وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Certified Kubernetes Security Specialist (CKS) – Feb 2025

سرفصل های دوره
  • 1.1 CKS Certification Requirements
  • 1.2 Resources and Study Tools
  • 1.3 Practice Strategy
  • 1.4 Creating a Study Timeline and Expectations
  • 2.1 Lab Environment and Architecture
  • 2.2 Local Installation
  • 2.3 Cloud Installation
  • 2.4 Your Cluster Up and Running
  • 3.1 Cloud Native Security
  • 3.2 Kubernetes Architecture
  • 3.3 Kubernetes PKI Architecture
  • 3.4 Threat Modeling K8s
  • 3.5 Real World K8s Hacks
  • 3.6 OWASP Kubernetes Top 10
  • 4.1 Network Security Overview
  • 4.2 Pod Communication Policies
  • 4.3 Segmentation
  • 5.1 CIS Benchmarks for Kubernetes
  • 5.2 Install Kube-bench
  • 5.3 Checking Compliance with Kube-bench
  • 6.1 Understanding Ingress
  • 6.2 Creating Ingress Objects
  • 6.3 Ingress Security Options
  • 7.2 Network Policies
  • 7.3 Node Metadata Protection
  • 7.4 Implement Kubelet Authentication
  • 7.5 Test Kubelet and Node Metadata Security
  • 8.1 K8s Dashboard Architecture
  • 8.2 Dashboard Installation
  • 8.3 Role Based Access Control (RBAC)
  • 9.1 Understanding Platform Binary Integrity
  • 9.2 Download the Latest Kubernetes Release
  • 9.3 Verify Binary Checksum
  • 10.1 Kubernetes API Fundamentals
  • 10.2 Kubernetes Access Control
  • 10.3 API Server Configuration
  • 10.4 API Server Hardening
  • 10.5 Verify Access Control Policies
  • 11.1 Understanding Kubernetes RBAC
  • 11.2 Creating a User Account
  • 11.3 Applying Roles to a User
  • 11.4 Configuring and Binding Cluster Roles
  • 11.5 Verifying Role Rules
  • 12.1 Understanding Service Accounts
  • 12.2 Creating a Service Account
  • 12.3 Disable Default Settings
  • 12.4 Verify Service Account Permissions
  • 13.1 Kubernetes Update Process
  • 13.2 Plan Upgrade Process
  • 13.3 Upgrade Components and Test
  • 14.1 Host Hardening
  • 14.2 Remove Unneeded Services
  • 14.3 Log System Activities
  • 14.4 Limit Access
  • 15.1 Understanding External Access to Kubernetes
  • 15.2 Finding Open Ports
  • 15.3 Host Firewall Configuration
  • 15.4 Test Host Firewall
  • 16.1 Understanding Kernel Threats
  • 16.2 Using Seccomp
  • 16.3 Using AppArmor
  • 16.4 Testing Kernel Security
  • 17.1 Principle of Least Privilege
  • 17.2 Host Based IAM
  • 17.3 Restricting User Privileges
  • 17.4 Controlling File Access and User Logging
  • 17.5 Understanding Cloud RBAC
  • 18.1 Understanding Pod Security
  • 18.2 Configure Security Contexts
  • 18.3 Pod Security Admission
  • 18.4 OPA Gatekeeper
  • 19.1 Understanding Kubernetes Secrets
  • 19.2 Creating and Using a Secret
  • 19.3 Using Secrets in Pods
  • 19.4 Encrypting Secrets at Rest
  • 20.1 Containing Containers
  • 20.2 Sandboxed Pods
  • 20.3 Using gVisor
  • 20.4 Using Kata Containers
  • 21.1 Introduction to Cilium and mTLS
  • 21.2 Using Cilium for Pod-to-Pod Encryption
  • 21.3 Deploying and Verifying mTLS with Cilium
  • 22.1 Software Supply Chain Risks
  • 22.2 Protect Image Registry Access
  • 22.3 Require Signed Images
  • 22.4 Policy Enforcement Image Policy Webhook
  • 22.5 Policy Enforcement Validating Admission Policy
  • 23.1 Static Analysis Fundamentals
  • 23.2 Scan Manifests for Vulnerabilities with Kube-linter
  • 23.3 Scanning for Cluster Vulnerabilities
  • 24.1 Understanding Container Images
  • 24.2 Use Image Creation Good Practices
  • 24.3 Reduce Image Attack Surface
  • 25.1 Scanning for Vulnerable Images
  • 25.2 Using Trivy to Identify Vulnerable Containers
  • 25.3 Using the Trivy Operator
  • 25.4 Using Trivy and Kyverno for SBOM Attestation
  • 26.1 Understanding Immutability
  • 26.2 Read Only Filesystem
  • 26.3 Policy Enforcement with VAP
  • 27.1 Auditing in Kubernetes
  • 27.2 Define an Audit Policy
  • 27.3 Event Batching and Tuning
  • 27.4 Configure Backend Log Storage
  • 28.1 Understanding Syscall Behavioral Analysis
  • 28.2 Using Falco for Threat Detection
  • 28.3 Falco Host Installation
  • 28.4 Falco Kubernetes Installation
  • 28.5 Falco Configuration and Rules
  • 28.6 Falco Custom Rules in Action
  • 29.1 MITRE ATT&CK Framework
  • 29.2 Security Event Log Review
  • 29.3 Gathering Evidence of Compromise
  • 29.4 Practicing Kubernetes Security
  • 30.1 Securing Kubernetes API Access
  • 30.2 Implementing Pod Security Standards (PSS)
  • 30.3 Enforcing Network Policies for Pod Communication
  • 30.4 Restricting Image Registries
  • 30.5 Configuring Secret Encryption
  • 31.1 Container Runtime Security
  • 31.2 Detecting Malicious Behavior Using Falco
  • 31.3 Enforcing Network Encryption
  • 31.4 Secure Ingress via TLS
  • 31.5 Detecting and Mitigating Security Vulnerabilities
  • 1280x720
  • Certified Kubernetes Security Specialist (CKS) Introduction
  • Certified Kubernetes Security Specialist (CKS) Introduction (1)
  • Certified Kubernetes Security Specialist (CKS) Summary
  • Learning objectives
  • Learning objectives (1)
  • Learning objectives (2)
  • Learning objectives (3)
  • Learning objectives (4)
  • Learning objectives (5)
  • Learning objectives (6)
  • Learning objectives (7)
  • Learning objectives (8)
  • Learning objectives (9)
  • Learning objectives (10)
  • Learning objectives (11)
  • Learning objectives (12)
  • Learning objectives (13)
  • Learning objectives (14)
  • Learning objectives (15)
  • Learning objectives (16)
  • Learning objectives (17)
  • Learning objectives (18)
  • Learning objectives (19)
  • Learning objectives (20)
  • Learning objectives (21)
  • Learning objectives (22)
  • Learning objectives (23)
  • Learning objectives (24)
  • Learning objectives (25)
  • Learning objectives (26)
  • Learning objectives (27)
  • Learning objectives (28)
  • Learning objectives (29)
  • Learning objectives (30)
  • Module Introduction
  • Module Introduction (1)
  • Module Introduction (2)
  • Module Introduction (3)
  • Module Introduction (4)
  • Module Introduction (5)
  • Module Introduction (6)
  • Module Introduction (7)
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 44909
    حجم: 31344 مگابایت
    مدت زمان: 1168 دقیقه
    تاریخ انتشار: ۱ تیر ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید