YoVDO

Kubernetes Security: Cluster Setup

Offered By: Pluralsight

Tags

Kubernetes Courses Kubernetes Security Courses

Course Description

Overview

Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This course will teach you how to perform a secure set-up of the Kubernetes cluster.

Like any other technology, if Kubernetes is not implemented correctly, it can be vulnerable to security threats. In this course, Kubernetes Security: Cluster Setup, you’ll learn to how to perform a secure set-up for your Kubernetes cluster. First, you’ll explore how the API traffic flows between components and learn how to encrypt it and restrict the traffic calls. Next, you’ll discover best practices to have in mind while securing the kubelet component. Finally, you’ll learn how to review the cluster security using the kube-bench open source tool to make sure your cluster set-up is not vulnerable. When you’re finished with this course, you’ll have the skills and knowledge of Kubernetes and security best practices needed to bootstrap a secure Kubernetes cluster.

Syllabus

  • Course Overview 1min
  • Encrypt All API Traffic 18mins
  • Restrict Network Traffic 9mins
  • Secure Kubelet 4mins
  • Review Cluster Security with Kube-bench 5mins

Taught by

Antonio Jesús Piedra

Related Courses

Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera
Architecting Google Kubernetes Engine Production in italiano
Google Cloud via Coursera
Hardening Default GKE Cluster Configurations
Google Cloud via Coursera
Palo Alto Networks VM-Series Firewall: Securing the GKE Perimeter
Google Cloud via Coursera
Configuring and Managing Kubernetes Security
Pluralsight