Kubernetes CKS 2022 Complete Course - Theory - Practice

BY
Udemy

Mode

Online

Fees

₹ 1699

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course and certificate fees

Fees information
₹ 1,699
certificate availability

Yes

certificate providing authority

Udemy

The syllabus

Introduction

  • Welcome
  • Best Video Quality
  • Slack Community
  • K8s Security Best Practises

Create your course K8s cluster

  • Cluster Specification
  • Practice - Create GCP Account
  • Practice - Configure "gcloud" command
  • Practice - Create Kubeadm Cluster in GCP
  • Practice - Firewall rules for NodePorts
  • Notice: Always stop your instances
  • Containerd Course Upgrade
  • Recap

Killercoda Access

  • How to get Access
  • Your Access Code

Foundation - Kubernetes Secure Architecture

  • Intro
  • Practice - Find various K8s certificates
  • Recap

Foundation - Containers under the hood

  • Intro
  • Container Tools Introduction
  • Practice - The PID Namespace
  • Recap
  • TEST - Docker Container Namespaces
  • TEST - Podman Container Namespaces

Cluster Setup - Network Policies

  • Cluster Reset
  • Introduction1
  • Introduction 2
  • Practice- Default Deny
  • Practice - Frontend to Backend Practice
  • Practice - Backend to Database traffic
  • Recap
  • TEST - Default-Deny Network Policy
  • TEST - NetworkPolicy Namespace Communication

Cluster Setup - GUI Elements

  • Introduction
  • Practice - Install Dashboard
  • Practice - Outside Insecure Access
  • Practice - RBAC for the Dashboard
  • Recap

Cluster Setup - Secure Ingress

  • K8s Docs in correct Version
  • Introduction
  • Practice - Create an Ingress
  • Practice - Secure an Ingress
  • Recap
  • TEST - Create an Ingress
  • TEST - Secure an Ingress

Cluster Setup - Node Metadata Protection

  • Introduction
  • Practice: Access Node Metadata
  • Practice: Protect Node Metadata via NetworkPolicy
  • Recap
  • TEST - NetworkPolicy Metadata Protection

Cluster Setup - CIS Benchmarks

  • Introduction
  • Practice - CIS in Action
  • Practice - kube-bench
  • Recap
  • TEST - Apply CIS rules for Controlplane

Cluster Setup - Verify Platform Binaries

  • Introduction
  • Practice - Download and verify K8s release
  • Practice - Verify apiserver binary running in our cluster
  • Recap
  • TEST - Verify Kubelet Binary

Cluster Hardening - RBAC

  • Intro
  • Practice - Role and Rolebinding
  • Practice - ClusterRole and ClusterRoleBinding
  • Accounts and Users
  • Practice - CertificateSigningRequests
  • Recap
  • TEST - RBAC ServiceAccount Permissions
  • TEST - RBAC User Permissions
  • TEST - CertificateSigningRequests Sign Manually
  • TEST - CertificateSigningRequests Sign via API

Cluster Hardening - Exercise Caution in Using ServiceAccount

  • Intro
  • Practice - Pod uses custom ServiceAccount
  • Practice - Disable ServiceAccount mounting
  • Practice - Limit ServiceAccounts using RBAC
  • Recap
  • TEST - ServiceAccount Token Mounting

Cluster Hardening - Restrict API Access

  • Introduction
  • Practice - Anonymous Access
  • Practice - Insecure Access
  • Practice - Manual API Request
  • Practice - External Apiserver Access
  • NodeRestriction AdmissionController
  • Practice - Verify NodeRestriction
  • Recap
  • TEST - Crash that Apiserver
  • TEST - Apiserver Manifest Misconfigured
  • TEST - NodeRestriction

Cluster Hardening - Upgrade Kubernetes

  • Introduction
  • Practice - Create outdated cluster
  • Practice - Upgrade controlplane node
  • Practice - Upgrade node
  • Recap

Microservice Vulnerabilities - Manage Kubernetes Secrets

  • Introduction
  • Practice - Create Simple Secret Scenario
  • Practice - Hack Secrets in Container Runtime
  • Practice - Hack Secrets in ETCD
  • ETCD Encryption
  • Practice - Encrypt ETCD
  • Recap
  • TEST - Access Secrets in Pods
  • TEST - Read Secret Values
  • TEST - Secrets Pods and ServiceAccount
  • TEST - ETCD Encryption

