Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Kubernetes Security

Course Summary

The Kubernetes Security training course is designed for experienced developers that want to harden Kubernetes clusters simply beyond the operational aspects that may cause misconfiguration and compromise the security of a cluster. Kubernetes is an open-source container/orchestration system used to create highly scalable, maintainable, and reliable infrastructure automation.

Students will begin by learning how Kubernetes clusters can be misconfigured and cause security vulnerabilities. Next, students will gain new skills in identifying and mitigating security issues within a cluster with real-world examples in a hands-on Kubernetes cluster. Performance tuning of Kubernetes clusters will be examined and the considerations that need to be made to increase performance but not reduce the security of the cluster. Finally, students will understand the architecture of Kubernetes security and gain the skills necessary for expertise in securing a cluster.

Purpose
Learn how to harden Kubernetes clusters and resolve security issues that may happen through misconfiguration or performance tuning.
Audience
Software developers and DevOps engineers that are building and maintaining Kubernetes clusters to host production applications at scale.
Role
DevOps Engineer - Software Developer - System Administrator
Skill Level
Intermediate
Style
Targeted Topic - Workshops
Duration
2 Days
Related Technologies
Kubernetes | Cybersecurity

 

Productivity Objectives
  • Harden a Kubernetes cluster by identifying and mitigating security vulnerabilities.
  • Develop secure containers in Kubernetes.
  • Implement CI/CD best practices to test the reliability of a Kubernetes cluster.

What You'll Learn:

In the Kubernetes Security training course, you'll learn:
  • Introduction to Kubernetes Security
    • What isn't my cluster hardened by default?
    • Definition of terms and concerns in Kubernetes security
    • What is an immutable design?
  • Hardening Nodes
    • Configuration and Deployment
  • Hardening Images
    • Configuration and Deployment
  • Hardening Pods
    • Pod Policies
  • Managing RBAC and service accounts
  • Securing API access
  • Hardening Network Policy
    • Configuration and Deployment
  • Using Secrets and Vaults
  • Securing Etcd
  • Implementing tests in your CI/CD process
  • Performance Tuning without exposing new vulnerabilities
  • Understanding GateKeepers
“I appreciated the instructor's technique of writing live code examples rather than using fixed slide decks to present the material.”

VMware

Dive in and learn more

When transforming your workforce, it's important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.