Вернуться в Курс
Certified Kubernetes Security Specialist (CKS) + практический опыт
0% Завершено
0/0 Steps
-
Introduction3 Темы
-
Attack Surface6 Темы
-
Cluster Hardening60 Темы
-
Презентация
-
CIS Benchmark
-
Lab: CIS Benchmark
-
CIS Kubernetes
-
Kube-bench
-
Lab: Kube-bench
-
Kubescape
-
Security Primitives
-
Authentication
-
Service Accounts
-
Service Accounts 1.24+
-
Lab: Service Accounts
-
TLS Basics
-
TLS in Kubernetes
-
TLS in Kubernetes – Certificate Creation
-
View Certificate Details
-
Lab: View Certificate Details
-
Certificates API
-
Lab: Certificates API
-
KubeConfig
-
Lab: KubeConfig
-
API Groups
-
Lab: API Access
-
Lab: Bootstrap Tokens
-
Lab: Use Service Account Token
-
Authorization
-
RBAC
-
Lab: RBAC
-
Cluster Roles and Role Bindings
-
Lab: Cluster Roles and Role Bindings
-
Lab: ABAC
-
Kubelet-security
-
Lab: Kubelet-security
-
Kubectl-proxy
-
Lab: Kubectl-proxy
-
Kubernetes-dashboard
-
Secure-dashboard
-
Lab: Secure-dashboard
-
Kubernetes-binaries
-
Lab: Kubernetes-binaries
-
Kubernetes Software Versions
-
Cluster Upgrade Process
-
Lab: Cluster Upgrade Process
-
Network Policy
-
Developing Network Policies
-
Lab: Developing Network Policies
-
Ingress
-
Lab: Ingress1
-
Lab: Ingress2
-
Docker Service
-
Dockerd
-
Containerd
-
Securing Node Metadata
-
Protection Strategies
-
Lab: Securing Node Metadata
-
Lab: Protect Metadata and Secure Ingress
-
Lab: Secure Node Metadata via RBAC
-
Auditing
-
Securing Control Plane Communications with Ciphers
-
Отзывы важны!
-
Презентация
-
System Hardening26 Темы
-
Презентация
-
Least Privilege
-
Host OS Footprint
-
Node Access
-
Lab: Node Access
-
SSH Restrict
-
Privilege Escalation
-
Lab: Privilege Escalation
-
Obsolete Packages
-
Kernel Modules
-
Open Ports
-
Lab: Open Ports
-
IAM Roles
-
Network Access
-
Linux Firewall
-
Lab: Linux Firewall
-
Linux Syscalls
-
Aquasec Tracee
-
Restrict Syscalls
-
Seccomp in Kubernetes
-
Lab: Seccomp in Kubernetes
-
Apparmor
-
Apparmor Profiles
-
Apparmor in Kubernetes
-
Lab: Apparmor in Kubernetes
-
Linux Capabiliies
-
Презентация
-
Minimize Microservice Vulnerabilities47 Темы
-
Презентация
-
Security Contexts
-
Lab: Security Contexts
-
Secrets
-
Lab: Secrets
-
Admission Controllers
-
Lab: Admission Controllers
-
Validating and Mutating
-
Lab: Validating and Mutating
-
Pod Security Policies
-
Замечание о PSP
-
Pod Security
-
Lab: Pod Security
-
Open Policy Agent
-
Lab: Open Policy Agent
-
OPA in Kubernetes
-
Lab: OPA in Kubernetes
-
OPA Gatekeeper
-
Lab: OPA Gatekeeper
-
Container Sandboxing
-
gVisor
-
Lab: gVisor
-
Kata Containers
-
Container Runtimes
-
Runtime Classes
-
Lab: Runtime Classes
-
ETCD Encryption
-
Lab: ETCD Encryption
-
Multi-Tenancy in Kubernetes
-
Multi-tenancy Types
-
Isolation Levels
-
Controlplane Isolation
-
Lab: Resource Quotas
-
Dataplane Isolation
-
Lab: Tenant Isolation
-
Lab: Securing Network Traffic
-
API Priority Fairness
-
Quality of Service
-
SSL Oneway and Mutual
-
Pod-to-Pod Encryption
-
Pod-to-pod Encryption mTLS
-
Lab: Istio mTLS
-
About Cilium
-
Cilium Architecture
-
Encryption and Policies
-
Lab: Cilium Pod-to-Pod Encryption
-
Отзывы важны!
-
Презентация
-
Supply Chain Security18 Темы
-
Презентация
-
Supply Chain Security
-
Base Image Footprint
-
Lab: Base Image Footprint
-
About SBOM
-
SBOM Workflow
-
Lab: SBOM Creation
-
Lab: SBOM in CI/CD
-
KubeLinter
-
Lab: KubeLinter
-
Image Security
-
Lab: Image Security
-
Allowed Registries
-
Lab: Allowed Registries
-
Use Static Analysis
-
Lab: Use Static Analysis
-
Scan Images
-
Lab: Scan Images
-
Презентация
-
Monitoring, Logging and Runtime Security11 Темы
-
Mock Exams10 Темы
Участники 235
4C
Урок Прогресс
0% Завершено
Комментарии