Advanced Kubernetes Skills: Security Considerations

Kubernetes    |    Intermediate
  • 14 videos | 1h 41m 24s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 37 users Rating 4.5 of 37 users (37)
While Kubernetes introduces many capabilities, if developers aren't prudent, it can also introduce security risks. Use this course to learn the top security considerations with Kubernetes deployments and how to tackle them. Explore traditional application security as well as the 4C's of cloud-native security. Investigate the most crucial security concerns when migrating to the cloud. See the security vulnerabilities related to Kubernetes clusters, containers, scalability, and automation as well as those related to software code. Moving on, discover the security features in Amazon Elastic Kubernetes Service and Azure Kubernetes Service. Learn how Packer and Ansible can be used to security-harden your Kubernetes deployments and Calico to manage security policies. Also, explore several security design patterns. Upon completion, you'll be able to ensure your Kubernetes deployments pose a low-security risk to your organization.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe historical application security for client-server applications and web applications and identify some of the most common security issues
    Outline the 4c's of cloud-native security and how cloud providers, such as aws and azure, implement this security
    Recognize some of the main security concerns and vulnerabilities faced when migrating to the cloud
    Identify some of the main kubernetes cluster security concerns that make kubernetes vulnerable to attacks
    Identify some of the main kubernetes container security concerns that make kubernetes vulnerable to attacks
    Describe some of the vulnerabilities and concerns that allows software code to become vulnerable to attacks
  • List the security features available with amazon elastic kubernetes service
    List the security features available with azure kubernetes service
    Summarize how scalability and automation of kubernetes increases security risk
    Outline how packer and ansible can be used to security-harden your kubernetes deployments
    Detail several security design patterns
    Outline how security policies are managed by calico
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 49s
  • 7m 53s
    During this video, you will discover historical application security for client-server applications and web applications, and identify some of the most common security issues. FREE ACCESS
  • Locked
    3.  Cloud-native Security
    8m 36s
    In this video, you will learn how to outline the 4C's of cloud-native security and how cloud providers, such as AWS and Azure, implement this security. FREE ACCESS
  • Locked
    4.  Cloud Security Attack Vectors
    9m 21s
    Discover how to recognize some of the main security concerns and vulnerabilities faced when migrating to the cloud. FREE ACCESS
  • Locked
    5.  Kubernetes Cluster Security Concerns
    9m 3s
    In this video, you will identify some of the main Kubernetes cluster security concerns that make Kubernetes vulnerable to attacks. FREE ACCESS
  • Locked
    6.  Kubernetes Container Security Concerns
    9m 55s
    After completing this video, you will be able to identify some of the main Kubernetes container security concerns that make Kubernetes vulnerable to attacks. FREE ACCESS
  • Locked
    7.  Code Security Concerns
    8m 59s
    In this video, find out how to describe some of the vulnerabilities and concerns that allow software code to become vulnerable to attacks. FREE ACCESS
  • Locked
    8.  Amazon Elastic Kubernetes Service Security Features
    7m 26s
    Upon completion of this video, you will be able to list the security features available with Amazon Elastic Kubernetes Service. FREE ACCESS
  • Locked
    9.  Security Features in Azure Kubernetes Service
    8m 31s
    During this video, you will learn how to list the security features available with Azure Kubernetes Service. FREE ACCESS
  • Locked
    10.  Kubernetes Scalability and Automation Security Risks
    8m 27s
    Find out how scalability and automation of Kubernetes increases security risk. FREE ACCESS
  • Locked
    11.  Kubernetes Security Hardening
    9m 15s
    Learn how to outline how to use Packer and Ansible to security-harden your Kubernetes deployments. FREE ACCESS
  • Locked
    12.  Security Design Patterns
    6m 58s
    In this video, you will learn how to detail several security design patterns. FREE ACCESS
  • Locked
    13.  Kubernetes Security Policy Tools - Calico
    4m 31s
    During this video, you will discover how to outline how security policies are managed by Calico. FREE ACCESS
  • Locked
    14.  Course Summary
    41s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.4 of 54 users Rating 4.4 of 54 users (54)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 811 users Rating 4.3 of 811 users (811)
Rating 4.6 of 53 users Rating 4.6 of 53 users (53)
Rating 4.2 of 31 users Rating 4.2 of 31 users (31)