Training Course

Kubernetes Security Essentials (LFS260)

This course provides the skills and knowledge on a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment and runtime.

Who Is It For

This course is ideal for anyone holding a CKA certification and interested in or responsible for cloud security.
read less read more
What You’ll Learn

This course exposes you to knowledge and skills needed to maintain security in dynamic, multi-project environments. This course addresses security concerns for cloud production environments and covers topics related to the security container supply chain, discussing topics from before a cluster has been configured through deployment, and ongoing, as well as agile use, including where to find ongoing security and vulnerability information. The course includes hands-on labs to build and secure a Kubernetes cluster, as well as monitor and log security events.
read less read more
What It Prepares You For

The course, along with real-world experience and study, will provide the skills and knowledge also tested by the Kubernetes Security Specialist (CKS) exam.
read less read more
Course Outline
Chapter 1. Course Introduction
Chapter 2. Cloud Security Overview
Chapter 3. Preparing to Install
Chapter 4. Installing the Cluster
Chapter 5. Securing the kube-apiserver
Chapter 6. Networking
Chapter 7. Workload Considerations
Chapter 8. Issue Detection
Chapter 9. Domain Review

Gain your certification after this course with our CKS Exam

Bundle this course and the exam to save $100

Prerequisites
To successfully complete the lab exercises in this course, access to a Linux server or Linux desktop/laptop is required. Access to a public cloud provider, or VirtualBox on your machine is also needed. Detailed instructions to set up your lab environment are provided in the course.
Lab Info
If using a cloud provider like GCP or AWS, you should be able to complete the lab exercises using the free tier or credits provided to you. However, you may incur charges if you exceed the credits initially allocated by the cloud provider, or if the cloud provider’s terms and conditions change.
Learning Path
Reviews
Mar 2023
I liked the list of open source tools for Intrusion Detection.
Feb 2023
This course was taught with professionalism by the instructor, who took time to explain the material to the students.
Jan 2023
The practical examples it provides is by far the reason I would highly recommend this course. In my opinion, they don't only focus on the latest technological trends, but also provide insight into long-standing tools that can be used to better improve the security of the workloads, and their runtime. Also, I like the coverage of software supply chain attack vectors.
Dec 2022
This course is very practical, with great theoretical explanations. Everything is very well organized, and I am learning a lot.
Nov 2022
Not only was Kubernetes security explained, but so was the overall security of the organizations where Kubernetes is in use.