YoVDO

Kubernetes Security: Implementing Monitoring, Logging, and Runtime Security

Offered By: Pluralsight

Tags

Kubernetes Security Courses Containers Courses Threat Identification Courses Runtime Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will teach you how to log and monitor security configurations in your Kubernetes clusters.

Kubernetes is an open-source system for automating deployment, scaling and management of containerized applications. In this course, Kubernetes Security: Implementing Monitoring, Logging, and Runtime Security, you’ll learn to log and monitor security incidents in your kubernetes clusters. First, you’ll explore how to identify threads at runtime using Falco. Next, you’ll discover the benefits of immutable architectures and containers. Finally, you’ll learn how to configure and use the audit logs to monitor the access to kubernetes. When you’re finished with this course, you’ll have the skills and knowledge of kubernetes needed to monitor and log security incidents at runtime.

Syllabus

  • Course Overview 1min
  • Runtime Threats Identification 12mins
  • Immutable Architecture and Containers 6mins
  • Kubernetes Auditing 7mins

Taught by

Pluralsight

Related Courses

Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera
Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms
Elastic Cloud Infrastructure: Containers and Services
Google Cloud via Coursera
Architecting Distributed Cloud Applications
Microsoft via edX
DevOps Practices and Principles
Microsoft via edX