وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Kubernetes Cloud Security Associate KCSA with Practice Tests

سرفصل های دوره

Lets Learn Kubernetes Security together as we explore k8s together, preparing for the KCSA exam


1 - Course Introduction
  • 1 -Course Overview and Objectives (Video Material)
  • 1 - Course Overview and Objectives (Reading Material).html
  • 1 - Disclaimer for the Lecture.html
  • 2 - Quick Read Before Taking This Lecture (Note).html
  • 2 - Version (Note).html

  • 2 - Overview of Cloud Native Security
  • 1 -The 4Cs of Cloud-Native Security (Video)
  • 1 - The 4Cs of Cloud-Native Security (Note).html
  • 2 -Cloud Native Security Phases(Video)
  • 2 - Cloud Native Security Phases(Note) v0.0.2.html
  • 3 -Cloud Provider (Video)
  • 3 - Cloud Provider (Note) v0.0.2.html
  • 4 -Artifact Repository And Image Security (Video)
  • 4 - Artifact Repository And Image Security (Note) v.0.0.2.html
  • 5 -Controls And Frameworks (Video)
  • 5 - Controls And Frameworks (Note).html
  • 6 -Isolation Techniques (Video)
  • 6 - Isolation Techniques (Note).html
  • 7 -Workload and Application Code Security (Video)
  • 7 - Workload and Application Code Security (Note) v.0.0.2.html

  • 3 - Kubernetes Cluster Component Security
  • 1 -API Server Security (Video)
  • 1 - API Server Security (Note).html
  • 2 -Controller Manager (Video)
  • 2 - Controller Manager (Note) v.0.0.2.html
  • 3 -Scheduler (Video)
  • 3 - Scheduler (Note) v.0.0.2.html
  • 4 -Kubelet (Video)
  • 4 - Kubelet (Note) v.0.0.2.html
  • 5 -KubeProxy (Video)
  • 5 - KubeProxy (Note) v.0.0.2.html
  • 6 -Pod (Video)
  • 6 - Pod (Reading).html
  • 7 -Container (Video)
  • 7 - Container (Note).html
  • 8 -Client Security (Video)
  • 8 - Client Security (Note).html
  • 9 -Etcd (Video)
  • 9 - Etcd (Note) v.0.0.2.html
  • 10 -Storage (Video)
  • 10 - Storage (Note).html

  • 4 - Kubernetes Security Fundamentals
  • 1 -Pod Security Standards (Video)
  • 1 - Pod Security Standards (Note).html
  • 2 -Pod Security Admissions (Video)
  • 2 - Pod Security Admissions (Note).html
  • 3 -Audit Logging and Monitoring (Video)
  • 3 - Audit Logging and Monitoring (Note).html
  • 4 -Authentication in Kubernetes Clusters (Video)
  • 4 - Authentication in Kubernetes Clusters (Note).html
  • 5 -Authorization (Video)
  • 5 - Authorization (Note).html
  • 6 -Isolation and Segmentation (Video)
  • 6 - Isolation and Segmentation (Note).html
  • 7 -Network Policy (Video)
  • 7 - Network Policy (Note).html
  • 8 -Secrets (Video)
  • 8 - Secrets (Note).html

  • 5 - Kubernetes Threat Model
  • 1 -Accessing and Protecting Sensitive Data (Video)
  • 1 - Accessing and Protecting Sensitive Data (Note).html
  • 2 -Kubernetes Trust Boundaries and Data Flow (Video)
  • 2 - Kubernetes Trust Boundaries and Data Flow (Note).html
  • 3 -Attacker on the Network (Video)
  • 3 - Attacker on the Network (Note).html
  • 4 -Persistence (Video)
  • 4 - Persistence (Note).html
  • 5 -Denial of Service DoS Attacks (Video)
  • 5 - Denial of Service DoS Attacks (Note).html
  • 6 -Privilege Escalation (Video)
  • 6 - Privilege Escalation (Note).html
  • 7 -Malicious Code Execution in Containers (Video)
  • 7 - Malicious Code Execution in Containers (Note).html

  • 6 - Section 5 Platform Security in Kubernetes
  • 1 -Supply Chain Security in Kubernetes (Video)
  • 1 - Supply Chain Security in Kubernetes (Note).html
  • 2 -Admission Control and Dynamic Security Policies (Video)
  • 2 - Admission Control and Dynamic Security Policies (Note).html
  • 3 -Understanding PKI and Connectivity in Kubernetes (Video)
  • 3 - Understanding PKI and Connectivity in Kubernetes (Note).html
  • 4 -Securing the Image Repository (Video)
  • 4 - Securing the Image Repository (Note).html
  • 5 -Observability and Monitoring in Kubernetes (Video)
  • 5 - Observability and Monitoring in Kubernetes (Note).html
  • 6 -Implementing Service Mesh Security(Video)
  • 6 - Implementing Service Mesh Security(Note).html

  • 7 - Section 6 Compliance and Security Frameworks
  • 1 -Compliance Frameworks (Video)
  • 1 - Compliance Frameworks (Note).html
  • 2 -Kubernetes Threat Modeling Frameworks - STRIDE (Video)
  • 2 - Kubernetes Threat Modeling Frameworks - STRIDE (Note).html
  • 3 -Supply Chain Compliance in Kubernetes (Video)
  • 3 - Supply Chain Compliance in Kubernetes (Note).html
  • 4 -Automation and Security Tooling for Kubernetes Compliance (Video)
  • 4 - Automation and Security Tooling for Kubernetes Compliance (Note).html

  • 8 - Section 7 Conclusion
  • 1 -Thank you

  • 9 - Exam Prep
    139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 45193
    حجم: 1499 مگابایت
    مدت زمان: 204 دقیقه
    تاریخ انتشار: ۱۰ تیر ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید