Training Course

Kubernetes Security Essentials (LFS260)

This course provides the skills and knowledge on a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment and runtime.

Who Is It For

This course is ideal for anyone holding a CKA certification and interested in or responsible for cloud security.
read less read more
What You’ll Learn

This course exposes you to knowledge and skills needed to maintain security in dynamic, multi-project environments. This course addresses security concerns for cloud production environments and covers topics related to the security container supply chain, discussing topics from before a cluster has been configured through deployment, and ongoing, as well as agile use, including where to find ongoing security and vulnerability information. The course includes hands-on labs to build and secure a Kubernetes cluster, as well as monitor and log security events.
read less read more
What It Prepares You For

This course is designed as preparation for the Kubernetes Security Specialist (CKS) Exam, and will substantially increase students' ability to become certified.
read less read more
Course Outline
Chapter 1. Course Introduction
Chapter 2. Cloud Security Overview
Chapter 3. Preparing to Install
Chapter 4. Installing the Cluster
Chapter 5. Securing the kube-apiserver
Chapter 6. Networking
Chapter 7. Workload Considerations
Chapter 8. Issue Detection
Chapter 9. Domain Review

Gain your certification after this course with our CKS Exam

Bundle this course and the exam to save $100

Prerequisites
To successfully complete the lab exercises in this course, access to a Linux server or Linux desktop/laptop is required. Access to a public cloud provider, or VirtualBox on your machine is also needed. Detailed instructions to set up your lab environment are provided in the course.
Lab Info
If using a cloud provider like GCP or AWS, you should be able to complete the lab exercises using the free tier or credits provided to you. However, you may incur charges if you exceed the credits initially allocated by the cloud provider, or if the cloud provider’s terms and conditions change.
Reviews
Feb 2021
The course covers a wide variety of useful tools for host-level security.