Configuring and Managing Kubernetes Security
This course will teach you the fundamentals needed to configure and manage security in Kubernetes clusters.
In this course, Configuring and Managing Kubernetes Security, you’ll learn the foundations needed for securing access to your Kubernetes Cluster. First, you’ll explore Kubernetes security fundamentals, learning how authentication and authorization work to control access to the Kubernetes API. Then, you’ll learn how certificates are used in Kubernetes and how to create and manage certificates in your cluster. Next, you’ll learn how to create and manage kubeconfig files for accessing clusters and then configure cluster access for a new user. Finally, you’ll learn how to control access to the Kubernetes API with role based access controls. When you’re finished with this course you will have the skills needed to operate and manage security in Kubernetes clusters. This course can also help you prepare for your Certified Kubernetes Administrator (CKA) certification.
Author Name: Anthony Nocentino
Author Description:
Anthony is a Senior Principal Field Solution Architect at Pure Storage as well as a Pluralsight Author, a Microsoft Data Platform MVP, Linux Expert, and Corporate Problem Solver. Anthony designs solutions, deploys the technology, and provides expertise on business system performance, architecture, and security. Anthony has a Bachelors and Masters in Computer Science with research publications in high performance/low latency data access algorithms and spatial database systems.
There are no reviews yet.