Magnetic link has been copied to the cutting board

Name Acloudguru - Certified Kubernetes Security Specialist (CKS)

File Type video

Size 2.29GB

UpdateDate 2024-6-17

hash *****F0FBCADD6EE1690DAB58F7FD54E87A7268

Hot 19

Files 07 Monitoring Logging and Runtime Security/008 Setting up Audit Logging.mp4 | 117.13MB 01 Introduction/001 Study Guide PDF.pdf | 97.18MB 01 Introduction/002 About the Exam.mp4 | 39.96MB 01 Introduction/002 CKS Study Guide.pdf | 275.67KB 01 Introduction/003 CKS Exam Updates 1.20.mp4 | 13.93MB 01 Introduction/004 Building a Kubernetes Cluster.mp4 | 58.52MB 01 Introduction/004 Creating a cluster with kubeadm.txt | 95B 01 Introduction/004 Installing kubeadm.txt | 88B 01 Introduction/004 Lesson Reference.pdf | 93.10KB 01 Introduction/005 Kubernetes Security Overview.mp4 | 34.45MB 02 Cluster Setup/001 Cluster Setup Intro.mp4 | 7.73MB 02 Cluster Setup/002 Lesson Reference.pdf | 92.43KB 02 Cluster Setup/002 Network Policies.txt | 75B 02 Cluster Setup/002 Restricting Default Access with NetworkPolicies.mp4 | 45.81MB 02 Cluster Setup/003 Allowing Limited Access with NetworkPolicies.mp4 | 51.62MB 02 Cluster Setup/003 Lesson Reference.pdf | 76.17KB 02 Cluster Setup/003 Network Policies.txt | 75B 02 Cluster Setup/005 CIS Kubernetes Benchmark.txt | 50B 02 Cluster Setup/005 kube-bench.txt | 44B 02 Cluster Setup/005 Lesson Reference.pdf | 72.13KB 02 Cluster Setup/005 Running a CIS Benchmark with kube-bench.mp4 | 79.25MB 02 Cluster Setup/006 CIS Kubernetes Benchmark.txt | 50B 02 Cluster Setup/006 Fixing Security Issues Detected by a CIS Benchmark.mp4 | 77.46MB 02 Cluster Setup/006 kube-bench.txt | 44B 02 Cluster Setup/006 Lesson Reference.pdf | 90.03KB 02 Cluster Setup/008 Implementing TLS with Ingress.mp4 | 64.61MB 02 Cluster Setup/008 Ingress - TLS.txt | 70B 02 Cluster Setup/008 Lesson Reference.pdf | 83.99KB 02 Cluster Setup/010 kubeadm - Required Ports.txt | 109B 02 Cluster Setup/010 Securing Node Endpoints.mp4 | 22.77MB 02 Cluster Setup/011 Securing GUI Elements.mp4 | 13.42MB 02 Cluster Setup/011 Web UI (Dashboard).txt | 79B 02 Cluster Setup/012 Install kubectl binary with curl on Linux.txt | 105B 02 Cluster Setup/012 Lesson Reference.pdf | 68.36KB 02 Cluster Setup/012 Verifying Kubernetes Platform Binaries.mp4 | 35.02MB 02 Cluster Setup/014 Cluster Setup Review.mp4 | 22.39MB 03 Cluster Hardening/001 Cluster Hardening Intro.mp4 | 4.43MB 03 Cluster Hardening/002 Configure Service Accounts for Pods.txt | 85B 03 Cluster Hardening/002 Exploring Service Accounts.mp4 | 25.69MB 03 Cluster Hardening/002 Managing Service Accounts.txt | 81B 03 Cluster Hardening/002 Using RBAC Authorization.txt | 63B 03 Cluster Hardening/003 Configure Service Accounts for Pods.txt | 85B 03 Cluster Hardening/003 deployment-viewer-pod Manifest.txt | 108B 03 Cluster Hardening/003 Lesson Reference.pdf | 90.80KB 03 Cluster Hardening/003 Managing Service Accounts.txt | 81B 03 Cluster Hardening/003 pod-viewer-pod Manifest.txt | 101B 03 Cluster Hardening/003 Restricting Service Account Permissions.mp4 | 62.02MB 03 Cluster Hardening/003 Setup Manifest.txt | 92B 03 Cluster Hardening/003 Using RBAC Authorization.txt | 63B 03 Cluster Hardening/005 Controlling Access to the Kubernetes API.txt | 66B 03 Cluster Hardening/005 Restricting Access to the Kubernetes API.mp4 | 20.24MB 03 Cluster Hardening/006 Keeping k8s Updated.mp4 | 22.01MB 03 Cluster Hardening/006 Kubernetes version and version skew support policy.txt | 63B 03 Cluster Hardening/007 Cluster Hardening Review.mp4 | 11.99MB 04 System Hardening/001 System Hardening Intro.mp4 | 4.71MB 04 System Hardening/002 Kubernetes API Reference - PodSpec.txt | 86B 04 System Hardening/002 Kubernetes API Reference - SecurityContext.txt | 94B 04 System Hardening/002 Security Context.txt | 76B 04 System Hardening/002 Understanding Host OS Security Concerns.mp4 | 44.70MB 04 System Hardening/003 AWs Docs - Security Best Practices in