Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Certified Kubernetes Security Specialist Masterclass 2023

Alexhost
OP
O 0

oaxino

Alpha and Omega
Member
Access
Joined
Nov 24, 2022
Messages
30,024
Reaction score
873
Points
113
Age
35
Location
japanse
grants
₲89,811
1 years of service

6d0da54eb65ded25f62d601d647566b7.jpeg

Certified Kubernetes Security Specialist Masterclass 2023
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.56 GB | Duration: 2h 49m

Certified Kubernetes Security Specialist Ultimate Preparation Guide Masterclass | Theory | Hands-on | Labs | Complete​

What you'll learn
Use Network security policies to restrict cluster level access
Use CIS benchmark to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi)
Properly set up Ingress objects with security control
Protect node metadata and endpoints
Minimize use of, and access to, GUI elements
Verify platform binaries before deploying
Restrict access to Kubernetes API
Use Role Based Access Controls to minimize exposure
Exercise caution in using service accounts e.g. disable defaults, minimize permissions on newly created ones
Update Kubernetes frequently
Minimize host OS footprint (reduce attack surface)
Minimize IAM roles
Minimize external access to the network
Appropriately use kernel hardening tools such as AppArmor, seccomp
Setup appropriate OS level security domains
Manage Kubernetes secrets
Use container runtime sandboxes in multi-tenant environments (e.g. gvisor, kata containers)
Implement pod to pod encryption by use of mTLS
Minimize base image footprint
Secure your supply chain: whitelist allowed registries, sign and validate images
Use static analysis of user workloads (Kubernetes resources, Docker files)
Scan images for known vulnerabilities
Perform behavioral analytics of syscall process and file activities at the host and container level to detect malicious activities
Detect threats within physical infrastructure, apps, networks, data, users and workloads
Detect all phases of attack regardless where it occurs and how it spreads
Perform deep analytical investigation and identification of bad actors within environment
Ensure immutability of containers at runtime
Use Audit Logs to monitor access
Requirements
Must know the basics of Kubernetes
Must have some hands on experience of Kubernetes
Ideally CKA or CKAD certified as that is also a prerequisite to take the CKS Exam
Description
Cluster SetupUse Network security policies to restrict cluster level accessUse CIS benchmark to review the security configuration of Kubernetes components (etcd, kubelet, kubedns, kubeapi)Properly set up Ingress objects with security controlProtect node metadata and endpointsMinimize use of, and access to, GUI elementsVerify platform binaries before deployingCluster HardeningRestrict access to Kubernetes APIUse Role Based Access Controls to minimize exposureExercise caution in using service accounts e.g. disable defaults, minimize permissions on newly created onesUpdate Kubernetes frequentlySystem HardeningMinimize host OS footprint (reduce attack surface)Minimize IAM rolesMinimize external access to the networkAppropriately use kernel hardening tools such as AppArmor, seccompMinimize Microservice VulnerabilitiesSetup appropriate OS level security domainsManage Kubernetes secretsUse container runtime sandboxes in multi-tenant environments (e.g. gvisor, kata containers)Implement pod to pod encryption by use of mTLSSupply Chain SecurityMinimize base image footprintSecure your supply chain: whitelist allowed registries, sign and validate imagesUse static analysis of user workloads (e.g.Kubernetes resources, Docker files)Scan images for known vulnerabilitiesMonitoring, Logging and Runtime SecurityPerform behavioral analytics of syscall process and file activities at the host and container level to detect malicious activitiesDetect threats within physical infrastructure, apps, networks, data, users and workloadsDetect all phases of attack regardless where it occurs and how it spreadsPerform deep analytical investigation and identification of bad actors within environmentEnsure immutability of containers at runtimeUse Audit Logs to monitor access
Overview
Section 1: Introduction
Lecture 1 CKS Exam Strategy, Tips & Tricks
Lecture 2 Trivy Introduction
Lecture 3 Trivy - Scan Pods
Lecture 4 Extract Secrets & Save to a File
Lecture 5 gVisor Demo
Lecture 6 CIS Benchmarks for Hardening a Kubernetes Cluster
Lecture 7 Fix Dockerfile and Deployment.yaml for any security vulnerabilities
Lecture 8 Enable Auditing
Lecture 9 Falco
Lecture 10 AppArmor
Lecture 11 Gatekeeper or Open Policy Agent
Lecture 12 PodSecurityPolicy
Lecture 13 Fix Incorrectly Specified ServiceAccount in a Pod, Create Role, Rolebinding etc.
Lecture 14 Fix Overly Permissive Permissions for Pod's SA & Create SA, Role, Rolebindings
Lecture 15 Scenario Based Question - Admission Controller - Image Scanner
Lecture 16 Scenario Based Question - Network Policies - 1
Lecture 17 Scenario Based Question - Network Policies - 2
Lecture 18 Scenario Based Question - Verify Platform Binaries
Lecture 19 Read Kubernetes Secrets from ETCD
Lecture 20 Create & Secure an Ingress
Anyone wishing to learn about Kubernetes Security or want to pass the CKS Exam

2704ecf5c955c7de740ca9fe0073016f.jpeg

Download link

rapidgator.net:
You must reply in thread to view hidden text.

ddownload.com:
You must reply in thread to view hidden text.

1dl.net:
You must reply in thread to view hidden text.
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
615,750
Reaction score
7,870
Points
83
grants
₲58,403
2 years of service
oaxino salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 
Top Bottom