YoVDO

Securing an EKS Cluster

Offered By: Pluralsight

Tags

Amazon Web Services (AWS) Courses Kubernetes Courses Amazon Elastic Kubernetes Service (EKS) Courses

Course Description

Overview

This course will teach you the security compliance concepts of the Kubernetes cluster, how to secure microservices at scale and
Ensure the safety of the cluster from any security or third-party violations.

Being a DevSecOps professional you need to secure the microservices hosted on cloud or on-prem with efficient security tactics. In this course, Securing an EKS Cluster, you’ll learn to manage, secure and control microservices. First, you’ll explore Kubernetes and the administration of its cluster. Next, you’ll discover the security and IAM aspects of the Kubernetes Cluster. Finally, you’ll learn how to incorporate security and system network policies within Kubernetes. When you’re finished with this course, you’ll have the skills and knowledge of Securing Applications in Kubernetes Cluster needed to run microservices securely with the least possible privileges.

Syllabus

  • Course Overview 1min
  • Understanding IAM User, Role, and Group 20mins
  • Demystifying Kubernetes Security for Applications 12mins
  • Understanding Kubeconfig 11mins
  • Granting Admin Access to Other Users 10mins
  • Granting Granular Access to Other Users Using RBAC 10mins

Taught by

Tapan Ghatalia

Related Courses

Communicating Data Science Results
University of Washington via Coursera
Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud
University of Illinois at Urbana-Champaign via Coursera
Cloud Computing Infrastructure
University System of Maryland via edX
Google Cloud Platform for AWS Professionals
Google via Coursera
Introduction to Apache Spark and AWS
University of London International Programmes via Coursera