Securing an EKS Cluster
This course will teach you the security compliance concepts of the Kubernetes cluster, how to secure microservices at scale and Ensure the safety of the cluster from any security or third-party violations.
Being a DevSecOps professional you need to secure the microservices hosted on cloud or on-prem with efficient security tactics. In this course, Securing an EKS Cluster, you’ll learn to manage, secure and control microservices. First, you’ll explore Kubernetes and the administration of its cluster. Next, you’ll discover the security and IAM aspects of the Kubernetes Cluster. Finally, you’ll learn how to incorporate security and system network policies within Kubernetes. When you’re finished with this course, you’ll have the skills and knowledge of Securing Applications in Kubernetes Cluster needed to run microservices securely with the least possible privileges.
Author Name: Tapan Ghatalia
Author Description:
Tapan has over a decade of work experience in Business Intelligence, Product Management and Cloud Architecture and has excellent command over languages like Python, Go and Scala. He has worked extensively in Data Analytics and with tools like Thoughtspot and Tableau. He has a deep interest in Quantum Computing and Quantum Mechanics leading him to work considerably on Quantum Computing libraries such as Qiskit and Cirq.
Table of Contents
- Course Overview
1min - Understanding IAM User, Role, and Group
20mins - Demystifying Kubernetes Security for Applications
12mins - Understanding Kubeconfig
11mins - Granting Admin Access to Other Users
10mins - Granting Granular Access to Other Users Using RBAC
10mins
There are no reviews yet.