Training > Cloud and Containers > Kubernetes Security Fundamentals (LFS460)

Kubernetes Security Fundamentals (LFS460)

This instructor-led course provides skills and knowledge across a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment, and runtime.

Who Is It For

This course is ideal for anyone holding a CKA certification and interested in or responsible for cloud security.
read less read more
What You’ll Learn

This course exposes you to knowledge and skills needed to maintain security in dynamic, multi-project environments. This course addresses security concerns for cloud production environments and covers topics related to the security container supply chain, discussing topics from before a cluster has been configured through deployment, and ongoing, as well as agile use, including where to find ongoing security and vulnerability information. The course includes hands-on labs to build and secure a Kubernetes cluster, as well as monitor and log security events.
read less read more
What It Prepares You For

This course is designed as preparation for the Certified Kubernetes Security Specialist (CKS) exam and will substantially increase students’ ability to become certified.
read less read more
Course Outline
Expand All
Collapse All
- Linux Foundation
- Linux Foundation Training
- Linux Foundation Certifications
- Linux Foundation Digital Badges
- Laboratory Exercises, Solutions and Resources
- E-Learning Course: LFS260
- Platform Details
Cloud Security Overview
- Multiple Projects
- What is Security?
- Assessment
- Prevention
- Detection
- Reaction
- Classes of Attackers
- Types of Attacks
- Attack Surfaces
- Hardware and Firmware Considerations
- Security Agencies
- Manage External Access
- Labs
Preparing to Install
- Image Supply Chain
- Runtime Sandbox
- Verify Platform Binaries
- Minimize Access to GUI
- Policy Based Control
- Labs
Installing the Cluster
- Update Kubernetes
- Tools to Harden the Kernel
- Kernel Hardening Examples
- Mitigating Kernel Vulnerabilities
- Labs
Securing the kube-apiserver
- Restrict Access to API
- Enable Kube-apiserver Auditing
- Configuring RBAC
- Pod Security Policies
- Minimize IAM Roles
- Protecting etcd
- CIS Benchmark
- Using Service Accounts
- Labs
- Firewalling Basics
- Network Plugins
- iptables
- Mitigate Brute Force Login Attempts
- Netfilter rule management
- Netfilter Implementation
- nft Concepts
- Ingress Objects
- Pod to Pod Encryption
- Restrict Cluster Level Access
- Labs
Workload Considerations
- Minimize Base Image
- Static Analysis of Workloads
- Runtime Analysis of Workloads
- Container Immutability
- Mandatory Access Control
- SELinux
- AppArmor
- Generate AppArmor Profiles
- Labs
Issue Detection
- Understanding Phases of Attack
- Preparation
- Understanding an Attack Progression
- During an Incident
- Handling Incident Aftermath
- Intrusion Detection Systems
- Threat Detection
- Behavioral Analytics
- Labs
Domain Reviews
- Preparing for the Exam
- Labs
Closing and Evaluation Survey
- Evaluation Survey

Learning Path
This course requires CKA certification or equivalent knowledge and/or experience.
Feb 2022
The instructor led the course in a constructive manner, and made good and interesting demos.
Feb 2022
The professional instructors made the course all in all really interesting in their ability to do great demos, and connect theory to real world experience.
Feb 2022
The instructor was really great, and his demos were awesome.
Feb 2022
Very good instructors.
Feb 2022
Very skilled instructor, he could elaborate on all topics, and gave examples and comparisons when needed, that were not covered in the material.