Course Outline
Pre-Requisites
Familiarity with the bash shell
Filesystem navigation and manipulation
Command line text editors like vim or nano
Common tooling like curl, wget and ping
CN220 – Kubernetes Operations (or equivalent) experience or have earned the Certified Kubernetes Administrator (CKA) certification
Lessons
Advanced Kubernetes Security course focuses on developing the skills and knowledge needed for implementing security measures from code to a production Kubernetes cluster. Students will engage in topics pertaining to adding security mechanisms along the code deployment pipeline and reviewing and remediating security concerns within a Kubernetes infrastructure.
Topics include declarative configuration analysis, container image scanning, CIS benchmark scanning and remediation, and identifying and mitigating attack vectors within Kubernetes. Kubernetes Operations and System Integration teams will benefit greatly as they work towards creating a security posture that aligns with security policies for their Kubernetes environments.
WHAT YOU'LL LEARN
You will learn declarative configuration analysis, container image scanning, CIS benchmark scanning and remediation, and identifying and mitigating attack vectors within Kubernetes.
OUTLINE
- Kubernetes Threat Model and Security Maturity
- System Hardening
- Overview of Cluster Security objects
- Cluster Hardening
- Minimizing Microservice Vulnerabilities
- Securing the Container Supply Chain
- Monitoring, Logging and Runtime Security
LABS
- Laptop with WiFi connectivity
- Attendees should have the latest Chrome or Firefox installed, and a free account at strigo.io.
WHO SHOULD ATTEND
This course is targeted at students with the following:
- Motivations: Responsibility for implementing security mechanisms along the code deployment pipeline and within the Kubernetes environment; Running and reporting on security state of the Kubernetes environment
- Roles: Infrastructure and Integration engineers tasked with implementing, running, and reporting on security posture of Kubernetes environment; Developers who are tasked with scanning and remediating security issues within application coding; IT professionals looking to expand their skills in Kubernetes security
Cancellation Policy
We require 16 calendar days notice to reschedule or cancel any registration. Failure to provide the required notification will result in 100% charge of the course. If a student does not attend a scheduled course without prior notification it will result in full forfeiture of the funds and no reschedule will be allowed. Within the required notification period, only student substitutions will be permitted. Reschedules are permitted at anytime with 16 or more calendar days notice. Enrollments must be rescheduled within six months of the cancel date or funds on account will be forfeited.
Training Location
Online Classroom
your office
your city,
your province
your country
I would never take another course that starts at 11AM and goes to 9PM again. The way the course was laid out really took away from the capturing of what was presented as it was 5-6 hours of watching a screen before getting to the actual labs. There has to be a better way to lay out this particular course. In my previous course, the lectures were broken up by labs which worked out fantastic and kept you engaged in the course. There were days when in order to actually complete the labs, would go over the 9PM day end time frame. Was able to get the primary labs done, but if you want to get all the content completed, you cannot complete it in the window of this course, you will need to come back on your own time.