IAM.txt | 92B 04 System Hardening/003 IAM Roles for Amazon EC2.html | 91.01KB 04 System Hardening/003 Minimizing IAM Roles.mp4 | 22.71MB 04 System Hardening/004 Cluster Networking.txt | 72B 04 System Hardening/004 Exploring Network-Level Security.mp4 | 20.91MB 04 System Hardening/005 AppArmor Documentation.txt | 60B 04 System Hardening/005 Exploring AppArmor.mp4 | 24.05MB 04 System Hardening/006 AppArmor Documentation.txt | 60B 04 System Hardening/006 AppArmor in k8s.pdf | 107.08KB 04 System Hardening/006 Lesson Reference.pdf | 107.52KB 04 System Hardening/006 Using AppArmor in k8s Containers.mp4 | 41.79MB 04 System Hardening/008 System Hardening Review.mp4 | 17.73MB 05 Minimizing Microservice Vulnerabilities/001 Minimizing Microservice Vulnerabilities Intro.mp4 | 8.60MB 05 Minimizing Microservice Vulnerabilities/002 API Reference - Container Security Context.txt | 99B 05 Minimizing Microservice Vulnerabilities/002 API Reference - Pod Security Context.txt | 97B 05 Minimizing Microservice Vulnerabilities/002 Configure a Security Context for a Pod or Container.txt | 76B 05 Minimizing Microservice Vulnerabilities/002 Lesson Reference.pdf | 71.35KB 05 Minimizing Microservice Vulnerabilities/002 Managing Container Access with Security Contexts.mp4 | 26.44MB 05 Minimizing Microservice Vulnerabilities/003 Governing Pod Configurations with Pod Security Policies.mp4 | 50.40MB 05 Minimizing Microservice Vulnerabilities/003 Pod Security Policies.txt | 65B 05 Minimizing Microservice Vulnerabilities/003 PodSecurityPolicy Admission Controller.txt | 98B 05 Minimizing Microservice Vulnerabilities/003 PodSecurityPolicy Deprecation Past Present and Future.txt | 94B 05 Minimizing Microservice Vulnerabilities/004 Lesson Reference.pdf | 103.97KB 05 Minimizing Microservice Vulnerabilities/004 Pod Security Policies.txt | 65B 05 Minimizing Microservice Vulnerabilities/004 PodSecurityPolicy Admission Controller.txt | 98B 05 Minimizing Microservice Vulnerabilities/004 Using Pod Security Policies.mp4 | 68.32MB 05 Minimizing Microservice Vulnerabilities/006 Lesson Reference.pdf | 107.65KB 05 Minimizing Microservice Vulnerabilities/006 OPA Gatekeeper Docs.txt | 49B 05 Minimizing Microservice Vulnerabilities/006 Using OPA Gatekeeper.mp4 | 64.02MB 05 Minimizing Microservice Vulnerabilities/007 Lesson Reference.pdf | 96.34KB 05 Minimizing Microservice Vulnerabilities/007 Managing Kubernetes Secrets.mp4 | 45.05MB 05 Minimizing Microservice Vulnerabilities/007 Secrets.txt | 59B 05 Minimizing Microservice Vulnerabilities/009 gVisor Docs.txt | 26B 05 Minimizing Microservice Vulnerabilities/009 Kata Containers Docs.txt | 33B 05 Minimizing Microservice Vulnerabilities/009 Runtime Class.txt | 63B 05 Minimizing Microservice Vulnerabilities/009 Understanding Container Runtime Sandboxes.mp4 | 29.10MB 05 Minimizing Microservice Vulnerabilities/010 Creating a Container Runtime Sandbox.mp4 | 114.00MB 05 Minimizing Microservice Vulnerabilities/010 gVisor Docs.txt | 26B 05 Minimizing Microservice Vulnerabilities/010 Lesson Reference.pdf | 120.20KB 05 Minimizing Microservice Vulnerabilities/010 Runtime Class.txt | 63B 05 Minimizing Microservice Vulnerabilities/012 Manage TLS Certificates in a Cluster.txt | 65B 05 Minimizing Microservice Vulnerabilities/012 Mutual Authentication (Wikipedia).txt | 53B 05 Minimizing Microservice Vulnerabilities/012 Understanding Pod-to-Pod mTLS.mp4 | 29.48MB 05 Minimizing Microservice Vulnerabilities/013 Lesson Reference.pdf | 88.71KB 05 Minimizing Microservice Vulnerabilities/013 Manage TLS Certificates in a Cluster.txt | 65B 05 Minimizing Microservice Vulnerabilities/013 Signing Certificates.mp4 | 53.84MB 05 Minimizing Microservice Vulnerabilities/014 Minimizing Microservice Vulnerabilities Review.mp4 | 32.78MB 06 Supply Chain Security/001 Supply Chain Security Intro.mp4 | 7.94MB 06 Supply Chain Security/002 Images.txt | 56B 06 Supply Chain Security/002 