Kubernetes Security: System Hardening
Offered By: Pluralsight
Course Description
Overview
This course will teach you the concepts for securing the Kubernetes underlying infrastructure.
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. In this course, Kubernetes Security: System Hardening, you’ll learn to secure the underlying Kubernetes infrastructure. First, you’ll explore how to limit the host access and use IAM roles and policies to control what users can do in the Kubernetes nodes. Next, you’ll discover best practices to have in mind while choosing and installing the packages and services in your operating system. Finally, you’ll learn how to secure the network traffic and restrict the kernel usage to make the systems more secure. When you’re finished with this course, you’ll have the skills and knowledge of security needed to perform the hardening of the systems where your Kubernetes cluster runs.
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. In this course, Kubernetes Security: System Hardening, you’ll learn to secure the underlying Kubernetes infrastructure. First, you’ll explore how to limit the host access and use IAM roles and policies to control what users can do in the Kubernetes nodes. Next, you’ll discover best practices to have in mind while choosing and installing the packages and services in your operating system. Finally, you’ll learn how to secure the network traffic and restrict the kernel usage to make the systems more secure. When you’re finished with this course, you’ll have the skills and knowledge of security needed to perform the hardening of the systems where your Kubernetes cluster runs.
Syllabus
- Course Overview 1min
- Limit Host Access 14mins
- Manage IAM Roles and Policies 5mins
- Remove OS Attack Surface 5mins
- Secure Network Access 9mins
- Restrict the Kernel 13mins
Taught by
Antonio Jesús Piedra
Related Courses
IT Security: Defense against the digital dark artsGoogle via Coursera Linux Security and Hardening, The Practical Security Guide.
Udemy OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
LinkedIn Learning Complete Linux Security & Hardening with Practical Examples
Udemy Kubernetes Security: System Hardening
Pluralsight