• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Securing Kubernetes and Containers

Securing Kubernetes and Containers

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • Two days

  • All levels

Description

Securing Kubernetes training course description

This course introduces concepts, procedures, and best
practices to harden Kubernetes based systems and
container-based applications against security threats. It
deals with the main areas of cloud-native security:
Kubernetes cluster setup, Kubernetes cluster
hardening, hardening the underlying operating system
and networks, minimizing microservices vulnerabilities,
obtaining supply chain security as well as monitoring,
logging, and runtime security.

What will you learn

  • Harden Kubernetes systems and clusters.

  • Harden containers.

  • Configure and use Kubernetes audit logs.

Securing Kubernetes training course details

  • Who will benefit:

Technical staff working with Kubernetes

  • Prerequisites:

Kubernetes_for_engineers_course.htm

Definitive Docker for engineers

  • Duration

2 days

Securing Kubernetes training course contents

This course does not only deal with the daily security
administration of Kubernetes-based systems but also
prepares delegates for the official Certified Kubernetes
Security Specialist (CKS) exams of the Cloud Native
Computing Foundation (CNCF).
Structure: 50% theory 50% hands on lab exercise

Module 1: User and authorization management

  • Users and service accounts in Kubernetes

  • Authenticating users

  • Managing authorizations with RBAC

Module 2: Supply chain security

  • Vulnerabilit checking for images

  • Image validation in Kubernetes

  • Reducing image footprint

  • Secure image registries

Module 3: Validating cluster setup and penetration
testing

  • Use CIS benchmark to review the security
    configuration of Kubernetes components.

  • Modify the cluster components' configuration to
    match the CIS Benchmark.

  • Penetration testing Kubernetes for known
    vulnerabilities.

Module 4: System hardening

  • Use kernel hardening tools

  • Setup appropriate OS level security domains

  • Container runtime sandboxes

  • Limit network access

Module 5: Monitoring and logging

  • Configure Kubernetes audit logs

  • Configure Audit Policies

  • Monitor applications behaviour with Falco

About The Provider

Tags

Reviews