YoVDO

Configuring and Managing Kubernetes Security

Offered By: Pluralsight

Tags

Kubernetes Security Courses Authorization Courses Role-Based Access Control Courses

Course Description

Overview

This course will teach you the fundamentals needed to configure and manage security in Kubernetes clusters.

In this course, Configuring and Managing Kubernetes Security, you’ll learn the foundations needed for securing access to your Kubernetes Cluster. First, you’ll explore Kubernetes security fundamentals, learning how authentication and authorization work to control access to the Kubernetes API. Then, you’ll learn how certificates are used in Kubernetes and how to create and manage certificates in your cluster. Next, you’ll learn how to create and manage kubeconfig files for accessing clusters and then configure cluster access for a new user. Finally, you’ll learn how to control access to the Kubernetes API with role based access controls. When you’re finished with this course you will have the skills needed to operate and manage security in Kubernetes clusters. This course can also help you prepare for your Certified Kubernetes Administrator (CKA) certification.

Syllabus

  • Course Overview 1min
  • Kubernetes Security Fundamentals 39mins
  • Managing Certificates and kubeconfig Files 55mins
  • Managing Role Based Access Controls 39mins

Taught by

Anthony Nocentino

Related Courses

Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera
Architecting Google Kubernetes Engine Production in italiano
Google Cloud via Coursera
Hardening Default GKE Cluster Configurations
Google Cloud via Coursera
Palo Alto Networks VM-Series Firewall: Securing the GKE Perimeter
Google Cloud via Coursera
Kubernetes Security: Cluster Hardening
Pluralsight