وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Configuring and Managing Kubernetes Security

سرفصل های دوره

This course will teach you the fundamentals needed to configure and manage security in Kubernetes clusters.


1. Course Overview
  • 1. Course Overview

  • 2. Kubernetes Security Fundamentals
  • 01. Introduction, Course, and Module Overview
  • 02. Securing the API Server and Authentication Plugins
  • 03. Users in Kubernetes
  • 04. Service Accounts and Service Account Credentials
  • 05. Creating a Service Account and Defining a ServiceAccount in a Pod Spec
  • 06. Demo- Investigating Certificate Based Authentication
  • 07. Demo- Working with Service Accounts
  • 08. Demo- Accessing the API Server Inside a Pod
  • 09. Demo- Testing API Access with kubectl can-i with Impersonation
  • 10. Authorization Plugins
  • 11. Demo- Managing Authorization for Service Accounts
  • 12. Module Review and Whats Next!

  • 3. Managing Certificates and kubeconfig Files
  • 01. Introduction, Course, and Module Overview
  • 02. Certificates and PKI in Kubernetes
  • 03. kubeconfig Files and Certificate-based Authentication
  • 04. How Certificates Are Used in Kubernetes Clusters
  • 05. Demo- Investigating PKI Setup on a Control Plane Node
  • 06. Demo- Investigating a Control Plane Pod kubeconfig Configuration
  • 07. Creating Certificates with the Certificate API
  • 08. Creating a Certificate Signing Request in openssl
  • 09. Creating a CertificateSigningRequest Object
  • 10. Approving a CertificateSigningRequest and Retrieving a Certificate
  • 11. Demo- Creating a Certificate Signing Request for a New User in openssl
  • 12. Demo- Creating a CertificateSigningRequest Object, Approving a CertificateSigningRequest and Retrieving a Certificate
  • 13. kubeconfig File Overview and Components
  • 14. kubeconfig File - admin.conf
  • 15. Creating a kubeconfig File Manually
  • 16. Demo- Working with kubeconfig Files and Contexts
  • 17. Demo- Creating a kubeconfig File for a New User
  • 18. Demo- Using a new kubeconfig File with a New User
  • 19. Demo- Creating a new Linux User and Configuring Cluster Access
  • 20. Module Review and Whats Next!

  • 4. Managing Role Based Access Controls
  • 01. Introduction, Course, and Module Overview
  • 02. Role Based Access Controls and API Objects for RBAC
  • 03. Introducing Roles and ClusterRoles
  • 04. Introducing RoleBinding and ClusterRoleBinding
  • 05. What to Use When-
  • 06. Using RBAC in Your Cluster
  • 07. Default ClusterRoles
  • 08. Defining Role, RoleBinding, ClusterRole, and ClusterRoleBinding
  • 09. Creating a Role and a RoleBinding
  • 10. Demo- Creating a Role and RoleBinding
  • 11. Demo- Testing API Access with kubectl can-i and Impersonation
  • 12. Demo- Creating a ClusterRole and ClusterRoleBinding
  • 13. Demo- Creating a ClusterRole and RoleBinding
  • 14. Demo- Giving a User Full Access to Deployments
  • 15. Module Review and Thank You!
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 3569
    حجم: 372 مگابایت
    مدت زمان: 135 دقیقه
    تاریخ انتشار: 29 دی 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید