Certified Kubernetes Security Specialist (CKS)
File List
- Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/004. 4.3 Segmentation.mp4 99.2 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.mp4 90.5 MB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/005. 22.4 Policy Enforcement Image Policy Webhook.mp4 78.3 MB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.mp4 67.8 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/003. 21.2 Using Cilium for Pod-to-Pod Encryption.mp4 65.0 MB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/005. 10.4 API Server Hardening.mp4 62.4 MB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/005. 2.4 Your Cluster Up and Running.mp4 61.8 MB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.mp4 61.4 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.mp4 60.2 MB
- Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/004. 13.3 Upgrade Components and Test.mp4 57.8 MB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/004. 2.3 Cloud Installation.mp4 57.2 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.mp4 54.6 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/003. 20.2 Sandboxed Pods.mp4 53.8 MB
- Module 4 System Hardening/Lesson 16 Kernel Hardening/003. 16.2 Using Seccomp.mp4 53.5 MB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/006. 10.5 Verify Access Control Policies.mp4 52.3 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/002. 18.1 Understanding Pod Security.mp4 51.9 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.mp4 51.9 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.mp4 51.8 MB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/004. 7.3 Node Metadata Protection.mp4 51.8 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.mp4 50.3 MB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/004. 10.3 API Server Configuration.mp4 49.4 MB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.mp4 48.7 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/003. 18.2 Configure Security Contexts.mp4 47.7 MB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.mp4 46.8 MB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/004. 22.3 Require Signed Images.mp4 46.2 MB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.mp4 46.0 MB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.mp4 44.8 MB
- Module 4 System Hardening/Lesson 16 Kernel Hardening/005. 16.4 Testing Kernel Security.mp4 44.2 MB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.mp4 43.8 MB
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/002. 14.1 Host Hardening.mp4 43.2 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.mp4 43.1 MB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.mp4 42.6 MB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/003. 10.2 Kubernetes Access Control.mp4 42.5 MB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.mp4 41.3 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.mp4 41.1 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/005. 18.4 OPA Gatekeeper.mp4 40.2 MB
- Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/003. 8.2 Dashboard Installation.mp4 40.2 MB
- Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/003. 4.2 Pod Communication Policies.mp4 39.3 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/005. 19.4 Encrypting Secrets at Rest.mp4 38.3 MB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.mp4 38.2 MB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/004. 1.3 Practice Strategy.mp4 37.5 MB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/002. 1.1 CKS Certification Requirements.mp4 37.4 MB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).mp4 36.6 MB
- Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/002. 24.1 Understanding Container Images.mp4 36.5 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.mp4 36.1 MB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.mp4 35.7 MB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/005. 7.4 Implement Kubelet Authentication.mp4 35.5 MB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/005. 6.4 Testing Ingress Access.mp4 35.1 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/004. 21.3 Deploying and Verifying mTLS with Cilium.mp4 34.6 MB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/002. 22.1 Software Supply Chain Risks.mp4 34.3 MB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/004. 11.3 Applying Roles to a User.mp4 33.9 MB
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/004. 14.3 Log System Activities.mp4 33.8 MB
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/005. 14.4 Limit Access.mp4 33.7 MB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/002. 3.1 Cloud Native Security.mp4 33.7 MB
- Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/002. 4.1 Network Security Overview.mp4 33.0 MB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/003. 17.2 Host Based IAM.mp4 33.0 MB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/006. 11.5 Verifying Role Rules.mp4 33.0 MB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/006. 22.5 Policy Enforcement Validating Admission Policy.mp4 32.5 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.mp4 32.1 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/005. 20.4 Using Kata Containers.mp4 31.5 MB
- Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/003. 24.2 Use Image Creation Good Practices.mp4 31.0 MB
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/003. 14.2 Remove Unneeded Services.mp4 30.8 MB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/002. 2.1 Lab Environment and Architecture.mp4 30.6 MB
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/003. 15.2 Finding Open Ports.mp4 30.5 MB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.mp4 30.1 MB
- Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/004. 5.3 Checking Compliance with Kube-bench.mp4 29.0 MB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/003. 7.2 Network Policies.mp4 28.8 MB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/002. 11.1 Understanding Kubernetes RBAC.mp4 28.2 MB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/006. 7.5 Test Kubelet and Node Metadata Security.mp4 27.6 MB
