Securing Containers and Kubernetes Ecosystem
Offered By: LinkedIn Learning
Course Description
Overview
Learn best practices and security controls for containers and the Kubernetes ecosystem using a simple five-factor security model.
Syllabus
Introduction
- Protect your containers and Kubernetes ecosystem
- What you need to know
- What are containers?
- Virtualization
- Isolation and OS security features
- Container runtime
- What is Kubernetes?
- Kubernetes master node
- Kubernetes worker node
- Overall technology architecture
- Container deployment and orchestration lifecycle
- Attack surface and vectors
- Five factors
- Secure design before code
- Secure code
- Secure container images, part 1
- Secure container images, part 2
- Image registries
- Image registry access control
- Container working environment
- Container network security
- Container port and interface security
- Host OS protection
- Securing applications in Kubernetes
- Pod Security Standard
- Access management
- Authenticating users
- Authenticating service accounts
- Authorization
- Admission control
- Security context
- Security Policy
- Kubernetes network security
- Secrets management
- Cluster security goals
- Securing API server traffic
- Securing cluster components
- Infrastructure security
- Logging and monitoring
- Next steps
Taught by
Sam Sehgal
Related Courses
Fundamentals of Containers, Kubernetes, and Red Hat OpenShiftRed Hat via edX Configuration Management for Containerized Delivery
Microsoft via edX Getting Started with Google Kubernetes Engine - Español
Google Cloud via Coursera Getting Started with Google Kubernetes Engine - 日本語版
Google Cloud via Coursera Architecting with Google Kubernetes Engine: Foundations en Español
Google Cloud via Coursera