YoVDO

Kubernetes Security Best Practices You Need to Know - The Guide for Securing Your K8s Cluster

Offered By: TechWorld with Nana via YouTube

Tags

Kubernetes Courses Security Policies Courses Kubernetes Security Courses Role-Based Access Control (RBAC) Courses

Course Description

Overview

Learn essential Kubernetes security best practices in this comprehensive video tutorial. Discover top 10 strategies for securing your K8s cluster, including image scanning, running as non-root user, implementing RBAC for user permissions, utilizing network policies, encrypting communication, securing secret data and etcd, automating backup and restore processes, configuring security policies, and preparing for disaster recovery. Gain valuable insights into cloud security challenges and understand how to effectively protect your Kubernetes deployments from potential threats.

Syllabus

- Intro.
- Security in Cloud in general.
- Security in Kubernetes.
- Security as a Spectrum.
- BP 1 - Image Scanning.
- BP 2 - Run as Non-Root User.
- BP 3 - Users & Permissions with RBAC.
- BP 4 - Use Network Policies.
- BP 5 - Encrypt Communication.
- BP 6 - Secure Secret Data.
- BP 7 - Secure etcd.
- BP 8 - Automated Backup & Restore.
- BP 9 - Configure Security Policies.
- BP 10 - Disaster Recovery.


Taught by

TechWorld with Nana

Related Courses

Secure Networked System with Firewall and IDS
University of Colorado System via Coursera
Introduction to Cyber Security
Uttarakhand Open University, Haldwani via Swayam
Preparing for the Google Cloud Professional Data Engineer Exam 日本語版
Google Cloud via Coursera
Jump Start: Maestro Hyperscale Network Security
Checkpoint via edX
Information Security - Introduction to Information Security
New York University (NYU) via edX