Kubernetes Security

By John David Marx

This course is a 'Deep Dive' into Kubernetes Security that guides you through the concepts and best practices of Kubernetes Security.

5 hours
  • 32 Lessons
  • 2 Hands-On Labs

About the course

This course is a ‘Deep Dive’ into Kubernetes Security. You are guided through the concepts and best practices of Kubernetes Security, and hands-on examples are provided to apply what is covered.

  • Chapter 1 3 Lessons Introduction 12:33

    An Important Note About A Cloud Guru and Linux Academy Courses

    1:19

    Introduction to the Course Author

    0:36

    Introduction to this Course

    10:38
  • Chapter 2 4 Lessons Setting Up a Kubernetes Playground 28:16

    Preparing The Playground Servers

    3:33

    Setting up the Master Node

    14:17

    Setting up the Worker Nodes

    5:52

    Validating the Cluster

    4:34
  • Chapter 3 4 Lessons Kubernetes Security Principles and Concepts 34:39

    Kubernetes Architecture

    10:39

    Kubernetes Attack Surface

    11:15

    The Principle of Least Privilege

    5:15

    Security Boundaries

    7:30
  • Chapter 4 6 Lessons Securing a Cluster 43:59

    Using TLS (Transport Layer Security) to Secure Nodes and Processes

    6:30

    Using Firewalls and VPN (Virtual Private Networks)

    2:54

    Setup kube-bench to Harden a Cluster

    4:30

    Kubelet Security

    15:16

    Securing etcd Key Value Datastore

    4:19

    Deploying the Kubernetes Web UI (Dashboard) v2.0 Beta

    10:30
  • Chapter 5 6 Lessons Authentication, Authorization and Admission 46:38

    The 3 A's of Kubernetes Security

    2:16

    Authentication

    8:09

    Authentication Exercise

    10:53

    Authorization and RBAC

    8:39

    Authorization Exercise

    7:50

    Admission Controllers

    8:51
  • Chapter 6 4 Lessons Securing Pods 1:14:48

    Security Contexts

    6:02

    Pod Security Policies

    4:47

    Establishing an Immutable Cluster Architecture

    3:59

    Kubernetes with kops for PodSecurityPolicy Lab

    1:00:00 Hands-On Lab
  • Chapter 7 4 Lessons Securing Containers 1:13:43

    Third-Party CI/CD Tools

    5:07

    Network Policies

    6:31

    Managing Secrets

    2:05

    Managing Secrets in Kubernetes

    1:00:00 Hands-On Lab
  • Chapter 8 1 Lesson Summation 3:47

    Conclusion and Next Steps

    3:47

What are Hands-on Labs

What's the difference between theoretical knowledge and real skills? Practical real-world experience. That's where Hands-on Labs come in! Hands-on Labs are guided, interactive experiences that help you learn and practice real-world scenarios in real cloud environments. Hands-on Labs are seamlessly integrated in courses, so you can learn by doing.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!