動画検索
関連広告
検索結果
Introduction and Welcome
K8s Security Best Practices
Create your course K8s cluster
Foundation - Kubernetes Secure Architecture
Foundation - Containers under the hood
Cluster Reset
Cluster Setup - GUI Elements
K8s Docs Version
Cluster Setup - Node Metadata Protection
Cluster Setup - CIS Benchmarks
Cluster Setup - Verify Platform Binaries
Cluster Hardening - Exercise caution in using ServiceAccounts
Cluster Hardening - Restrict API Access
Cluster Hardening - Upgrade Kubernetes
Microservice Vulnerabilities - Container Runtime Sandboxes
Microservice Vulnerabilities - OS Level Security Domains
Cluster Reset
Open Policy Agent (OPA)
Supply Chain Security - Image Footprint
Supply Chain Security - Image Vulnerability Scanning
Supply Chain Security - Secure Supply Chain
Runtime Security - Behavioral Analytics at host and container level
Runtime Security - Auditing
System Hardening - Kernel Hardening Tools
CKS Simulator
About
About CKS Exam
CKS In my view & CKA
CKS compare with CKA
Mock Exams to consider
CKS Exam 1st step, setup one liner vimrc
During the CKS Exam
Use Bookmarks
CKS Exam Categories
Control plane category
General resource category
Control plane category topics (1 to 8)
General resource category topics (1 to 10)
Ending note
Intro
Why Kubernetes?
Difference between CKS and CKA
CKS exam validity
Initial scans
Kubernetes Objects as a Version Control System
What gaps do you see in the market for Kubernetes security?
Question: What are some of the major container scanner tools that you are aware of?
What do you see as one of the issues when learning Kubernetes?
Conclusion