SPRING TRAINING SALE: Get 20% OFF any course until May 15th. Use promo code “mirantis20” | Sign Up Today

CN330:

Advanced Kubernetes Security

Develop the skills and knowledge needed for implementing security measures from code to a production Kubernetes cluster.

Description

Advanced Kubernetes Security course focuses on developing the skills and knowledge needed for implementing security measures from code to a production Kubernetes cluster. Students will engage in topics pertaining to adding security mechanisms along the code deployment pipeline and reviewing and remediating security concerns within a Kubernetes infrastructure. Topics include declarative configuration analysis, container image scanning, CIS benchmark scanning and remediation, and identifying and mitigating attack vectors within Kubernetes. Kubernetes Operations and System Integration teams will benefit greatly as they work towards creating a security posture that aligns with security policies for their Kubernetes environments.

At the end of this course, you will have the knowledge and skills that will aid in passing theCKS: Certified Kubernetes Security exam

Who Should Attend

This course is targeted at students with the following:

  • Motivations: Responsibility for implementing security mechanisms along the code deployment pipeline and within the Kubernetes environment; Running and reporting on security state of the Kubernetes environment

  • Roles: Infrastructure and Integration engineers tasked with implementing, running, and reporting on security posture of Kubernetes environment; Developers who are tasked with scanning and remediating security issues within application coding; IT professionals looking to expand their skills in Kubernetes security

Lab Requirements

  • Laptop with WiFi connectivity

  • Attendees should have the latest Chrome or Firefox installed, and a free account at strigo.io.

Course Objectives

  • Kubernetes Threat Model and Security Maturity

  • System Hardening

  • Overview of Cluster Security objects

  • Cluster Hardening

  • Minimizing Microservice Vulnerabilities

  • Securing the Container Supply Chain

  • Monitoring, Logging and Runtime Security

View public class Schedule Request Private training