Table of contents
Introduction
35m 46s
Lock icon
Course Introduction | 3m 4s
Lock icon
About the Exam | 8m 15s
Lock icon
CKS Exam Updates 1.24 | 2m 57s
Lock icon
Building a Kubernetes Cluster | 15m 32s
Lock icon
Kubernetes Security Overview | 5m 58s
Cluster Setup
3h 27m 9s
Lock icon
Cluster Setup Intro | 1m 38s
Lock icon
Restricting Default Access with NetworkPolicies | 10m 52s
Lock icon
Allowing Limited Access with NetworkPolicies | 11m 25s
Lock icon
Locking Down Inter-Pod Communication with NetworkPoliciesLock Down Inter-Pod Communication with NetworkPolicies | 30m
Lock icon
Running a CIS Benchmark with kube-bench | 8m 21s
Lock icon
Fixing Security Issues Detected by a CIS Benchmark | 9m 30s
Lock icon
Strengthening Cluster Security with a CIS Kubernetes BenchmarkStrengthen Cluster Security with a CIS Kubernetes Benchmark | 30m
Lock icon
Implementing TLS with Ingress | 10m 17s
Lock icon
Adding TLS to a Kubernetes Service with IngressAdd TLS to a Kubernetes Service with Ingress | 30m
Lock icon
Securing Node Endpoints | 5m 5s
Lock icon
Securing GUI Elements | 2m 43s
Lock icon
Verifying Kubernetes Platform Binaries | 7m 46s
Lock icon
Verify Kubernetes BinariesVerify Kubernetes Binaries | 30m
Lock icon
Cluster Setup Review | 4m 32s
Lock icon
QUIZ: Cluster SetupQUIZ: Cluster Setup | 15m
Cluster Hardening
1h 13m 54s
Lock icon
Cluster Hardening Intro | 56s
Lock icon
Exploring Service Accounts | 5m 5s
Lock icon
Restricting Service Account Permissions | 12m 29s
Lock icon
Limiting Service Account Permissions in KubernetesLimit Service Account Permissions in Kubernetes | 30m
Lock icon
Restricting Access to the Kubernetes API | 3m 40s
Lock icon
Keeping k8s Updated | 4m 32s
Lock icon
Cluster Hardening Review | 2m 12s
Lock icon
QUIZ: Cluster HardeningQUIZ: Cluster Hardening | 15m
System Hardening
1h 21m 40s
Lock icon
System Hardening Intro | 56s
Lock icon
Understanding Host OS Security Concerns | 8m 58s
Lock icon
Minimizing IAM Roles | 4m 56s
Lock icon
Exploring Network-Level Security | 3m 31s
Lock icon
Exploring AppArmor | 4m 32s
Lock icon
Using AppArmor in k8s Containers | 10m 49s
Lock icon
Protecting a Kubernetes Cluster with AppArmorProtect a Kubernetes Cluster with AppArmor | 30m
Lock icon
System Hardening Review | 2m 58s
Lock icon
QUIZ: System HardeningQUIZ: System Hardening | 15m
Minimizing Microservice Vulnerabilities
2h 40m 33s
Lock icon
Minimizing Microservice Vulnerabilities Intro | 1m 29s
Lock icon
Managing Container Access with Security Contexts | 5m 52s
Lock icon
Governing Pod Configurations with Pod Security Policies | 7m 59s
Lock icon
Using Pod Security Policies | 14m 59s
Lock icon
Using OPA Gatekeeper | 11m 44s
Lock icon
Managing Kubernetes Secrets | 11m 14s
Lock icon
Encrypting Sensitive Config Data with Kubernetes SecretsManage Sensitive Config Data with Kubernetes Secrets | 30m
Lock icon
Understanding Container Runtime Sandboxes | 5m 23s
Lock icon
Creating a Container Runtime Sandbox | 9m 59s
Lock icon
Moving Kubernetes Pods to a Secured Runtime SandboxMove Kubernetes Pods to a Secured Runtime Sandbox | 30m
Lock icon
Understanding Pod-to-Pod mTLS | 3m 50s
Lock icon
Signing Certificates | 8m 8s
Lock icon
Minimizing Microservice Vulnerabilities Review | 4m 56s
Lock icon
QUIZ: Minimizing Microservice VulnerabilitiesQUIZ: Minimizing Microservice Vulnerabilities | 15m
Supply Chain Security
3h 24m 25s
Lock icon
Supply Chain Security Intro | 1m 26s
Lock icon
Minimizing Base Image Attack Surface | 4m 24s
Lock icon
Whitelisting Allowed Image Registries | 7m 28s
Lock icon
Validating Signed Images | 4m 47s
Lock icon
Analyzing a Dockerfile | 7m 46s
Lock icon
Analyzing a Dockerfile for Security Best PracticesAnalyzing a Dockerfile for Security Best Practices | 30m
Lock icon
Analyzing Resource YAML Files | 4m 2s
Lock icon
Analyzing Kubernetes YAML Files for Security Best PracticesAnalyzing Kubernetes YAML Files for Security Best Practices | 30m
Lock icon
Scanning Images for Known Vulnerabilities | 8m 7s
Lock icon
Scanning Images for Vulnerabilities with TrivyScanning Images for Vulnerabilities with Trivy | 30m
Lock icon
Scanning Images with an Admission Controller | 4m 30s
Lock icon
Setting up an Image Scanner | 8m 4s
Lock icon
Configuring the ImagePolicyWebhook Admission Controller | 13m 24s
Lock icon
Automate Kubernetes Image Vulnerability ScanningAutomate Kubernetes Image Vulnerability Scanning | 30m
Lock icon
Supply Chain Security Review | 5m 27s
Lock icon
QUIZ: Supply Chain SecurityQUIZ: Supply Chain Security | 15m
Monitoring, Logging, and Runtime Security
2h 30m 31s
Lock icon
Monitoring, Logging, and Runtime Security Intro | 1m 1s
Lock icon
Understanding Behavioral Analytics | 5m 4s
Lock icon
Analyzing Container Behavior with Falco | 11m 13s
Lock icon
Threat Detection in Kubernetes with FalcoThreat Detection in Kubernetes with Falco | 30m
Lock icon
Ensuring Containers are Immutable | 9m 56s
Lock icon
Check Kubernetes Pods for Container ImmutabilityCheck Kubernetes Pods for Container Immutability | 30m
Lock icon
Understanding Audit Logs | 4m 40s
Lock icon
Setting up Audit Logging | 9m 48s
Lock icon
Configure Audit Logging in KubernetesConfigure Audit Logging in Kubernetes | 30m
Lock icon
Monitoring, Logging, and Runtime Security Review | 3m 49s
Lock icon
QUIZ: Monitoring, Logging, and Runtime SecurityQUIZ: Monitoring, Logging, and Runtime Security | 15m
Practice Exam
6h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 1Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 1 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 2Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 2 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 3Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 3 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 4Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 4 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 5Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 5 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 6Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 6 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 7Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 7 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 8Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 8 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 9Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 9 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 10Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 10 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 11Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 11 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 12Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 12 | 30m
Conclusion
2m 23s
Lock icon
Course Summary | 1m 28s
Lock icon
Conclusion and What’s Next | 55s
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon