Advanced Kubernetes Skills: Security Considerations
Kubernetes 1.20
| Intermediate
- 14 Videos | 1h 41m 24s
- Includes Assessment
- Earns a Badge
While Kubernetes introduces many capabilities, if developers aren't prudent, it can also introduce security risks. Use this course to learn the top security considerations with Kubernetes deployments and how to tackle them. Explore traditional application security as well as the 4C's of cloud-native security. Investigate the most crucial security concerns when migrating to the cloud. See the security vulnerabilities related to Kubernetes clusters, containers, scalability, and automation as well as those related to software code. Moving on, discover the security features in Amazon Elastic Kubernetes Service and Azure Kubernetes Service. Learn how Packer and Ansible can be used to security-harden your Kubernetes deployments and Calico to manage security policies. Also, explore several security design patterns. Upon completion, you'll be able to ensure your Kubernetes deployments pose a low-security risk to your organization.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe historical application security for client-server applications and web applications and identify some of the most common security issuesoutline the 4C's of cloud-native security and how cloud providers, such as AWS and Azure, implement this securityrecognize some of the main security concerns and vulnerabilities faced when migrating to the cloudidentify some of the main Kubernetes cluster security concerns that make Kubernetes vulnerable to attacksidentify some of the main Kubernetes container security concerns that make Kubernetes vulnerable to attacksdescribe some of the vulnerabilities and concerns that allows software code to become vulnerable to attacks
-
list the security features available with Amazon Elastic Kubernetes Servicelist the security features available with Azure Kubernetes Servicesummarize how scalability and automation of Kubernetes increases security riskoutline how Packer and Ansible can be used to security-harden your Kubernetes deploymentsdetail several security design patternsoutline how security policies are managed by Calicosummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 49sUP NEXT
-
2.Legacy Application Security7m 53s
-
3.Cloud-native Security8m 36s
-
4.Cloud Security Attack Vectors9m 21s
-
5.Kubernetes Cluster Security Concerns9m 3s
-
6.Kubernetes Container Security Concerns9m 55s
-
7.Code Security Concerns8m 59s
-
8.Amazon Elastic Kubernetes Service Security Features7m 26s
-
9.Security Features in Azure Kubernetes Service8m 31s
-
10.Kubernetes Scalability and Automation Security Risks8m 27s
-
11.Kubernetes Security Hardening9m 15s
-
12.Security Design Patterns6m 58s
-
13.Kubernetes Security Policy Tools - Calico4m 31s
-
14.Course Summary41s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.