589689.xyz

Kubernetes CKS 2021 Complete Course + Simulator

  • 收录时间:2021-05-16 04:18:21
  • 文件大小:5GB
  • 下载次数:1
  • 最近下载:2021-05-16 04:18:21
  • 磁力链接:

文件列表

  1. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 Practice - Encrypt ETCD.mp4 223MB
  2. 26 Runtime Security - Auditing/146 Practice - Create advanced Audit Policy.mp4 163MB
  3. 26 Runtime Security - Auditing/147 Practice - Investigate API access history.mp4 156MB
  4. 11 Cluster Hardening - RBAC/051 Practice - CertificateSigningRequests.mp4 156MB
  5. 24 Runtime Security - Behavioral Analytics at host and container level/136 Practice - Change Falco Rule.mp4 142MB
  6. 07 Cluster Setup - Secure Ingress/033 Practice - Secure an Ingress.mp4 130MB
  7. 02 Create your course K8s cluster/008 Practice - Create Kubeadm Cluster in GCP.mp4 120MB
  8. 17 Microservice Vulnerabilities - OS Level Security Domains/095 Practice - Create and enable PodSecurityPolicy.mp4 115MB
  9. 23 Supply Chain Security - Secure Supply Chain/127 Practice - ImagePolicyWebhook.mp4 115MB
  10. 19 Open Policy Agent (OPA)/104 Practice - Enforce Namespace Labels.mp4 111MB
  11. 27 System Hardening - Kernel Hardening Tools/156 Practice - Seccomp for Kubernetes Nginx.mp4 103MB
  12. 13 Cluster Hardening - Restrict API Access/062 Practice - External Apiserver Access.mp4 101MB
  13. 19 Open Policy Agent (OPA)/103 Practice - Deny All Policy.mp4 101MB
  14. 24 Runtime Security - Behavioral Analytics at host and container level/131 Practice - Strace and _proc on ETCD.mp4 99MB
  15. 26 Runtime Security - Auditing/144 Practice - Enable Audit Logging in Apiserver.mp4 96MB
  16. 05 Cluster Setup - Network Policies/023 Practice - Backend to Database traffic.mp4 94MB
  17. 23 Supply Chain Security - Secure Supply Chain/125 Practice - Whitelist Registries with OPA.mp4 83MB
  18. 20 Supply Chain Security - Image Footprint/109 Practice - Reduce Image Footprint with Multi-Stage.mp4 79MB
  19. 13 Cluster Hardening - Restrict API Access/061 Practice - Manual API Request.mp4 78MB
  20. 07 Cluster Setup - Secure Ingress/032 Practice - Create an Ingress.mp4 76MB
  21. 28 System Hardening - Reduce Attack Surface/162 Practice - Investigate Linux Users.mp4 76MB
  22. 02 Create your course K8s cluster/007 Practice - Configure _gcloud_ command.mp4 75MB
  23. 24 Runtime Security - Behavioral Analytics at host and container level/134 Practice - Use Falco to find malicious processes.mp4 75MB
  24. 20 Supply Chain Security - Image Footprint/110 Practice - Secure and harden Images.mp4 67MB
  25. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 Practice - Pod uses custom ServiceAccount.mp4 67MB
  26. 27 System Hardening - Kernel Hardening Tools/152 Practice - AppArmor for Docker Nginx.mp4 62MB
  27. 18 Microservice Vulnerabilities - mTLS/098 Practice - Create sidecar proxy.mp4 62MB
  28. 14 Cluster Hardening - Upgrade Kubernetes/068 Practice - Upgrade master node.mp4 60MB
  29. 26 Runtime Security - Auditing/145 Practice - Create Secret and check Audit Logs.mp4 60MB
  30. 03 Foundation - Kubernetes Secure Architecture/013 Practice - Find various K8s certificates.mp4 59MB
  31. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 Practice - Install and use gVisor.mp4 57MB
  32. 10 Cluster Setup - Verify Platform Binaries/045 Practice - Verify apiserver binary running in our cluster.mp4 57MB
  33. 09 Cluster Setup - CIS Benchmarks/040 Practice - CIS in Action.mp4 56MB
  34. 22 Supply Chain Security - Image Vulnerability Scanning/121 Practice - Use Trivy to scan images.mp4 55MB
  35. 24 Runtime Security - Behavioral Analytics at host and container level/133 Practice - Falco and Installation.mp4 55MB
  36. 05 Cluster Setup - Network Policies/022 Practice - Frontend to Backend traffic.mp4 54MB
  37. 28 System Hardening - Reduce Attack Surface/160 Practice - Install and investigate Services.mp4 53MB
  38. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/072 Practice - Create Simple Secret Scenario.mp4 48MB
  39. 11 Cluster Hardening - RBAC/049 Practice - ClusterRole and ClusterRoleBinding.mp4 48MB
  40. 24 Runtime Security - Behavioral Analytics at host and container level/130 Practice - Strace.mp4 47MB
