Table of contents
Introduction
35m 41s
Lock icon
Course Introduction | 3m 3s
Lock icon
About the Exam | 8m 14s
Lock icon
CKS Exam Updates 1.24 | 2m 56s
Lock icon
Building a Kubernetes Cluster | 15m 31s
Lock icon
Kubernetes Security Overview | 5m 57s
Cluster Setup
3h 11m 59s
Lock icon
Cluster Setup Intro | 1m 37s
Lock icon
Restricting Default Access with NetworkPolicies | 10m 51s
Lock icon
Allowing Limited Access with NetworkPolicies | 11m 24s
Lock icon
Lock Down Inter-Pod Communication with NetworkPolicies | 30m
Lock icon
Running a CIS Benchmark with kube-bench | 8m 20s
Lock icon
Fixing Security Issues Detected by a CIS Benchmark | 9m 29s
Lock icon
Strengthen Cluster Security with a CIS Kubernetes Benchmark | 30m
Lock icon
Implementing TLS with Ingress | 10m 16s
Lock icon
Add TLS to a Kubernetes Service with Ingress | 30m
Lock icon
Securing Node Endpoints | 5m 4s
Lock icon
Securing GUI Elements | 2m 42s
Lock icon
Verifying Kubernetes Platform Binaries | 7m 45s
Lock icon
Verify Kubernetes Binaries | 30m
Lock icon
Cluster Setup Review | 4m 31s
Lock icon
QUIZ: Cluster Setup
Cluster Hardening
58m 48s
Lock icon
Cluster Hardening Intro | 55s
Lock icon
Exploring Service Accounts | 5m 4s
Lock icon
Restricting Service Account Permissions | 12m 28s
Lock icon
Limit Service Account Permissions in Kubernetes | 30m
Lock icon
Restricting Access to the Kubernetes API | 3m 39s
Lock icon
Keeping k8s Updated | 4m 31s
Lock icon
Cluster Hardening Review | 2m 11s
Lock icon
QUIZ: Cluster Hardening
System Hardening
1h 6m 33s
Lock icon
System Hardening Intro | 55s
Lock icon
Understanding Host OS Security Concerns | 8m 57s
Lock icon
Minimizing IAM Roles | 4m 55s
Lock icon
Exploring Network-Level Security | 3m 30s
Lock icon
Exploring AppArmor | 4m 31s
Lock icon
Using AppArmor in k8s Containers | 10m 48s
Lock icon
Protect a Kubernetes Cluster with AppArmor | 30m
Lock icon
System Hardening Review | 2m 57s
Lock icon
QUIZ: System Hardening
Minimizing Microservice Vulnerabilities
2h 25m 22s
Lock icon
Minimizing Microservice Vulnerabilities Intro | 1m 28s
Lock icon
Managing Container Access with Security Contexts | 5m 51s
Lock icon
Governing Pod Configurations with Pod Security Policies | 7m 58s
Lock icon
Using Pod Security Policies | 14m 58s
Lock icon
Using OPA Gatekeeper | 11m 43s
Lock icon
Managing Kubernetes Secrets | 11m 13s
Lock icon
Manage Sensitive Config Data with Kubernetes Secrets | 30m
Lock icon
Understanding Container Runtime Sandboxes | 5m 22s
Lock icon
Creating a Container Runtime Sandbox | 9m 58s
Lock icon
Move Kubernetes Pods to a Secured Runtime Sandbox | 30m
Lock icon
Understanding Pod-to-Pod mTLS | 3m 49s
Lock icon
Signing Certificates | 8m 7s
Lock icon
Minimizing Microservice Vulnerabilities Review | 4m 55s
Lock icon
QUIZ: Minimizing Microservice Vulnerabilities
Supply Chain Security
3h 9m 14s
Lock icon
Supply Chain Security Intro | 1m 25s
Lock icon
Minimizing Base Image Attack Surface | 4m 23s
Lock icon
Whitelisting Allowed Image Registries | 7m 27s
Lock icon
Validating Signed Images | 4m 46s
Lock icon
Analyzing a Dockerfile | 7m 45s
Lock icon
Analyzing a Dockerfile for Security Best Practices | 30m
Lock icon
Analyzing Resource YAML Files | 4m 1s
Lock icon
Analyzing Kubernetes YAML Files for Security Best Practices | 30m
Lock icon
Scanning Images for Known Vulnerabilities | 8m 6s
Lock icon
Scanning Images for Vulnerabilities with Trivy | 30m
Lock icon
Scanning Images with an Admission Controller | 4m 29s
Lock icon
Setting up an Image Scanner | 8m 3s
Lock icon
Configuring the ImagePolicyWebhook Admission Controller | 13m 23s
Lock icon
Automate Kubernetes Image Vulnerability Scanning | 30m
Lock icon
Supply Chain Security Review | 5m 26s
Lock icon
QUIZ: Supply Chain Security
Monitoring, Logging, and Runtime Security
2h 15m 24s
Lock icon
Monitoring, Logging, and Runtime Security Intro | 1m
Lock icon
Understanding Behavioral Analytics | 5m 3s
Lock icon
Analyzing Container Behavior with Falco | 11m 12s
Lock icon
Threat Detection in Kubernetes with Falco | 30m
Lock icon
Ensuring Containers are Immutable | 9m 55s
Lock icon
Check Kubernetes Pods for Container Immutability | 30m
Lock icon
Understanding Audit Logs | 4m 39s
Lock icon
Setting up Audit Logging | 9m 47s
Lock icon
Configure Audit Logging in Kubernetes | 30m
Lock icon
Monitoring, Logging, and Runtime Security Review | 3m 48s
Lock icon
QUIZ: Monitoring, Logging, and Runtime Security
Practice Exam
6h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 1 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 2 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 3 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 4 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 5 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 6 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 7 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 8 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 9 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 10 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 11 | 30m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 12 | 30m
Conclusion
2m 21s
Lock icon
Course Summary | 1m 27s
Lock icon
Conclusion and What’s Next | 54s
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon