This course is the second part of the Kubernetes Security series. The first part is Kubernetes Security. This part is Advanced Concepts and guides the student through implementing network policy. It then goes through the administrative steps necessary to build, launch, and maintain a secure Kubernetes Cluster.
- Chapter 1 3 Lessons Introduction 4:50
An Important Note About A Cloud Guru and Linux Academy Courses
1:19Introduction to the Author
0:36Introduction to This Course
2:55 - Chapter 2 3 Lessons Kubernetes Networking 9:33
Network Overlays
3:05Network Policy
6:28Network Policy with Calico
0:00 Hands-On Lab - Chapter 3 7 Lessons Building a Kubernetes Infrastructure 29:51
Host Server Hardening
5:39Secure Software Supply Chain
5:30Container Registries and Trusted Repositories
5:39Choosing an Installer
5:43Configuration Management
3:39Scanning and Static Analysis of YAML
3:41Using Packer and Ansible for Hardening
0:00 Hands-On Lab - Chapter 4 5 Lessons Launching a Kubernetes Cluster 8:14
From Lab to Maiden Voyage
3:00Hardening the Cluster
2:09Monitoring and Alerts
3:05Hardening a kops Default Deployment with Kube-bench
0:00 Hands-On LabEstablishing a Private Cluster with a Secure Bastion Host
0:00 Hands-On Lab - Chapter 5 5 Lessons Maintaining a Kubernetes Infrastructure 7:54
Patching Live Deployments
2:13Upgrading Kubernetes Components
3:14Node Recycling
2:27Upgrade Kubernetes Using kops
0:00 Hands-On LabPatching Live Kubernetes Deployments and Draining a Node for Maintenance
0:00 Hands-On Lab - Chapter 6 1 Lesson Conclusion 1:38
Summation and Next Steps
1:38