  41. 17 Microservice Vulnerabilities - OS Level Security Domains/087 Intro and Security Contexts.mp4 44MB
  42. 09 Cluster Setup - CIS Benchmarks/041 Practice - kube-bench.mp4 44MB
  43. 27 System Hardening - Kernel Hardening Tools/153 Practice - AppArmor for Kubernetes Nginx.mp4 44MB
  44. 08 Cluster Setup - Node Metadata Protection/037 Practice_ Protect Node Metadata via NetworkPolicy.mp4 44MB
  45. 19 Open Policy Agent (OPA)/105 Practice - Enforce Deployment replica count.mp4 42MB
  46. 06 Cluster Setup - GUI Elements/028 Practice - Outside Insecure Access.mp4 42MB
  47. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 Practice - Hack Secrets in ETCD.mp4 41MB
  48. 25 Runtime Security - Immutability of containers at runtime/141 Practice - SecurityContext renders container immutable.mp4 41MB
  49. 21 Supply Chain Security - Static Analysis/117 Practice - OPA Confest for Dockerfile.mp4 41MB
  50. 21 Supply Chain Security - Static Analysis/114 Practice - Kubesec.mp4 40MB
  51. 23 Supply Chain Security - Secure Supply Chain/124 Practice - Image Digest.mp4 39MB
  52. 04 Foundation - Containers under the hood/015 Intro.mp4 38MB
  53. 26 Runtime Security - Auditing/143 Introduction.mp4 37MB
  54. 10 Cluster Setup - Verify Platform Binaries/044 Practice - Download and verify K8s release.mp4 37MB
  55. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 Practice - Disable ServiceAccount mounting.mp4 34MB
  56. 19 Open Policy Agent (OPA)/102 Practice - Install OPA.mp4 33MB
  57. 05 Cluster Setup - Network Policies/021 Practice - Default Deny.mp4 33MB
  58. 03 Foundation - Kubernetes Secure Architecture/012 Intro.mp4 32MB
  59. 13 Cluster Hardening - Restrict API Access/060 Practice - Insecure Access.mp4 32MB
  60. 27 System Hardening - Kernel Hardening Tools/151 Practice - AppArmor for curl.mp4 32MB
  61. 17 Microservice Vulnerabilities - OS Level Security Domains/088 Practice - Set Container User and Group.mp4 31MB
  62. 11 Cluster Hardening - RBAC/048 Practice - Role and Rolebinding.mp4 30MB
  63. 25 Runtime Security - Immutability of containers at runtime/140 Practice - StartupProbe changes container.mp4 28MB
  64. 19 Open Policy Agent (OPA)/106 Practice - The Rego Playground and more examples.mp4 28MB
  65. 01 Introduction/004 K8s Security Best Practices.mp4 28MB
  66. 11 Cluster Hardening - RBAC/047 Intro.mp4 27MB
  67. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/073 Practice - Hack Secrets in Docker.mp4 27MB
  68. 14 Cluster Hardening - Upgrade Kubernetes/069 Practice - Upgrade worker node.mp4 27MB
  69. 28 System Hardening - Reduce Attack Surface/159 Practice - Systemctl and Services.mp4 26MB
  70. 24 Runtime Security - Behavioral Analytics at host and container level/132 Practice - _proc and env variables.mp4 26MB
  71. 24 Runtime Security - Behavioral Analytics at host and container level/135 Practice - Investigate Falco rules.mp4 26MB
  72. 20 Supply Chain Security - Image Footprint/111 Recap.mp4 25MB
  73. 21 Supply Chain Security - Static Analysis/116 Practice - OPA Confest for K8s YAML.mp4 25MB
  74. 05 Cluster Setup - Network Policies/020 Introduction 2.mp4 24MB
  75. 14 Cluster Hardening - Upgrade Kubernetes/066 Introduction.mp4 23MB
  76. 18 Microservice Vulnerabilities - mTLS/097 Intro.mp4 22MB
  77. 28 System Hardening - Reduce Attack Surface/161 Practice - Disable application listening on port.mp4 22MB
  78. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/079 Practice - Container calls Linux Kernel.mp4 21MB
  79. 13 Cluster Hardening - Restrict API Access/064 Practice - Verify NodeRestriction.mp4 21MB
  80. 06 Cluster Setup - GUI Elements/026 Introduction.mp4 21MB
  81. 21 Supply Chain Security - Static Analysis/112 Introduction.mp4 21MB
  82. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 Recap.mp4 20MB
  83. 22 Supply Chain Security - Image Vulnerability Scanning/119 Introduction.mp4 20MB
  84. 24 Runtime Security - Behavioral Analytics at host and container level/129 Introduction.mp4 19MB
  85. 06 Cluster Setup - GUI Elements/030 Recap.mp4 19MB
  86. 01 Introduction/001 Welcome.mp4 19MB
  87. 19 Open Policy Agent (OPA)/101 Introduction.mp4 19MB
  88. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/078 Introduction.mp4 19MB
