Kubernetes Administrator 2024: Kubernetes Security

Kubernetes 2024    |    Intermediate
  • 12 videos | 1h 2m 39s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
PKI certificates are used to secure computing environments in a wide variety of ways, such as through TLS to secure HTTP-based network communications. In this course, explore the PKI hierarchy, the packet exchange in a TLS connection, and how Kubernetes uses PKI certificates. Next, learn how to use OpenSSL to create a private CA, acquire a user certificate from that CA, and configure a TLS certificate as a Kubernetes Secret. Finally, discover how role-based access control (RBAC) is used to limit access to Kubernetes components, create a service account, manage roles and cluster roles, and manage RBAC bindings. This course can be used to prepare for the Certified Kubernetes Administrator (CKA) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the role of public key infrastructure (pki) and certificates in security
    Recall how transport layer security (tls) connections are established over the network
    Use openssl to create a private certificate authority (ca)
    Acquire a user certificate using openssl
    Add a tls certificate as a kubernetes secret
  • Recognize how to control cluster resource access using role-based access control (rbac)
    Create a kubernetes service account
    Manage kubernetes rbac roles
    Create kubernetes rbac cluster roles
    Restrict access to kubernetes objects for specific users with rbac bindings
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 12s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 8s
    Upon completion of this video, you will be able to outline the role of public key infrastructure (PKI) and certificates in security. FREE ACCESS
  • Locked
    3.  TLS Connections
    5m 46s
    After completing this video, you will be able to recall how Transport Layer Security (TLS) connections are established over the network. FREE ACCESS
  • Locked
    4.  Creating a Private CA Using OpenSSL
    8m 22s
    During this video, discover how to use OpenSSL to create a private certificate authority (CA). FREE ACCESS
  • Locked
    5.  Acquiring a User Certificate Using OpenSSL
    7m 15s
    In this video, find out how to acquire a user certificate using OpenSSL. FREE ACCESS
  • Locked
    6.  Configuring a TLS Certificate Using Secrets
    4m 8s
    During this video, you will learn how to add a TLS certificate as a Kubernetes Secret. FREE ACCESS
  • Locked
    7.  Kubernetes Role-based Access Control (RBAC)
    6m 45s
    Upon completion of this video, you will be able to recognize how to control cluster resource access using role-based access control (RBAC). FREE ACCESS
  • Locked
    8.  Creating Kubernetes Service Accounts
    4m 53s
    In this video, learn how to create a Kubernetes service account. FREE ACCESS
  • Locked
    9.  Managing RBAC Roles
    4m 10s
    During this video, discover how to manage Kubernetes RBAC roles. FREE ACCESS
  • Locked
    10.  Creating RBAC Cluster Roles
    5m 4s
    In this video, find out how to create Kubernetes RBAC cluster roles. FREE ACCESS
  • Locked
    11.  Managing User RBAC Bindings
    5m 54s
    After completing this video, you will be able to restrict access to Kubernetes objects for specific users with RBAC bindings. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 3s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.7 of 41 users Rating 4.7 of 41 users (41)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)