- Module 4 System Hardening/Lesson 16 Kernel Hardening/004. 16.3 Using AppArmor.mp4 27.5 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.mp4 27.4 MB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/005. 1.4 Creating a Study Timeline and Expectations.mp4 27.3 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.mp4 27.0 MB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/004. 6.3 Ingress Security Options.mp4 26.7 MB
- Module 4 System Hardening/Lesson 16 Kernel Hardening/002. 16.1 Understanding Kernel Threats.mp4 26.6 MB
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/005. 15.4 Test Host Firewall.mp4 26.4 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.mp4 26.4 MB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/006. 3.5 Real World K8s Hacks.mp4 25.9 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/004. 20.3 Using gVisor.mp4 25.3 MB
- Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/004. 24.3 Reduce Image Attack Surface.mp4 25.3 MB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/003. 1.2 Resources and Study Tools.mp4 25.0 MB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/002. 7.1 Understanding Kubelet.mp4 24.9 MB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/004. 12.3 Disable Default Settings.mp4 24.9 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.mp4 24.9 MB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/002. 10.1 Kubernetes API Fundamentals.mp4 24.8 MB
- Introduction/001. Certified Kubernetes Security Specialist (CKS) Introduction.mp4 24.3 MB
- Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/004. 9.3 Verify Binary Checksum.mp4 24.3 MB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/003. 3.2 Kubernetes Architecture.mp4 23.8 MB
- Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.mp4 23.7 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.mp4 23.2 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/004. 18.3 Pod Security Admission.mp4 23.2 MB
- Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.mp4 22.7 MB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/003. 2.2 Local Installation.mp4 22.7 MB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/005. 17.4 Controlling File Access and User Logging.mp4 22.2 MB
- Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.mp4 22.1 MB
- Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/004. 8.3 Role Based Access Control (RBAC).mp4 21.7 MB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/003. 6.2 Creating Ingress Objects.mp4 21.7 MB
- Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/002. 9.1 Understanding Platform Binary Integrity.mp4 21.4 MB
- Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/003. 13.2 Plan Upgrade Process.mp4 20.7 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/002. 21.1 Introduction to Cilium and mTLS.mp4 20.5 MB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/004. 17.3 Restricting User Privileges.mp4 20.4 MB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/002. 17.1 Principle of Least Privilege.mp4 20.2 MB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/003. 22.2 Protect Image Registry Access.mp4 19.7 MB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/005. 11.4 Configuring and Binding Cluster Roles.mp4 19.7 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/002. 20.1 Containing Containers.mp4 19.5 MB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/003. 12.2 Creating a Service Account.mp4 18.3 MB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.mp4 17.5 MB
- Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/002. 13.1 Kubernetes Update Process.mp4 17.5 MB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/005. 3.4 Threat Modeling K8s.mp4 17.3 MB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/007. 3.6 OWASP Kubernetes Top 10.mp4 17.1 MB
- Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/002. 8.1 K8s Dashboard Architecture.mp4 17.1 MB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/004. 3.3 Kubernetes PKI Architecture.mp4 17.0 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/003. 19.2 Creating and Using a Secret.mp4 16.9 MB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/005. 12.4 Verify Service Account Permissions.mp4 16.8 MB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/003. 11.2 Creating a User Account.mp4 16.7 MB
- Summary/001. Certified Kubernetes Security Specialist (CKS) Summary.mp4 15.2 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.mp4 15.2 MB
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/004. 15.3 Host Firewall Configuration.mp4 15.0 MB
- Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/003. 5.2 Install Kube-bench.mp4 14.3 MB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/006. 17.5 Understanding Cloud RBAC.mp4 14.0 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/002. 19.1 Understanding Kubernetes Secrets.mp4 13.9 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.mp4 12.7 MB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/002. 12.1 Understanding Service Accounts.mp4 12.6 MB
- Module 1 Preparing for the CKS Exam/001. Module Introduction.mp4 12.2 MB
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/002. 15.1 Understanding External Access to Kubernetes.mp4 11.7 MB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/001. Learning objectives.mp4 10.9 MB
- Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/003. 9.2 Download the Latest Kubernetes Release.mp4 10.6 MB
- Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/002. 5.1 CIS Benchmarks for Kubernetes.mp4 10.4 MB
- Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/001. Learning objectives.mp4 10.0 MB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/002. 6.1 Understanding Ingress.mp4 9.2 MB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/001. Learning objectives.mp4 9.0 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/004. 19.3 Using Secrets in Pods.mp4 8.8 MB
- Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/001. Learning objectives.mp4 8.5 MB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/001. Learning objectives.mp4 8.2 MB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.mp4 8.2 MB
- Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/001. Learning objectives.mp4 8.1 MB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.mp4 7.4 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/001. Learning objectives.mp4 7.2 MB
- Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/001. Learning objectives.mp4 7.0 MB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.mp4 6.9 MB
- Module 5 Minimize Microservice Vulnerabilities/001. Module Introduction.mp4 6.8 MB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/001. Learning objectives.mp4 6.7 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.mp4 6.7 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.mp4 6.5 MB
- Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/001. Learning objectives.mp4 6.3 MB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/001. Learning objectives.mp4 6.3 MB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/001. Learning objectives.mp4 6.2 MB
- Module 8 Exam Practice Scenarios/001. Module Introduction.mp4 6.2 MB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/001. Learning objectives.mp4 6.1 MB
- Module 4 System Hardening/001. Module Introduction.mp4 6.0 MB
- Module 6 Software Supply Chain Security/001. Module Introduction.mp4 6.0 MB
- Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.mp4 6.0 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/001. Learning objectives.mp4 5.8 MB
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/001. Learning objectives.mp4 5.7 MB
- Module 4 System Hardening/Lesson 16 Kernel Hardening/001. Learning objectives.mp4 5.5 MB
- Module 3 Cluster Hardening/001. Module Introduction.mp4 5.5 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/001. Learning objectives.mp4 5.4 MB
- Module 2 Kubernetes Cluster Setup/001. Module Introduction.mp4 5.3 MB
- Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.mp4 5.3 MB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/001. Learning objectives.mp4 5.1 MB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/001. Learning objectives.mp4 5.0 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.mp4 5.0 MB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/001. Learning objectives.mp4 4.7 MB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.mp4 4.7 MB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/001. Learning objectives.mp4 4.5 MB
- Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/001. Learning objectives.mp4 4.3 MB
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/001. Learning objectives.mp4 4.2 MB
- Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/004. 4.3 Segmentation.en.srt 34.6 KB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/005. 22.4 Policy Enforcement Image Policy Webhook.en.srt 33.1 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.en.srt 30.4 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/003. 18.2 Configure Security Contexts.en.srt 27.4 KB
- Module 4 System Hardening/Lesson 16 Kernel Hardening/003. 16.2 Using Seccomp.en.srt 27.3 KB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.en.srt 26.4 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/003. 21.2 Using Cilium for Pod-to-Pod Encryption.en.srt 26.3 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/002. 18.1 Understanding Pod Security.en.srt 25.4 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/003. 20.2 Sandboxed Pods.en.srt 25.1 KB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/005. 2.4 Your Cluster Up and Running.en.srt 24.0 KB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.en.srt 23.8 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.en.srt 22.7 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.en.srt 22.6 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/005. 18.4 OPA Gatekeeper.en.srt 22.4 KB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/004. 22.3 Require Signed Images.en.srt 22.0 KB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/004. 7.3 Node Metadata Protection.en.srt 21.0 KB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.en.srt 21.0 KB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/006. 10.5 Verify Access Control Policies.en.srt 20.5 KB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/005. 10.4 API Server Hardening.en.srt 20.1 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.en.srt 20.0 KB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.en.srt 19.9 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.en.srt 19.7 KB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.en.srt 19.7 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.en.srt 18.9 KB
- Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/004. 13.3 Upgrade Components and Test.en.srt 18.8 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/005. 19.4 Encrypting Secrets at Rest.en.srt 18.4 KB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.en.srt 18.2 KB
- Module 4 System Hardening/Lesson 16 Kernel Hardening/005. 16.4 Testing Kernel Security.en.srt 18.1 KB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/004. 2.3 Cloud Installation.en.srt 18.1 KB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).en.srt 18.0 KB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.en.srt 18.0 KB
- Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/003. 4.2 Pod Communication Policies.en.srt 18.0 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.en.srt 17.5 KB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.en.srt 17.5 KB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/004. 10.3 API Server Configuration.en.srt 17.3 KB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/003. 10.2 Kubernetes Access Control.en.srt 17.3 KB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.en.srt 17.2 KB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.en.srt 17.1 KB
