LET'S CONNECT!
Enter for a chance to win an eBook of your choice from InformIT. Fill out the form.
Register your product to gain access to bonus material or receive a coupon.
Video accessible from your Account page after purchase.
Gain essential Kubernetes network and cluster security skills to harden your infrastructure against threats and attacks.
Kubernetes Network and Cluster Hardening is a comprehensive video course designed to provide you with the essential skills needed to secure Kubernetes environments at the network and cluster level. Guided by expert instructor Chris Jackson; you'll gain practical knowledge of critical security measures; from setting up effective network policies and securing ingress traffic with TLS; to safeguarding node metadata and restricting API access.
Throughout the course; you'll learn advanced methods for protecting Kubernetes dashboards, minimizing external access, and verifying platform binaries. Each lesson includes actionable techniques and demonstrations to ensure you can confidently apply best practices for real-world Kubernetes deployments. Whether enhancing your current Kubernetes security practices or want to eventually take on the Certified Kubernetes Security Specialist (CKS) certification; this course offers valuable insights for improving the resilience and reliability of your clusters.
Skill Level:
Course requirement:
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley; Cisco Press; Pearson IT Certification; Sams; and Que. Topics include IT Certification; Network Security; Cisco Technology; Programming; Web Development; Mobile Development; and more. Learn more about Pearson Video training at http://www.informit.com/video.
Lesson 1: Network Security Policies
Lesson 2: Properly Setup Ingress with TLS
Lesson 3: Protect Node Metadata and Endpoints
Lesson 4: Kubernetes Dashboard Security
Lesson 5: Restrict Access to Kubernetes API
Lesson 6: Minimize External Access to the Network
Lesson 7: Verify Platform Binaries Before Deploying