course

Home / Courses / Certified Kubernetes Security Specialist (CKS)

Course Objectives

In this course, students will learn and practice essential Kubernetes concepts and tasks in the following sections:

  • Cloud Security Fundamentals Cluster Hardening System Hardening Minimize Microservice Vulnerabilities Supply Chain Security Disaster Recovery Secure Back
  • up and Restore

Agenda

  • Underlying Infrastructure
  • Using Vim
  • Tmux

  • Basic Principles
  • Threat Analysis
  • Approach
  • CIS Benchmarks

  • Kubernetes Architecture
  • Pods and the Control Plane
  • Kubernetes Security Concepts

  • Configure Network Plugin Requirements
  • Kubeadm Basic Cluster
  • Installing Kubeadm
  • Join Node to Cluster
  • Kubeadm Token
  • Manage Kubeadm Tokens
  • Kubeadm Cluster Upgrade

  • Configuring the kube-apiserver
  • Enable Audit Logging
  • Falco
  • Deploy Falco to Monitor System Calls
  • Enable Pod Security Policies
  • Encrypt Data at Rest
  • Encryption Configuration
  • Benchmark Cluster with Kube-Bench
  • Kube-Bench

  • ETCD Isolation
  • ETCD Disaster Recovery
  • ETCD Snapshot and Restore

  • Purge Kubeadm
  • 3Purge Kubeadm

  • Container Essentials
  • Secure Containers
  • Creating a Docker Image
  • Scanning with Trivy
  • Trivy
  • Snyk Security

  • Kubernetes the Alta3 Way
  • Deploy Kubernetes the Alta3 Way
  • Validate your Kubernetes Installation
  • Sonobuoy K8s Validation Test

  • Kubectl get and sorting
  • kubectl get
  • kubectl describe

  • Labels
  • Labels and Selectors
  • Annotations
  • Insert an Annotation

  • Scan a Running Container
  • Tracee
  • Security Contexts for Pods
  • Understanding Security Contexts
  • AppArmor Profiles
  • AppArmor
  • Isolate Container Kernels
  • gVisor

  • Pod Security Policies
  • Deploy a PSP
  • Pod Security Standards
  • Enable PSS

  • Admission Controller
  • Create a LimitRange
  • Open Policy Agent
  • Policy as Code
  • Deploy Gatekeeper

  • Contexts
  • Contexts
  • Authentication and Authorization
  • Role Based Access Control
  • Role Based Access Control
  • RBAC Distributing Access
  • Service Accounts
  • Limit Pod Service Accounts

  • Secrets
  • Create and Consume Secrets
  • Hashicorp Vault
  • Deploy Vault

  • Networking Plugins
  • NetworkPolicy
  • Deploy a NetworkPolicy
  • mTLS
  • Linkerd
  • mTLS with istio
  • istio

  • Active Threat Analysis
  • Host Intrusion Detection
  • Deploy OSSEC
  • Network Intrusion Detection
  • Deploy Suricata
  • Physical Intrusion Detection

  • Harsh Reality of Security
  • Deploy a Response Plan
  • Kasten K10 Backups
  • Deploy K10
Tags
Technical Core Type: Core 0 Product Line: AWS Vendor: Alta3
FREE

Interested in course?


Course Type: Instructor Led