وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Certified Kubernetes Security Specialist (CKS) – Feb 2025

سرفصل های دوره
  • 1.1 CKS Certification Requirements
  • 1.2 Resources and Study Tools
  • 1.3 Practice Strategy
  • 1.4 Creating a Study Timeline and Expectations
  • 2.1 Lab Environment and Architecture
  • 2.2 Local Installation
  • 2.3 Cloud Installation
  • 2.4 Your Cluster Up and Running
  • 3.1 Cloud Native Security
  • 3.2 Kubernetes Architecture
  • 3.3 Kubernetes PKI Architecture
  • 3.4 Threat Modeling K8s
  • 3.5 Real World K8s Hacks
  • 3.6 OWASP Kubernetes Top 10
  • 4.1 Network Security Overview
  • 4.2 Pod Communication Policies
  • 4.3 Segmentation
  • 5.1 CIS Benchmarks for Kubernetes
  • 5.2 Install Kube-bench
  • 5.3 Checking Compliance with Kube-bench
  • 6.1 Understanding Ingress
  • 6.2 Creating Ingress Objects
  • 6.3 Ingress Security Options
  • 7.2 Network Policies
  • 7.3 Node Metadata Protection
  • 7.4 Implement Kubelet Authentication
  • 7.5 Test Kubelet and Node Metadata Security
  • 8.1 K8s Dashboard Architecture
  • 8.2 Dashboard Installation
  • 8.3 Role Based Access Control (RBAC)
  • 9.1 Understanding Platform Binary Integrity
  • 9.2 Download the Latest Kubernetes Release
  • 9.3 Verify Binary Checksum
  • 10.1 Kubernetes API Fundamentals
  • 10.2 Kubernetes Access Control
  • 10.3 API Server Configuration
  • 10.4 API Server Hardening
  • 10.5 Verify Access Control Policies
  • 11.1 Understanding Kubernetes RBAC
  • 11.2 Creating a User Account
  • 11.3 Applying Roles to a User
  • 11.4 Configuring and Binding Cluster Roles
  • 11.5 Verifying Role Rules
  • 12.1 Understanding Service Accounts
  • 12.2 Creating a Service Account
  • 12.3 Disable Default Settings
  • 12.4 Verify Service Account Permissions
  • 13.1 Kubernetes Update Process
  • 13.2 Plan Upgrade Process
  • 13.3 Upgrade Components and Test
  • 14.1 Host Hardening
  • 14.2 Remove Unneeded Services
  • 14.3 Log System Activities
  • 14.4 Limit Access
  • 15.1 Understanding External Access to Kubernetes
  • 15.2 Finding Open Ports
  • 15.3 Host Firewall Configuration
  • 15.4 Test Host Firewall
  • 16.1 Understanding Kernel Threats
  • 16.2 Using Seccomp
  • 16.3 Using AppArmor
  • 16.4 Testing Kernel Security
  • 17.1 Principle of Least Privilege
  • 17.2 Host Based IAM
  • 17.3 Restricting User Privileges
  • 17.4 Controlling File Access and User Logging
  • 17.5 Understanding Cloud RBAC
  • 18.1 Understanding Pod Security
  • 18.2 Configure Security Contexts
  • 18.3 Pod Security Admission
  • 18.4 OPA Gatekeeper
  • 19.1 Understanding Kubernetes Secrets
  • 19.2 Creating and Using a Secret
  • 19.3 Using Secrets in Pods
  • 19.4 Encrypting Secrets at Rest
  • 20.1 Containing Containers
  • 20.2 Sandboxed Pods
  • 20.3 Using gVisor
  • 20.4 Using Kata Containers
  • 21.1 Introduction to Cilium and mTLS
  • 21.2 Using Cilium for Pod-to-Pod Encryption
  • 21.3 Deploying and Verifying mTLS with Cilium
  • 22.1 Software Supply Chain Risks
  • 22.2 Protect Image Registry Access
  • 22.3 Require Signed Images
  • 22.4 Policy Enforcement Image Policy Webhook
  • 22.5 Policy Enforcement Validating Admission Policy
  • 23.1 Static Analysis Fundamentals
  • 23.2 Scan Manifests for Vulnerabilities with Kube-linter
  • 23.3 Scanning for Cluster Vulnerabilities
  • 24.1 Understanding Container Images
  • 24.2 Use Image Creation Good Practices
  • 24.3 Reduce Image Attack Surface
  • 25.1 Scanning for Vulnerable Images
  • 25.2 Using Trivy to Identify Vulnerable Containers
  • 25.3 Using the Trivy Operator
  • 25.4 Using Trivy and Kyverno for SBOM Attestation
  • 26.1 Understanding Immutability
  • 26.2 Read Only Filesystem
  • 26.3 Policy Enforcement with VAP
  • 27.1 Auditing in Kubernetes
  • 27.2 Define an Audit Policy
  • 27.3 Event Batching and Tuning
  • 27.4 Configure Backend Log Storage
  • 28.1 Understanding Syscall Behavioral Analysis
  • 28.2 Using Falco for Threat Detection
  • 28.3 Falco Host Installation
  • 28.4 Falco Kubernetes Installation
  • 28.5 Falco Configuration and Rules
  • 28.6 Falco Custom Rules in Action
  • 29.1 MITRE ATT&CK Framework
  • 29.2 Security Event Log Review
  • 29.3 Gathering Evidence of Compromise
  • 29.4 Practicing Kubernetes Security
  • 30.1 Securing Kubernetes API Access
  • 30.2 Implementing Pod Security Standards (PSS)
  • 30.3 Enforcing Network Policies for Pod Communication
  • 30.4 Restricting Image Registries
  • 30.5 Configuring Secret Encryption
  • 31.1 Container Runtime Security
  • 31.2 Detecting Malicious Behavior Using Falco
  • 31.3 Enforcing Network Encryption
  • 31.4 Secure Ingress via TLS
  • 31.5 Detecting and Mitigating Security Vulnerabilities
  • 1280x720
  • Certified Kubernetes Security Specialist (CKS) Introduction
  • Certified Kubernetes Security Specialist (CKS) Introduction (1)
  • Certified Kubernetes Security Specialist (CKS) Summary
  • Learning objectives
  • Learning objectives (1)
  • Learning objectives (2)
  • Learning objectives (3)
  • Learning objectives (4)
  • Learning objectives (5)
  • Learning objectives (6)
  • Learning objectives (7)
  • Learning objectives (8)
  • Learning objectives (9)
  • Learning objectives (10)
  • Learning objectives (11)
  • Learning objectives (12)
  • Learning objectives (13)
  • Learning objectives (14)
  • Learning objectives (15)
  • Learning objectives (16)
  • Learning objectives (17)
  • Learning objectives (18)
  • Learning objectives (19)
  • Learning objectives (20)
  • Learning objectives (21)
  • Learning objectives (22)
  • Learning objectives (23)
  • Learning objectives (24)
  • Learning objectives (25)
  • Learning objectives (26)
  • Learning objectives (27)
  • Learning objectives (28)
  • Learning objectives (29)
  • Learning objectives (30)
  • Module Introduction
  • Module Introduction (1)
  • Module Introduction (2)
  • Module Introduction (3)
  • Module Introduction (4)
  • Module Introduction (5)
  • Module Introduction (6)
  • Module Introduction (7)
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 44909
    حجم: 31344 مگابایت
    مدت زمان: 1168 دقیقه
    تاریخ انتشار: ۱ تیر ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید