Advanced Kubernetes Skills: Security Considerations
Kubernetes
| Intermediate
- 14 videos | 1h 41m 24s
- Includes Assessment
- Earns a Badge
While Kubernetes introduces many capabilities, if developers aren't prudent, it can also introduce security risks. Use this course to learn the top security considerations with Kubernetes deployments and how to tackle them. Explore traditional application security as well as the 4C's of cloud-native security. Investigate the most crucial security concerns when migrating to the cloud. See the security vulnerabilities related to Kubernetes clusters, containers, scalability, and automation as well as those related to software code. Moving on, discover the security features in Amazon Elastic Kubernetes Service and Azure Kubernetes Service. Learn how Packer and Ansible can be used to security-harden your Kubernetes deployments and Calico to manage security policies. Also, explore several security design patterns. Upon completion, you'll be able to ensure your Kubernetes deployments pose a low-security risk to your organization.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe historical application security for client-server applications and web applications and identify some of the most common security issuesOutline the 4c's of cloud-native security and how cloud providers, such as aws and azure, implement this securityRecognize some of the main security concerns and vulnerabilities faced when migrating to the cloudIdentify some of the main kubernetes cluster security concerns that make kubernetes vulnerable to attacksIdentify some of the main kubernetes container security concerns that make kubernetes vulnerable to attacksDescribe some of the vulnerabilities and concerns that allows software code to become vulnerable to attacks
-
List the security features available with amazon elastic kubernetes serviceList the security features available with azure kubernetes serviceSummarize how scalability and automation of kubernetes increases security riskOutline how packer and ansible can be used to security-harden your kubernetes deploymentsDetail several security design patternsOutline how security policies are managed by calicoSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 49s
-
7m 53sDuring this video, you will discover historical application security for client-server applications and web applications, and identify some of the most common security issues. FREE ACCESS
-
8m 36sIn this video, you will learn how to outline the 4C's of cloud-native security and how cloud providers, such as AWS and Azure, implement this security. FREE ACCESS
-
9m 21sDiscover how to recognize some of the main security concerns and vulnerabilities faced when migrating to the cloud. FREE ACCESS
-
9m 3sIn this video, you will identify some of the main Kubernetes cluster security concerns that make Kubernetes vulnerable to attacks. FREE ACCESS
-
9m 55sAfter completing this video, you will be able to identify some of the main Kubernetes container security concerns that make Kubernetes vulnerable to attacks. FREE ACCESS
-
8m 59sIn this video, find out how to describe some of the vulnerabilities and concerns that allow software code to become vulnerable to attacks. FREE ACCESS
-
7m 26sUpon completion of this video, you will be able to list the security features available with Amazon Elastic Kubernetes Service. FREE ACCESS
-
8m 31sDuring this video, you will learn how to list the security features available with Azure Kubernetes Service. FREE ACCESS
-
8m 27sFind out how scalability and automation of Kubernetes increases security risk. FREE ACCESS
-
9m 15sLearn how to outline how to use Packer and Ansible to security-harden your Kubernetes deployments. FREE ACCESS
-
6m 58sIn this video, you will learn how to detail several security design patterns. FREE ACCESS
-
4m 31sDuring this video, you will discover how to outline how security policies are managed by Calico. FREE ACCESS
-
41sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.