Training > Clouds & Containers > CKA-JP + CKS-JP 試験バンドル
CERTIFICATION BUNDLE

認定Kubernetes管理者 (CKA-JP) + 認定Kubernetesセキュリティスペシャリスト (CKS-JP) 試験バンドル

PLEASE NOTE: The changes to the Certified Kubernetes Administrator (CKA) exam will be released on Tuesday, February 18, 2025 00:00 UTC. Any exams taken on or after that date will reflect the changes previously communicated.

Coming Soon: The current CKS Competency “Implement Pod-to-Pod encryption using Cilium” will be updated to “Implement Pod-to-Pod encryption (Cilium, Istio)” on April 8, 2025, at 00:00 UTC.

Who Is It For

The CKA certification is for Kubernetes administrators, cloud administrators and other IT professionals who manage Kubernetes instances. A Certified Kubernetes Security Specialist (CKS) is an accomplished Kubernetes practitioner (must be CKA certified) who has demonstrated competence on a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment and runtime.
read less read more
About These Certifications

CKA was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF) as a part of their ongoing effort to help develop the Kubernetes ecosystem. The exam is an online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes. CKS is a performance-based certification exam that tests candidates' knowledge of Kubernetes and cloud security in a simulated, real world environment. Candidates must have taken and passed the Certified Kubernetes Administrator (CKA) exam prior to attempting the CKS exam. CKS-JP may be purchased but not scheduled until a CKA certification has been achieved.
read less read more
What It Demonstrates

A certified K8s administrator has demonstrated the ability to do basic installation as well as configuring and managing production-grade Kubernetes clusters. They will have an understanding of key concepts such as Kubernetes networking, storage, security, maintenance, logging and monitoring, application lifecycle, troubleshooting, API object primitives and the ability to establish basic use-cases for end users. Obtaining a CKS-JP demonstrates a candidate possesses the requisite abilities to secure container-based applications and Kubernetes platforms during build, deployment and runtime, and is qualified to perform these tasks in a professional setting.
read less read more
CKA-JP Exam Domains & Competencies
Expand All
Collapse All
Storage10%
Implement storage classes and dynamic volume provisioning
Configure volume types, access modes and reclaim policies
Manage persistent volumes and persistent volume claims
Troubleshooting30%
Troubleshoot clusters and nodes
Troubleshoot cluster components
Monitor cluster and application resource usage
Manage and evaluate container output streams
Troubleshoot services and networking
Workloads & Scheduling15%
Understand application deployments and how to perform rolling update and rollbacks
Use ConfigMaps and Secrets to configure applications
Configure workload autoscaling
Understand the primitives used to create robust, self-healing, application deployments
Configure Pod admission and scheduling (limits, node affinity, etc.)
Cluster Architecture, Installation & Configuration25%
Manage role based access control (RBAC)
Prepare underlying infrastructure for installing a Kubernetes cluster
Create and manage Kubernetes clusters using kubeadm
Manage the lifecycle of Kubernetes clusters
Implement and configure a highly-available control plane
Use Helm and Kustomize to install cluster components
Understand extension interfaces (CNI, CSI, CRI, etc.)
Understand CRDs, install and configure operators
Services & Networking20%
Understand connectivity between Pods
Define and enforce Network Policies
Use ClusterIP, NodePort, LoadBalancer service types and endpoints
Use the Gateway API to manage Ingress traffic
Know how to use Ingress controllers and Ingress resources
Understand and use CoreDNS

The Linux Foundation worked with industry experts and the Linux kernel community to identify the core domains and the critical skills, knowledge and competencies applicable to each certification. Performance-based exams were then developed based on the competencies that were identified.
CKS-JP Exam Domains & Competencies
Expand All
Collapse All
Cluster Setup15%
Use Network security policies to restrict cluster level access
Use CIS benchmark to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi)
Properly set up Ingress with TLS
Protect node metadata and endpoints
Verify platform binaries before deploying
Cluster Hardening15%
Use Role Based Access Controls to minimize exposure
Exercise caution in using service accounts e.g. disable defaults, minimize permissions on newly created ones
Restrict access to Kubernetes API
Upgrade Kubernetes to avoid vulnerabilities
System Hardening10%
Minimize host OS footprint (reduce attack surface)
Using least-privilege identity and access management
Minimize external access to the network
Appropriately use kernel hardening tools such as AppArmor, seccomp
Minimize Microservice Vulnerabilities20%
Use appropriate pod security standards
Manage Kubernetes secrets
Understand and implement isolation techniques (multi-tenancy, sandboxed containers, etc.)
Implement Pod-to-Pod encryption using Cilium
Supply Chain Security20%
Minimize base image footprint
Understand your supply chain (e.g. SBOM, CI/CD, artifact repositories)
Secure your supply chain (permitted registries, sign and validate artifacts, etc.)
Perform static analysis of user workloads and container images (e.g. Kubesec, KubeLinter)
Monitoring, Logging and Runtime Security20%
Perform behavioral analytics to detect malicious activities
Detect threats within physical infrastructure, apps, networks, data, users and workloads
Investigate and identify phases of attack and bad actors within the environment
Ensure immutability of containers at runtime
Use Kubernetes audit logs to monitor access

The Linux Foundation worked with industry experts and the Linux kernel community to identify the core domains and the critical skills, knowledge and competencies applicable to each certification. Performance-based exams were then developed based on the competencies that were identified.
Exam Details & Resources
Both the CKA and CKS exams are online, proctored, performance-based tests that requires solving multiple tasks from a command line running Kubernetes. For each exam, candidates have 2 hours to complete the tasks.

The CKA exam is based on Kubernetes v1.32
The CKS exam is based on Kubernetes v1.32

The CKS and CKA exam environments will be aligned with the most recent K8s minor version within approximately 4 to 8 weeks of the K8s release date

Certified Kubernetes Security Specialist (CKS) candidates must have taken and passed the Certified Kubernetes Administrator (CKA) exam prior to attempting the CKS exam.

CKS may be purchased but not scheduled until CKA-JP certification has been achieved.
CKA Certification must be active (non-expired) on the date the CKS-JP exam (including Retakes) is scheduled.

Please review the Candidate Handbook, Curriculum Overview and Exam Tips along with other recommended resources below.

Prerequisites
There are no pre-requisites for the CKA exam.

Active (non-expired) CKA certification is a prerequisite for the CKS exam.