Download link
File List
-
Chapter 22 Behavioral Analytics at Host and Container Level/007. Change Falco Rules.mp4 106.09 MB
Chapter 2 Create Kubernetes Cluster/001. Create Kubernetes Cluster and Look at Some Errors.mp4 83.25 MB
Chapter 3 Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/001. Introduction to NetworkPolicy.mp4 3.95 MB
Chapter 3 Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/002. Create Default Deny NetworkPolicy.mp4 19.37 MB
Chapter 3 Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/003. Create Egress and Ingress Rules.mp4 23.37 MB
Chapter 3 Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/004. Create Another Network Policy for Different Name Space.mp4 45.19 MB
Chapter 4 Cluster Setup – Minimize Use of and Access to GUI Elements/001. Install Kubernetes Dashboard.mp4 6.47 MB
Chapter 4 Cluster Setup – Minimize Use of and Access to GUI Elements/002. Insecure Access from Outside.mp4 16.97 MB
Chapter 4 Cluster Setup – Minimize Use of and Access to GUI Elements/003. RBAC for Kubernetes Dashboard.mp4 17.65 MB
Chapter 5 Cluster Setup – Properly Set Up Ingress Objects with Security Control/001. Create an Ingress.mp4 36.57 MB
Chapter 5 Cluster Setup – Properly Set Up Ingress Objects with Security Control/002. Secure an Ingress.mp4 37.37 MB
Chapter 6 Protect Node Metadata and Endpoints/001. Accessing Node Metadata.mp4 10.36 MB
Chapter 6 Protect Node Metadata and Endpoints/002. Protect Node Metadata Through NetworkPolicy.mp4 8.51 MB
Chapter 7 Use CIS Benchmark to Review the Security Configuration of Kubernetes Components/001. kube-bench.mp4 54.71 MB
Chapter 8 Verify Platform Binaries before Deploying/001. How to Delete the Custom Network.mp4 9.3 MB
Chapter 8 Verify Platform Binaries before Deploying/002. Verify apiserver Binary Running in Our Cluster.mp4 24.84 MB
Chapter 9 Cluster Hardening - RBAC/001. RBAC - Role and Rolebinding.mp4 22.97 MB
Chapter 9 Cluster Hardening - RBAC/002. Role and Rolebinding for a User.mp4 22.19 MB
Chapter 9 Cluster Hardening - RBAC/003. ClusterRole and ClusterRoleBinding.mp4 12.4 MB
Chapter 9 Cluster Hardening - RBAC/004. Accounts and Users.mp4 5.57 MB
Chapter 9 Cluster Hardening - RBAC/005. CertificateSigningRequests.mp4 69.72 MB
Chapter 10 Exercise Caution in Using Service Accounts/001. Introduction.mp4 1.7 MB
Chapter 10 Exercise Caution in Using Service Accounts/002. Pod Uses Custom ServiceAccount.mp4 55.02 MB
Chapter 10 Exercise Caution in Using Service Accounts/003. Disable ServiceAccount Mounting.mp4 26.16 MB
Chapter 10 Exercise Caution in Using Service Accounts/004. Limit ServiceAccounts Permissions Using RBAC to Edit Resources.mp4 13.22 MB
Chapter 11 Cluster Hardening – Restrict API Access/001. EnableDisable Anonymous Access.mp4 26.24 MB
Chapter 11 Cluster Hardening – Restrict API Access/002. Let's Perform a Manual API Request.mp4 73.57 MB
Chapter 11 Cluster Hardening – Restrict API Access/003. External APIserver Access.mp4 67.25 MB
Chapter 11 Cluster Hardening – Restrict API Access/004. NodeRestriction AdmissionController.mp4 6.73 MB
Chapter 12 Cluster Hardening – Upgrade Kubernetes/001. Verify NodeRestriction.mp4 22.27 MB
Chapter 12 Cluster Hardening – Upgrade Kubernetes/002. Introduction.mp4 15.56 MB
Chapter 12 Cluster Hardening – Upgrade Kubernetes/003. Create a Cluster with the Old Version.mp4 30.36 MB
Chapter 12 Cluster Hardening – Upgrade Kubernetes/004. Upgrade Master and Worker Node.mp4 58.63 MB
Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/001. Create Secret.mp4 22.05 MB
Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/002. Hack Secrets in Docker.mp4 18.11 MB
Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/003. Hack Secrets in ETCD.mp4 25.73 MB
Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/004. ETCD Encryption.mp4 57.32 MB
Chapter 13 Microservice Vulnerabilities – Manage Kubernetes Secrets/005. ETCD Encryption -2.mp4 34.07 MB
Chapter 14 Use Container Runtime Sandboxes in a Multi-Tenant Environment/001. Calling Linux Kernel from Inside a Container.mp4 3.94 MB
Chapter 14 Use Container Runtime Sandboxes in a Multi-Tenant Environment/002. Open Container Initiative (OCI).mp4 5.08 MB
Chapter 14 Use Container Runtime Sandboxes in a Multi-Tenant Environment/003. Crictl.mp4 5.79 MB