Microservice Vulnerabilities - Container Runtime Sandboxes

  • Introduction
  • Practice - Container calls Linux Kernel
  • Open Container Initiative OCI
  • Sandbox Runtime Katacontainers
  • Sandbox Runtime gVisor
  • Practice - Create and use RuntimeClasses
  • Practice - Install and use gVisor
  • Recap
  • TEST - gVisor and RuntimeClass

Microservice Vulnerabilities - OS Level Security Domains

  • Intro and Security Contexts
  • Practice - Set Container User and Group
  • Practice - Force Container Non-Root
  • Privileged Containers
  • Practice - Create Privileged Containers
  • PrivilegeEscalation
  • Practice - Disable PriviledgeEscalation
  • PodSecurityPolicies
  • Practice - Create and enable PodSecurityPolicy
  • Recap
  • TEST - Privileged Containers
  • TEST - Privilege Escalation Containers

Microservice Vulnerabilities - mTLS

  • Intro
  • Practice - Create sidecar proxy
  • Recap

Open Policy Agent (OPA)

  • Cluster Reset
  • Introduction
  • Practice - Install OPA
  • Practice - Deny All Policy
  • Practice - Enforce Namespace Labels
  • Practice - Enforce Deployment replica count
  • Practice - The Rego Playground and more examples
  • Recap

Supply Chain Security - Image Footprint

  • Introduction
  • Practice - Reduce Image Footprint with Multi-Stage
  • Practice - Secure and harden Images
  • Recap
  • TEST - Image Footprint User
  • TEST - Image Container Hardening

Supply Chain Security - Static Analysis

  • Introduction
  • Kubesec
  • Practice - Kubesec
  • OPA Conftest
  • Practice - OPA Conftest for K8s YAML
  • Practice - OPA Conftest for Dockerfile
  • Recap
  • TEST - Manual Static Analysis K8s
  • TEST - Manual Static Analysis Docker

Supply Chain Security - Image Vulnerability Scanning

  • Introduction
  • Clair and Trivy
  • Practice - Use Trivy to scan images
  • Recap
  • TEST - Scan images using Trivy

Supply Chain Security - Secure Supply Chain

  • Introduction
  • Practice - Image Digest
  • Practice - Whitelist Registries with OPA
  • ImagePolicyWebhook
  • Practice - ImagePolicyWebhook
  • Recap
  • TEST - Complete ImagePolicyWebhook Setup
  • TEST - Use Image Digest

Runtime Security - Behavioral Analytics at host and container level

  • Introduction
  • Practice - Strace
  • Practice - Strace and /proc on ETCD
  • Practice - /proc and env variables
  • Practice - Falco and Installation
  • Practice - Use Falco to find malicious processes
  • Practice - Investigate Falco rules
  • Practice - Change Falco Rule
  • Recap
  • TEST - Syscall Activity Strace
  • TEST - Falco Rule Change

Runtime Security - Immutability of containers at runtime

  • Introduction
  • Ways to enforce immutability
  • Practice - StartupProbe changes container
  • Practice - SecurityContext renders container immutable
  • Recap
  • TEST - Immutability Readonly Filesystem

Runtime Security - Auditing

  • Introduction
  • Practice - Enable Audit Logging in Apiserver
  • Practice - Create Secret and check Audit Logs
  • Practice - Create advanced Audit Policy
  • Practice - Investigate API access history
  • Recap
  • TEST - Enable Audit Logging

System hardening - Kernel Hardening Tools

  • Introduction
  • AppArmor
  • Practice - AppArmor for curl
  • Practice - AppArmor for Docker Nginx
  • Practice - AppArmor for Kubernetes Nginx
  • Seccomp
  • Practice - Seccomp for Docker Nginx
  • Practice - Seccomp for Kubernetes Nginx
  • Recap
  • TEST - AppArmor

System hardening - Reduce Attack Surface

  • Introduction
  • Practice - Systemctl and Services
  • Practice - Install and investigate Services
  • Practice - Disable application listening on port
  • Practice - Investigate Linux Users
  • Recap
  • TEST - Close Open Ports
  • TEST - Manage Packages
  • CKS Exam Series

Linux Foundation Simulator Sessions

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses