Certified Kubernetes Security Specialist (CKS) Course

Certified Kubernetes Security Specialist CKS Course

File Size: 2.12 GB

Creat Time: 2024-06-04 08:55:34

Last Active: 2024-11-09 06:54:34

Active Degree: 171

Magnet Link: Magnet LinkMagnet Link

Statement: This site does not provide download links, only text displays, and does not contain any infringement.

File List:

  1. Chapter 22 Behavioral Analytics at Host and Container Level/007. Change Falco Rules.mp4 108.63 MB
  2. Chapter 2 Create Kubernetes Cluster/001. Create Kubernetes Cluster and Look at Some Errors.mp4 85.25 MB
  3. Chapter 11 Cluster Hardening – Restrict API Access/002. Let's Perform a Manual API Request.mp4 75.34 MB
  4. Chapter 9 Cluster Hardening - RBAC/005. CertificateSigningRequests.mp4 71.39 MB
  5. Chapter 11 Cluster Hardening – Restrict API Access/003. External APIserver Access.mp4 68.86 MB
  6. Chapter 22 Behavioral Analytics at Host and Container Level/002. Strace and proc on ETCD.mp4 66.80 MB
  7. Chapter 12 Cluster Hardening – Upgrade Kubernetes/004. Upgrade Master and Worker Node.mp4 60.03 MB
  8. Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/004. ETCD Encryption.mp4 58.69 MB
  9. Chapter 10 Exercise Caution in Using Service Accounts/002. Pod Uses Custom ServiceAccount.mp4 56.34 MB
  10. Chapter 7 Use CIS Benchmark to Review the Security Configuration of Kubernetes Components/001. kube-bench.mp4 56.02 MB
  11. Chapter 18 Supply Chain Security – Image Footprint/002. Secure and Harden Images.mp4 50.52 MB
  12. Chapter 3 Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/004. Create Another Network Policy for Different Name Space.mp4 46.27 MB
  13. Chapter 21 Supply Chain Security – Secure Supply Chain/001. Image Digest.mp4 44.69 MB
  14. Chapter 22 Behavioral Analytics at Host and Container Level/004. FALCO.mp4 44.36 MB
  15. Chapter 24 Runtime Security - Auditing/003. Enable Audit Logging in Apiserver.mp4 41.45 MB
  16. Chapter 22 Behavioral Analytics at Host and Container Level/005. Use Falco to Find Malicious Processes.mp4 39.67 MB
  17. Chapter 22 Behavioral Analytics at Host and Container Level/001. Strace.mp4 39.17 MB
  18. Chapter 16 Microservices Vulnerabilities – mTLS/002. Create a Sidecar Proxy.mp4 38.96 MB
  19. Chapter 15 Microservices Vulnerabilities – OS Level Security Domains/005. Create and Enable PodSecurityPolicy.mp4 38.79 MB
  20. Chapter 5 Cluster Setup – Properly Set Up Ingress Objects with Security Control/002. Secure an Ingress.mp4 38.27 MB
  21. Chapter 5 Cluster Setup – Properly Set Up Ingress Objects with Security Control/001. Create an Ingress.mp4 37.45 MB
  22. Chapter 17 Open Policy Agent (OPA)/003. Deny All Policy.mp4 36.66 MB
  23. Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/005. ETCD Encryption -2.mp4 34.89 MB
  24. Chapter 22 Behavioral Analytics at Host and Container Level/003. Access proc and env Variables from the Inside Pod.mp4 32.41 MB
  25. Chapter 12 Cluster Hardening – Upgrade Kubernetes/003. Create a Cluster with the Old Version.mp4 31.09 MB
  26. Chapter 21 Supply Chain Security – Secure Supply Chain/002. Whitelist Registries with OPA.mp4 29.26 MB
  27. Chapter 25 System Hardening – Kernel Hardening/002. AppArmor for Curl.mp4 29.22 MB
  28. Chapter 23 Runtime Security – Immutability of Containers at Runtime/003. SecurityContext Renders Container Immutable.mp4 27.89 MB
  29. Chapter 17 Open Policy Agent (OPA)/002. Install OPA Gatekeeper.mp4 27.67 MB
  30. Chapter 18 Supply Chain Security – Image Footprint/001. Reduce Image Footprint with Multi-Stage.mp4 27.00 MB
  31. Chapter 11 Cluster Hardening – Restrict API Access/001. EnableDisable Anonymous Access.mp4 26.87 MB
  32. Chapter 10 Exercise Caution in Using Service Accounts/003. Disable ServiceAccount Mounting.mp4 26.79 MB
  33. Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/003. Hack Secrets in ETCD.mp4 26.35 MB
  34. Chapter 20 Supply Chain Security – Image Vulnerability Scanning/001. Use Trivy to Scan Images.mp4 25.60 MB
  35. Chapter 8 Verify Platform Binaries before Deploying/002. Verify apiserver Binary Running in Our Cluster.mp4 25.43 MB
  36. Chapter 19 Supply Chain Security – Static Analysis/003. OPA Conftest.mp4 24.74 MB
  37. Chapter 3 Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/003. Create Egress and Ingress Rules.mp4 23.93 MB
  38. Chapter 25 System Hardening – Kernel Hardening/007. Seccomp for Kubernetes Nginx.mp4 23.90 MB
  39. Chapter 9 Cluster Hardening - RBAC/001. RBAC - Role and Rolebinding.mp4 23.53 MB
  40. Chapter 12 Cluster Hardening – Upgrade Kubernetes/001. Verify NodeRestriction.mp4 22.81 MB
  41. Chapter 9 Cluster Hardening - RBAC/002. Role and Rolebinding for a User.mp4 22.72 MB
  42. Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/001. Create Secret.mp4 22.58 MB
  43. Chapter 22 Behavioral Analytics at Host and Container Level/006. Investigate Falco Rules.mp4 22.48 MB
  44. Chapter 3 Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/002. Create Default Deny NetworkPolicy.mp4 19.84 MB
  45. Chapter 25 System Hardening – Kernel Hardening/004. AppArmor for Kubernetes Nginx.mp4 19.78 MB
  46. Chapter 14 Use Container Runtime Sandboxes in a Multi-Tenant Environment/004. Create and Use RuntimeClasses.mp4 18.89 MB
  47. Chapter 23 Runtime Security – Immutability of Containers at Runtime/002. StartupProbe.mp4 18.62 MB
  48. Chapter 19 Supply Chain Security – Static Analysis/002. Use kubesec to Perform Static Analysis Using Docker Image.mp4 18.61 MB
  49. Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/002. Hack Secrets in Docker.mp4 18.55 MB
  50. Chapter 15 Microservices Vulnerabilities – OS Level Security Domains/001. Set Container User and Group (Security Context).mp4 18.09 MB