LET'S CONNECT!
Enter for a chance to win an eBook of your choice from InformIT. Fill out the form.
Register your product to gain access to bonus material or receive a coupon.
Video accessible from your Account page after purchase.
Gain practical skills to secure microservices effectively within Kubernetes environments through proven best practices.
Kubernetes Microservices Security Essentials is a focused video course designed to equip you with comprehensive security practices essential for protecting Kubernetes-based microservices. Led by expert instructor Chris Jackson; this course guides you through the essential strategies to enforce robust security policies; safeguard sensitive data; and secure communication within Kubernetes clusters.
Through detailed lessons and practical demonstrations; you'll gain hands-on experience implementing pod security standards; managing Kubernetes secrets; enforcing container isolation techniques; and securing inter-pod communication using Cilium. Additionally; you'll master securing your software supply chain and scanning container images for vulnerabilities; significantly reducing security risks in your deployments.
Ideal for professionals looking to enhance their Kubernetes security expertise; this course will empower you to effectively manage and secure your microservices architecture; ensuring resilience and protection against evolving threats.
Skill Level:
Course requirement:
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley; Cisco Press; Pearson IT Certification; Sams; and Que. Topics include IT Certification; Network Security; Cisco Technology; Programming; Web Development; Mobile Development; and more. Learn more about Pearson Video training at http://www.informit.com/video.
Lesson 1: Use Appropriate Pod Security Standards
Lesson 2: Managing Kubernetes Secrets
Lesson 3: Implement Container Isolation Techniques
Lesson 4: Implement Pod-to-Pod Encryption with Cilium
Lesson 5: Secure Your Software Supply Chain
Lesson 6: Scan Images for Known Vulnerabilities