YoVDO

Kubernetes Security: Implementing Monitoring, Logging, and Runtime Security

Offered By: Pluralsight

Tags

Kubernetes Security Courses Containers Courses Threat Identification Courses Runtime Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will teach you how to log and monitor security configurations in your Kubernetes clusters.

Kubernetes is an open-source system for automating deployment, scaling and management of containerized applications. In this course, Kubernetes Security: Implementing Monitoring, Logging, and Runtime Security, you’ll learn to log and monitor security incidents in your kubernetes clusters. First, you’ll explore how to identify threads at runtime using Falco. Next, you’ll discover the benefits of immutable architectures and containers. Finally, you’ll learn how to configure and use the audit logs to monitor the access to kubernetes. When you’re finished with this course, you’ll have the skills and knowledge of kubernetes needed to monitor and log security incidents at runtime.

Syllabus

  • Course Overview 1min
  • Runtime Threats Identification 12mins
  • Immutable Architecture and Containers 6mins
  • Kubernetes Auditing 7mins

Taught by

Pluralsight

Related Courses

Security Best Practices in Google Cloud
Google Cloud via Coursera
Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera
Configuring and Managing Kubernetes Security
Pluralsight
Security Best Practices in Google Cloud
Pluralsight
Kubernetes Security: Cluster Hardening
Pluralsight