Training Course

Kubernetes Security Essentials (LFS260)

This course provides the skills and knowledge on a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment and runtime.

Who Is It For

This course is ideal for anyone holding a CKA certification and interested in or responsible for cloud security.
read less read more
What You’ll Learn

This course exposes you to knowledge and skills needed to maintain security in dynamic, multi-project environments. This course addresses security concerns for cloud production environments and covers topics related to the security container supply chain, discussing topics from before a cluster has been configured through deployment, and ongoing, as well as agile use, including where to find ongoing security and vulnerability information. The course includes hands-on labs to build and secure a Kubernetes cluster, as well as monitor and log security events.
read less read more
What It Prepares You For

The course, along with real-world experience and study, will provide the skills and knowledge also tested by the Kubernetes Security Specialist (CKS) exam.
read less read more
Course Outline
Chapter 1. Course Introduction
Chapter 2. Cloud Security Overview
Chapter 3. Preparing to Install
Chapter 4. Installing the Cluster
Chapter 5. Securing the kube-apiserver
Chapter 6. Networking
Chapter 7. Workload Considerations
Chapter 8. Issue Detection
Chapter 9. Domain Review

Gain your certification after this course with our CKS Exam

Bundle this course and the exam to save $100

To successfully complete the lab exercises in this course, access to a Linux server or Linux desktop/laptop is required. Access to a public cloud provider, or VirtualBox on your machine is also needed. Detailed instructions to set up your lab environment are provided in the course.
Lab Info
If using a cloud provider like GCP or AWS, you should be able to complete the lab exercises using the free tier or credits provided to you. However, you may incur charges if you exceed the credits initially allocated by the cloud provider, or if the cloud provider’s terms and conditions change.
Aug 2023
The author tried to explain much more than just the course material. He tried to get me to think, a part that is usually missed on courses at Udemy and others. Kudos!
May 2023
In general, it is an excellent course!
Apr 2023
I liked the ability to practice. The labs were very useful.
Mar 2023
I liked the list of open source tools for Intrusion Detection.
Feb 2023
This course was taught with professionalism by the instructor, who took time to explain the material to the students.