Minimizing Base Image Attack Surface.mp4 | 29.63MB 06 Supply Chain Security/002 Overview of Cloud Native Security.txt | 56B 06 Supply Chain Security/003 Blog OPA Gatekeeper.txt | 92B 06 Supply Chain Security/003 Lesson Reference.pdf | 105.00KB 06 Supply Chain Security/003 OPA Gatekeeper - GitHub.txt | 49B 06 Supply Chain Security/003 Whitelisting Allowed Image Registries.mp4 | 41.54MB 06 Supply Chain Security/004 Busybox 1.33.txt | 163B 06 Supply Chain Security/004 Lesson Reference.pdf | 72.43KB 06 Supply Chain Security/004 Validating Signed Images.mp4 | 24.94MB 06 Supply Chain Security/005 Analyzing a Dockerfile.mp4 | 36.45MB 06 Supply Chain Security/005 Dockerfile Reference.txt | 51B 06 Supply Chain Security/005 Lesson Reference.pdf | 74.53KB 06 Supply Chain Security/005 Sample Dockerfile.txt | 115B 06 Supply Chain Security/007 Analyzing Resource YAML Files.mp4 | 23.24MB 06 Supply Chain Security/007 Lesson Reference.pdf | 73.94KB 06 Supply Chain Security/007 Overview of Cloud Native Security.txt | 56B 06 Supply Chain Security/007 Sample YAML File.txt | 135B 06 Supply Chain Security/009 Cloud Native Security - Container.txt | 66B 06 Supply Chain Security/009 Lesson Reference.pdf | 81.51KB 06 Supply Chain Security/009 Scanning Images for Known Vulnerabilities.mp4 | 62.90MB 06 Supply Chain Security/009 Trivy Documentation.txt | 39B 06 Supply Chain Security/011 Cloud Native Security - Container.txt | 66B 06 Supply Chain Security/011 ImagePolicyWebhook Admission Controller.txt | 99B 06 Supply Chain Security/011 Scanning Images with an Admission Controller.mp4 | 30.74MB 06 Supply Chain Security/012 ImagePolicyWebhook Admission Controller.txt | 99B 06 Supply Chain Security/012 Lesson Reference.pdf | 94.33KB 06 Supply Chain Security/012 Sample Webhook App Source Code.txt | 63B 06 Supply Chain Security/012 Setting up an Image Scanner.mp4 | 41.39MB 06 Supply Chain Security/013 api-server-client.txt | 222B 06 Supply Chain Security/013 Configuring the ImagePolicyWebhook Admission Controller.mp4 | 76.97MB 06 Supply Chain Security/013 ImagePolicyWebhook Admission Controller.txt | 99B 06 Supply Chain Security/013 imagepolicywebhook-ca.txt | 96B 06 Supply Chain Security/013 Lesson Reference.pdf | 103.03KB 06 Supply Chain Security/015 Supply Chain Security Review.mp4 | 36.98MB 07 Monitoring Logging and Runtime Security/001 Monitoring Logging and Runtime Security Intro.mp4 | 4.75MB 07 Monitoring Logging and Runtime Security/002 Falco.txt | 25B 07 Monitoring Logging and Runtime Security/002 Understanding Behavioral Analytics.mp4 | 26.74MB 07 Monitoring Logging and Runtime Security/003 Analyzing Container Behavior with Falco.mp4 | 78.67MB 07 Monitoring Logging and Runtime Security/003 Falco - formatting.txt | 43B 07 Monitoring Logging and Runtime Security/003 Falco.txt | 25B 07 Monitoring Logging and Runtime Security/003 Lesson Reference.pdf | 100.19KB 07 Monitoring Logging and Runtime Security/003 Sysdig.txt | 26B 07 Monitoring Logging and Runtime Security/005 Container Security Context.txt | 99B 07 Monitoring Logging and Runtime Security/005 Ensuring Containers are Immutable.mp4 | 60.38MB 07 Monitoring Logging and Runtime Security/005 Lesson Reference.pdf | 87.15KB 07 Monitoring Logging and Runtime Security/007 Auditing.txt | 67B 07 Monitoring Logging and Runtime Security/007 Understanding Audit Logs.mp4 | 27.05MB 07 Monitoring Logging and Runtime Security/008 Auditing.txt | 67B 07 Monitoring Logging and Runtime Security/008 Lesson Reference.pdf | 75.58KB 07 Monitoring Logging and Runtime Security/008 Policy Configuration Reference.txt | 92B 01 Introduction/001 Course Introduction.mp4 | 56.59MB 07 Monitoring Logging and Runtime Security/010 Monitoring Logging and Runtime Security Review.mp4 | 24.25MB 09 Conclusion/001 Course Summary.mp4 | 7.78MB 09 Conclusion/002 Conclusion and Whats Next.mp4 | 16.25MB

Recommend

Magnetic link has been copied to the cutting board