Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Kubernetes Security Best Practices You Need to Know - The Guide for Securing Your K8s Cluster

TechWorld with Nana via YouTube

Overview

Learn the top 10 Kubernetes Security Best Practices to secure your K8s cluster. The course covers essential topics such as image scanning, running as a non-root user, managing users & permissions with RBAC, implementing network policies, encrypting communication, securing secret data, protecting etcd, setting up automated backup & restore, configuring security policies, and disaster recovery. The course aims to equip learners with the necessary skills to enhance the security of Kubernetes clusters. The teaching method includes a video lecture format with practical demonstrations. This course is intended for individuals interested in cloud security, Kubernetes administration, DevOps, or anyone looking to strengthen the security of their Kubernetes environments.

Syllabus

- Intro.
- Security in Cloud in general.
- Security in Kubernetes.
- Security as a Spectrum.
- BP 1 - Image Scanning.
- BP 2 - Run as Non-Root User.
- BP 3 - Users & Permissions with RBAC.
- BP 4 - Use Network Policies.
- BP 5 - Encrypt Communication.
- BP 6 - Secure Secret Data.
- BP 7 - Secure etcd.
- BP 8 - Automated Backup & Restore.
- BP 9 - Configure Security Policies.
- BP 10 - Disaster Recovery.

Taught by

TechWorld with Nana

Reviews

Start your review of Kubernetes Security Best Practices You Need to Know - The Guide for Securing Your K8s Cluster

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.