Chapter 14 Use Container Runtime Sandboxes in a Multi-Tenant Environment/004. Create and Use RuntimeClasses.mp4 18.45 MB
Chapter 15 Microservices Vulnerabilities – OS Level Security Domains/001. Set Container User and Group (Security Context).mp4 17.66 MB
Chapter 15 Microservices Vulnerabilities – OS Level Security Domains/002. Force Container Non-Root.mp4 6.47 MB
Chapter 15 Microservices Vulnerabilities – OS Level Security Domains/003. Privileged Containers.mp4 7.09 MB
Chapter 15 Microservices Vulnerabilities – OS Level Security Domains/004. PrivilegeEscalation.mp4 15.59 MB
Chapter 15 Microservices Vulnerabilities – OS Level Security Domains/005. Create and Enable PodSecurityPolicy.mp4 37.88 MB
Chapter 16 Microservices Vulnerabilities – mTLS/001. Introduction.mp4 7.33 MB
Chapter 16 Microservices Vulnerabilities – mTLS/002. Create a Sidecar Proxy.mp4 38.05 MB
Chapter 17 Open Policy Agent (OPA)/001. Introduction OPA.mp4 1.36 MB
Chapter 17 Open Policy Agent (OPA)/002. Install OPA Gatekeeper.mp4 27.02 MB
Chapter 17 Open Policy Agent (OPA)/003. Deny All Policy.mp4 35.8 MB
Chapter 17 Open Policy Agent (OPA)/004. Enforce Namespace Labels.mp4 3.41 MB
Chapter 18 Supply Chain Security – Image Footprint/001. Reduce Image Footprint with Multi-Stage.mp4 26.37 MB
Chapter 18 Supply Chain Security – Image Footprint/002. Secure and Harden Images.mp4 49.34 MB
Chapter 19 Supply Chain Security – Static Analysis/001. Kubesec.mp4 9.83 MB
Chapter 19 Supply Chain Security – Static Analysis/002. Use kubesec to Perform Static Analysis Using Docker Image.mp4 18.18 MB
Chapter 19 Supply Chain Security – Static Analysis/003. OPA Conftest.mp4 24.17 MB
Chapter 19 Supply Chain Security – Static Analysis/004. OPA Conftest for Dockerfile.mp4 15.46 MB
Chapter 20 Supply Chain Security – Image Vulnerability Scanning/001. Use Trivy to Scan Images.mp4 25 MB
Chapter 21 Supply Chain Security – Secure Supply Chain/001. Image Digest.mp4 43.64 MB
Chapter 21 Supply Chain Security – Secure Supply Chain/002. Whitelist Registries with OPA.mp4 28.57 MB
Chapter 22 Behavioral Analytics at Host and Container Level/001. Strace.mp4 38.25 MB
Chapter 22 Behavioral Analytics at Host and Container Level/002. Strace and proc on ETCD.mp4 65.24 MB
Chapter 22 Behavioral Analytics at Host and Container Level/003. Access proc and env Variables from the Inside Pod.mp4 31.65 MB
Chapter 22 Behavioral Analytics at Host and Container Level/004. FALCO.mp4 43.32 MB
Chapter 22 Behavioral Analytics at Host and Container Level/005. Use Falco to Find Malicious Processes.mp4 38.75 MB
Chapter 22 Behavioral Analytics at Host and Container Level/006. Investigate Falco Rules.mp4 21.95 MB
Chapter 1 Become a Certified Kubernetes Security Specialist (CKS)/001. Certified Kubernetes Security Specialist (CKS).mp4 3.63 MB
Chapter 23 Runtime Security – Immutability of Containers at Runtime/001. Introduction.mp4 7.32 MB
Chapter 23 Runtime Security – Immutability of Containers at Runtime/002. StartupProbe.mp4 18.19 MB
Chapter 23 Runtime Security – Immutability of Containers at Runtime/003. SecurityContext Renders Container Immutable.mp4 27.23 MB
Chapter 24 Runtime Security - Auditing/001. Introduction.mp4 7.05 MB
Chapter 24 Runtime Security - Auditing/002. Audit Policy.mp4 3.25 MB
Chapter 24 Runtime Security - Auditing/003. Enable Audit Logging in Apiserver.mp4 40.48 MB
Chapter 24 Runtime Security - Auditing/004. Create a Secret and Check Audit Logs.mp4 11.68 MB
Chapter 25 System Hardening – Kernel Hardening/001. AppArmor.mp4 1.52 MB
Chapter 25 System Hardening – Kernel Hardening/002. AppArmor for Curl.mp4 28.53 MB
Chapter 25 System Hardening – Kernel Hardening/003. AppArmor for Docker Nginx.mp4 12.4 MB
Chapter 25 System Hardening – Kernel Hardening/004. AppArmor for Kubernetes Nginx.mp4 19.32 MB
Chapter 25 System Hardening – Kernel Hardening/005. Seccomp.mp4 2.15 MB
Chapter 25 System Hardening – Kernel Hardening/006. Seccomp for Docker Nginx.mp4 14.09 MB
Chapter 25 System Hardening – Kernel Hardening/007. Seccomp for Kubernetes Nginx.mp4 23.34 MB
Download Info
-
Tips
“Certified Kubernetes Security Specialist (CKS) Course” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.