Advanced Kubernetes Skills: Security Considerations

Kubernetes 1.20    |    Intermediate
  • 14 Videos | 1h 41m 24s
  • Includes Assessment
  • Earns a Badge
While Kubernetes introduces many capabilities, if developers aren't prudent, it can also introduce security risks. Use this course to learn the top security considerations with Kubernetes deployments and how to tackle them. Explore traditional application security as well as the 4C's of cloud-native security. Investigate the most crucial security concerns when migrating to the cloud. See the security vulnerabilities related to Kubernetes clusters, containers, scalability, and automation as well as those related to software code. Moving on, discover the security features in Amazon Elastic Kubernetes Service and Azure Kubernetes Service. Learn how Packer and Ansible can be used to security-harden your Kubernetes deployments and Calico to manage security policies. Also, explore several security design patterns. Upon completion, you'll be able to ensure your Kubernetes deployments pose a low-security risk to your organization.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe historical application security for client-server applications and web applications and identify some of the most common security issues
    outline the 4C's of cloud-native security and how cloud providers, such as AWS and Azure, implement this security
    recognize some of the main security concerns and vulnerabilities faced when migrating to the cloud
    identify some of the main Kubernetes cluster security concerns that make Kubernetes vulnerable to attacks
    identify some of the main Kubernetes container security concerns that make Kubernetes vulnerable to attacks
    describe some of the vulnerabilities and concerns that allows software code to become vulnerable to attacks
  • list the security features available with Amazon Elastic Kubernetes Service
    list the security features available with Azure Kubernetes Service
    summarize how scalability and automation of Kubernetes increases security risk
    outline how Packer and Ansible can be used to security-harden your Kubernetes deployments
    detail several security design patterns
    outline how security policies are managed by Calico
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 49s
    UP NEXT
  • Playable
    2. 
    Legacy Application Security
    7m 53s
  • Locked
    3. 
    Cloud-native Security
    8m 36s
  • Locked
    4. 
    Cloud Security Attack Vectors
    9m 21s
  • Locked
    5. 
    Kubernetes Cluster Security Concerns
    9m 3s
  • Locked
    6. 
    Kubernetes Container Security Concerns
    9m 55s
  • Locked
    7. 
    Code Security Concerns
    8m 59s
  • Locked
    8. 
    Amazon Elastic Kubernetes Service Security Features
    7m 26s
  • Locked
    9. 
    Security Features in Azure Kubernetes Service
    8m 31s
  • Locked
    10. 
    Kubernetes Scalability and Automation Security Risks
    8m 27s
  • Locked
    11. 
    Kubernetes Security Hardening
    9m 15s
  • Locked
    12. 
    Security Design Patterns
    6m 58s
  • Locked
    13. 
    Kubernetes Security Policy Tools - Calico
    4m 31s
  • Locked
    14. 
    Course Summary
    41s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE