17s
    Find out how to describe the process and steps to follow when determining security risks with Kubernetes. FREE ACCESS
  • Locked
    9.  Kubernetes Security Planning
    7m 35s
    Learn how to summarize how to design a new security plan for a new Kubernetes-based deployment. FREE ACCESS
  • Locked
    10.  Configuring Kubernetes Pod Security
    8m 57s
    In this video, you will learn how to configure a security context for a Pod. FREE ACCESS
  • Locked
    11.  Configuring Kubernetes Pod Policies
    7m 43s
    During this video, you will discover how to configure a Pod security policy. FREE ACCESS
  • Locked
    12.  Using Kubernetes Role-based Access Control
    19m 39s
    In this video, you will learn how to use role-based access control with Kubernetes. FREE ACCESS
  • Locked
    13.  Restricting Container Access to Resources
    8m 5s
    Discover how to use AppArmor to restrict a container's access to resources. FREE ACCESS
  • Locked
    14.  Course Summary
    47s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.5 of 106 users Rating 4.5 of 106 users (106)
Rating 4.7 of 90 users Rating 4.7 of 90 users (90)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 39 users Rating 4.5 of 39 users (39)
Rating 4.2 of 28 users Rating 4.2 of 28 users (28)
Rating 4.1 of 100 users Rating 4.1 of 100 users (100)