Securing Containers and Kubernetes Ecosystem
Offered By: LinkedIn Learning
Course Description
Overview
Learn best practices and security controls for containers and the Kubernetes ecosystem using a simple five-factor security model.
Syllabus
Introduction
- Protect your containers and Kubernetes ecosystem
- What you need to know
- What are containers?
- Virtualization
- Isolation and OS security features
- Container runtime
- What is Kubernetes?
- Kubernetes master node
- Kubernetes worker node
- Overall technology architecture
- Container deployment and orchestration lifecycle
- Attack surface and vectors
- Five factors
- Secure design before code
- Secure code
- Secure container images, part 1
- Secure container images, part 2
- Image registries
- Image registry access control
- Container working environment
- Container network security
- Container port and interface security
- Host OS protection
- Securing applications in Kubernetes
- Pod Security Standard
- Access management
- Authenticating users
- Authenticating service accounts
- Authorization
- Admission control
- Security context
- Security Policy
- Kubernetes network security
- Secrets management
- Cluster security goals
- Securing API server traffic
- Securing cluster components
- Infrastructure security
- Logging and monitoring
- Next steps
Taught by
Sam Sehgal
Related Courses
A Hands-On Look at Amazon Q Business ExpertAmazon Web Services via AWS Skill Builder À la découverte des télécommunications
Institut Mines-Télécom via France Université Numerique A Tour of Google Cloud Sustainability
Google via Google Cloud Skills Boost Intel® Telco Cloud Academy
Intel via Coursera Accéder à Internet depuis Lambda dans un VPC (Français) | Accessing the Internet from Lambda in a VPC (French)
Amazon Web Services via AWS Skill Builder