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/002. 14.1 Host Hardening.en.srt 17.0 KB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/002. 1.1 CKS Certification Requirements.en.srt 16.8 KB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.en.srt 16.5 KB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/004. 1.3 Practice Strategy.en.srt 16.4 KB
- Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/002. 4.1 Network Security Overview.en.srt 16.2 KB
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/004. 14.3 Log System Activities.en.srt 16.1 KB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/002. 22.1 Software Supply Chain Risks.en.srt 16.0 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/004. 21.3 Deploying and Verifying mTLS with Cilium.en.srt 15.7 KB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/004. 11.3 Applying Roles to a User.en.srt 15.6 KB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/002. 2.1 Lab Environment and Architecture.en.srt 15.4 KB
- Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/002. 24.1 Understanding Container Images.en.srt 15.0 KB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/002. 3.1 Cloud Native Security.en.srt 14.9 KB
- Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/003. 8.2 Dashboard Installation.en.srt 14.9 KB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/005. 7.4 Implement Kubelet Authentication.en.srt 14.7 KB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/003. 3.2 Kubernetes Architecture.en.srt 14.6 KB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/004. 17.3 Restricting User Privileges.en.srt 14.5 KB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/006. 22.5 Policy Enforcement Validating Admission Policy.en.srt 14.4 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/005. 20.4 Using Kata Containers.en.srt 14.3 KB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/006. 11.5 Verifying Role Rules.en.srt 14.1 KB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/003. 17.2 Host Based IAM.en.srt 13.8 KB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/003. 7.2 Network Policies.en.srt 13.6 KB
- Module 4 System Hardening/Lesson 16 Kernel Hardening/004. 16.3 Using AppArmor.en.srt 13.6 KB
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/005. 14.4 Limit Access.en.srt 13.2 KB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/004. 6.3 Ingress Security Options.en.srt 13.1 KB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/004. 12.3 Disable Default Settings.en.srt 13.1 KB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/002. 11.1 Understanding Kubernetes RBAC.en.srt 13.0 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.en.srt 12.9 KB
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/003. 14.2 Remove Unneeded Services.en.srt 12.9 KB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.en.srt 12.9 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/004. 20.3 Using gVisor.en.srt 12.9 KB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/006. 7.5 Test Kubelet and Node Metadata Security.en.srt 12.7 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.en.srt 12.6 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.en.srt 12.6 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.en.srt 12.5 KB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/005. 1.4 Creating a Study Timeline and Expectations.en.srt 12.2 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/004. 18.3 Pod Security Admission.en.srt 12.1 KB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/005. 17.4 Controlling File Access and User Logging.en.srt 12.1 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.en.srt 12.0 KB
- Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/003. 24.2 Use Image Creation Good Practices.en.srt 11.7 KB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/005. 6.4 Testing Ingress Access.en.srt 11.5 KB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/002. 7.1 Understanding Kubelet.en.srt 11.5 KB
- Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/004. 8.3 Role Based Access Control (RBAC).en.srt 10.9 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.en.srt 10.9 KB
- Module 4 System Hardening/Lesson 16 Kernel Hardening/002. 16.1 Understanding Kernel Threats.en.srt 10.8 KB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/003. 6.2 Creating Ingress Objects.en.srt 10.6 KB
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/003. 15.2 Finding Open Ports.en.srt 10.5 KB
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/002. 10.1 Kubernetes API Fundamentals.en.srt 10.4 KB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/006. 3.5 Real World K8s Hacks.en.srt 10.3 KB
- Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/004. 9.3 Verify Binary Checksum.en.srt 10.2 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.en.srt 10.1 KB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/003. 1.2 Resources and Study Tools.en.srt 10.0 KB
- Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.en.srt 9.9 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/002. 21.1 Introduction to Cilium and mTLS.en.srt 9.9 KB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/007. 3.6 OWASP Kubernetes Top 10.en.srt 9.9 KB
- Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/004. 24.3 Reduce Image Attack Surface.en.srt 9.8 KB
- Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/003. 13.2 Plan Upgrade Process.en.srt 9.7 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/003. 19.2 Creating and Using a Secret.en.srt 9.6 KB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/003. 12.2 Creating a Service Account.en.srt 9.3 KB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/003. 11.2 Creating a User Account.en.srt 9.0 KB
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/003. 22.2 Protect Image Registry Access.en.srt 8.9 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/002. 20.1 Containing Containers.en.srt 8.8 KB
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/004. 15.3 Host Firewall Configuration.en.srt 8.8 KB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/002. 17.1 Principle of Least Privilege.en.srt 8.6 KB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/005. 3.4 Threat Modeling K8s.en.srt 8.5 KB
- Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/002. 9.1 Understanding Platform Binary Integrity.en.srt 8.4 KB
- Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/002. 8.1 K8s Dashboard Architecture.en.srt 8.3 KB
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/005. 15.4 Test Host Firewall.en.srt 8.2 KB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/005. 11.4 Configuring and Binding Cluster Roles.en.srt 8.1 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.en.srt 8.0 KB
- Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/002. 13.1 Kubernetes Update Process.en.srt 7.8 KB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/004. 3.3 Kubernetes PKI Architecture.en.srt 7.7 KB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.en.srt 7.6 KB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/003. 2.2 Local Installation.en.srt 7.3 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.en.srt 7.3 KB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/005. 12.4 Verify Service Account Permissions.en.srt 7.1 KB
- Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.en.srt 6.9 KB
- Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.en.srt 6.9 KB
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/006. 17.5 Understanding Cloud RBAC.en.srt 5.8 KB
- Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/004. 5.3 Checking Compliance with Kube-bench.en.srt 5.8 KB
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/002. 15.1 Understanding External Access to Kubernetes.en.srt 5.7 KB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/002. 12.1 Understanding Service Accounts.en.srt 5.7 KB
- Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/003. 5.2 Install Kube-bench.en.srt 5.5 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/002. 19.1 Understanding Kubernetes Secrets.en.srt 5.4 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/004. 19.3 Using Secrets in Pods.en.srt 5.2 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.en.srt 4.9 KB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/002. 6.1 Understanding Ingress.en.srt 4.7 KB
- Introduction/001. Certified Kubernetes Security Specialist (CKS) Introduction.en.srt 4.1 KB
- Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/002. 5.1 CIS Benchmarks for Kubernetes.en.srt 3.6 KB
- Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/003. 9.2 Download the Latest Kubernetes Release.en.srt 3.5 KB
- Summary/001. Certified Kubernetes Security Specialist (CKS) Summary.en.srt 2.5 KB
- Module 1 Preparing for the CKS Exam/001. Module Introduction.en.srt 2.0 KB
- Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/001. Learning objectives.en.srt 2.0 KB
- Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/001. Learning objectives.en.srt 1.8 KB
- Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/001. Learning objectives.en.srt 1.4 KB
- Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.en.srt 1.4 KB
- Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/001. Learning objectives.en.srt 1.4 KB
- Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/001. Learning objectives.en.srt 1.3 KB
- Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/001. Learning objectives.en.srt 1.3 KB
- Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.en.srt 1.2 KB
- Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/001. Learning objectives.en.srt 1.2 KB
- Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/001. Learning objectives.en.srt 1.2 KB
- Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.en.srt 1.2 KB
- Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/001. Learning objectives.en.srt 1.1 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.en.srt 1.1 KB
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.en.srt 1.1 KB
- Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/001. Learning objectives.en.srt 1.1 KB
- Module 8 Exam Practice Scenarios/001. Module Introduction.en.srt 1.0 KB
- Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/001. Learning objectives.en.srt 1.0 KB
- Module 5 Minimize Microservice Vulnerabilities/001. Module Introduction.en.srt 1.0 KB
- Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/001. Learning objectives.en.srt 1.0 KB
- Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/001. Learning objectives.en.srt 967 bytes
- Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/001. Learning objectives.en.srt 965 bytes
- Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.en.srt 965 bytes
- Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.en.srt 963 bytes
- Module 6 Software Supply Chain Security/001. Module Introduction.en.srt 953 bytes
- Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/001. Learning objectives.en.srt 950 bytes
- Module 4 System Hardening/Lesson 16 Kernel Hardening/001. Learning objectives.en.srt 948 bytes
- Module 4 System Hardening/001. Module Introduction.en.srt 934 bytes
- Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/001. Learning objectives.en.srt 843 bytes
- Module 2 Kubernetes Cluster Setup/001. Module Introduction.en.srt 825 bytes
- Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/001. Learning objectives.en.srt 823 bytes
- Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/001. Learning objectives.en.srt 816 bytes
- Module 3 Cluster Hardening/001. Module Introduction.en.srt 802 bytes
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.en.srt 770 bytes
- Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/001. Learning objectives.en.srt 720 bytes
- Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.en.srt 699 bytes
- Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/001. Learning objectives.en.srt 688 bytes
- Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/001. Learning objectives.en.srt 634 bytes
- Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/001. Learning objectives.en.srt 625 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.