YoVDO

Securing an EKS Cluster

Offered By: Pluralsight

Tags

Amazon Web Services (AWS) Courses Kubernetes Courses Amazon Elastic Kubernetes Service (EKS) Courses

Course Description

Overview

This course will teach you the security compliance concepts of the Kubernetes cluster, how to secure microservices at scale and
Ensure the safety of the cluster from any security or third-party violations.

Being a DevSecOps professional you need to secure the microservices hosted on cloud or on-prem with efficient security tactics. In this course, Securing an EKS Cluster, you’ll learn to manage, secure and control microservices. First, you’ll explore Kubernetes and the administration of its cluster. Next, you’ll discover the security and IAM aspects of the Kubernetes Cluster. Finally, you’ll learn how to incorporate security and system network policies within Kubernetes. When you’re finished with this course, you’ll have the skills and knowledge of Securing Applications in Kubernetes Cluster needed to run microservices securely with the least possible privileges.

Syllabus

  • Course Overview 1min
  • Understanding IAM User, Role, and Group 20mins
  • Demystifying Kubernetes Security for Applications 12mins
  • Understanding Kubeconfig 11mins
  • Granting Admin Access to Other Users 10mins
  • Granting Granular Access to Other Users Using RBAC 10mins

Taught by

Tapan Ghatalia

Related Courses

A Beginner's Guide to Kubernetes for Container Orchestration
Packt via FutureLearn
A Day in the Life of a Data Engineer (Indonesian)
Amazon Web Services via AWS Skill Builder
A Day in the Life of a Data Engineer (Japanese)
Amazon Web Services via AWS Skill Builder
A Day in the Life of a Data Engineer (Simplified Chinese)
Amazon Web Services via AWS Skill Builder
Accessing your AWS EC2 servers
Coursera Project Network via Coursera