Advanced Kubernetes Skills: Designing & Building Kubernetes Solutions
Kubernetes
| Expert
- 14 videos | 1h 53m 23s
- Includes Assessment
- Earns a Badge
If the security of your containerized systems and networks is important to you, then you need to implement appropriate security measures throughout the design and build of your Kubernetes solutions. Use this course to learn how to do this. Examine common Kubernetes security issues and exploits. Learn how Pods and clusters are secured. Additionally, explore security considerations and procedures related to Kubernetes deployments and the Kubernetes API. As you advance, learn how to audit a Kubernetes-based deployment, determine security risks, and design a security plan for new deployments. Practice configuring a security context and security policy for a Pod. Use role-based access control with Kubernetes. And restrict a container's access to resources by using AppArmor. Upon completion, you'll be able to greatly reduce your Kubernetes environment's vulnerability to unauthorized access and security attacks.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseSummarize common security issues and exploits when using kubernetesOutline how security contexts are normally applied to pods in kubernetesDescribe the authentication and authorization process for using the kubernetes apiDescribe the process for securing a kubernetes clusterList some common security considerations and problems with kubernetes deployments, with reference to apis, node access, cloud provider apis, and encryptionOutline the process for auditing a kubernetes-based deployment for security concerns
-
Describe the process and steps to follow when determining security risks with kubernetesSummarize how to design a new security plan for new kubernetes-based deploymentConfigure a security context for a podConfigure a pod security policyUse role-based access control with kubernetesUse apparmor to restrict a container's access to resourcesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 44s
-
9m 20sDiscover how to summarize common security issues and exploits when using Kubernetes. FREE ACCESS
-
6m 9sIn this video, you will outline how security contexts are normally applied to Pods in Kubernetes. FREE ACCESS
-
9m 2sAfter completing this video, you will be able to describe the authentication and authorization process for using the Kubernetes API. FREE ACCESS
-
9m 27sIn this video, find out how to describe the process for securing a Kubernetes cluster. FREE ACCESS
-
9m 51sUpon completion of this video, you will be able to list some common security considerations and problems with Kubernetes deployments, with reference to APIs, Node access, cloud provider APIs, and encryption. FREE ACCESS
-
7m 46sDuring this video, you will learn how to outline the process for auditing a Kubernetes-based deployment for security concerns. FREE ACCESS
-
7m 17sFind out how to describe the process and steps to follow when determining security risks with Kubernetes. FREE ACCESS
-
7m 35sLearn how to summarize how to design a new security plan for a new Kubernetes-based deployment. FREE ACCESS
-
8m 57sIn this video, you will learn how to configure a security context for a Pod. FREE ACCESS
-
7m 43sDuring this video, you will discover how to configure a Pod security policy. FREE ACCESS
-
19m 39sIn this video, you will learn how to use role-based access control with Kubernetes. FREE ACCESS
-
8m 5sDiscover how to use AppArmor to restrict a container's access to resources. FREE ACCESS
-
47sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.