Kubernetes Security: System Hardening
This course will teach you the concepts for securing the Kubernetes underlying infrastructure.
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. In this course, Kubernetes Security: System Hardening, you’ll learn to secure the underlying Kubernetes infrastructure. First, you’ll explore how to limit the host access and use IAM roles and policies to control what users can do in the Kubernetes nodes. Next, you’ll discover best practices to have in mind while choosing and installing the packages and services in your operating system. Finally, you’ll learn how to secure the network traffic and restrict the kernel usage to make the systems more secure. When you’re finished with this course, you’ll have the skills and knowledge of security needed to perform the hardening of the systems where your Kubernetes cluster runs.
Author Name: Antonio Jesús Piedra
Author Description:
Antonio is a DevOps Engineer who loves to experiment with cutting-edge technologies. He is a Certified Kubernetes Administrator, Application Developer and Security Specialist. Antonio likes to understand the end-to-end process and he is frequently involved in design reviews, Python development, creating Docker images, writing pipelines or building Kubernetes clusters at home using Raspberry Pi’s. In addition to his passion for technology, Antonio enjoys hiking and DIY projects.
Table of Contents
- Course Overview
1min - Limit Host Access
14mins - Manage IAM Roles and Policies
5mins - Remove OS Attack Surface
5mins - Secure Network Access
9mins - Restrict the Kernel
13mins
There are no reviews yet.