  89. 13 Cluster Hardening - Restrict API Access/058 Introduction.mp4 18MB
  90. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/084 Practice - Create and use RuntimeClasses.mp4 18MB
  91. 06 Cluster Setup - GUI Elements/029 Practice - RBAC for the Dashboard.mp4 18MB
  92. 13 Cluster Hardening - Restrict API Access/059 Practice - Anonymous Access.mp4 18MB
  93. 14 Cluster Hardening - Upgrade Kubernetes/067 Practice - Create outdated cluster.mp4 18MB
  94. 28 System Hardening - Reduce Attack Surface/158 Introduction.mp4 18MB
  95. 23 Supply Chain Security - Secure Supply Chain/123 Introduction.mp4 17MB
  96. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/081 Practice - Crictl.mp4 17MB
  97. 05 Cluster Setup - Network Policies/019 Introduction 1.mp4 16MB
  98. 20 Supply Chain Security - Image Footprint/108 Introduction.mp4 16MB
  99. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/075 ETCD Encryption.mp4 16MB
  100. 05 Cluster Setup - Network Policies/024 Recap.mp4 14MB
  101. 17 Microservice Vulnerabilities - OS Level Security Domains/091 Practice - Create Privileged Containers.mp4 14MB
  102. 02 Create your course K8s cluster/006 Practice - Create GCP Account.mp4 14MB
  103. 27 System Hardening - Kernel Hardening Tools/155 Practice - Seccomp for Docker Nginx.mp4 13MB
  104. 09 Cluster Setup - CIS Benchmarks/042 Recap.mp4 13MB
  105. 04 Foundation - Containers under the hood/016 Practice - The PID Namespace.mp4 13MB
  106. 25 Runtime Security - Immutability of containers at runtime/139 Ways to enforce immutability.mp4 12MB
  107. 27 System Hardening - Kernel Hardening Tools/157 Recap.mp4 12MB
  108. 06 Cluster Setup - GUI Elements/027 Practice - Install Dashboard.mp4 12MB
  109. 07 Cluster Setup - Secure Ingress/031 Introduction.mp4 12MB
  110. 11 Cluster Hardening - RBAC/050 Accounts and Users.mp4 12MB
  111. 17 Microservice Vulnerabilities - OS Level Security Domains/096 Recap.mp4 11MB
  112. 08 Cluster Setup - Node Metadata Protection/036 Practice_ Access Node Metadata.mp4 11MB
  113. 24 Runtime Security - Behavioral Analytics at host and container level/137 Recap.mp4 11MB
  114. 27 System Hardening - Kernel Hardening Tools/154 Seccomp.mp4 10MB
  115. 25 Runtime Security - Immutability of containers at runtime/138 Introduction.mp4 10MB
  116. 02 Create your course K8s cluster/005 Cluster Specification.mp4 10MB
  117. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/071 Introduction.mp4 10MB
  118. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/080 Open Container Initiative OCI.mp4 10MB
  119. 08 Cluster Setup - Node Metadata Protection/035 Introduction.mp4 9MB
  120. 27 System Hardening - Kernel Hardening Tools/149 Introduction.mp4 9MB
  121. 31 Rating and feedback/167 Rating and feedback.mp4 9MB
  122. 21 Supply Chain Security - Static Analysis/113 Kubesec.mp4 9MB
  123. 17 Microservice Vulnerabilities - OS Level Security Domains/089 Practice - Force Container Non-Root.mp4 8MB
  124. 30 CKS Simulator/165 Introduction.mp4 8MB
  125. 02 Create your course K8s cluster/010 Notice_ Always stop your instances.mp4 8MB
  126. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/056 Practice - Limit ServiceAccounts using RBAC.mp4 8MB
  127. 09 Cluster Setup - CIS Benchmarks/039 Introduction.mp4 7MB
  128. 27 System Hardening - Kernel Hardening Tools/150 AppArmor.mp4 7MB
  129. 14 Cluster Hardening - Upgrade Kubernetes/070 Recap.mp4 7MB
  130. 22 Supply Chain Security - Image Vulnerability Scanning/122 Recap.mp4 6MB
  131. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/082 Sandbox Runtime Katacontainers.mp4 6MB
  132. 26 Runtime Security - Auditing/148 Recap.mp4 6MB
  133. 17 Microservice Vulnerabilities - OS Level Security Domains/094 PodSecurityPolicies.mp4 6MB
  134. 17 Microservice Vulnerabilities - OS Level Security Domains/093 Practice - Disable PriviledgeEscalation.mp4 6MB
  135. 13 Cluster Hardening - Restrict API Access/063 NodeRestriction AdmissionController.mp4 6MB
  136. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/083 Sandbox Runtime gVisor.mp4 5MB
  137. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/053 Intro.mp4 5MB
  138. 02 Create your course K8s cluster/011 Recap.mp4 5MB
  139. 13 Cluster Hardening - Restrict API Access/065 Recap.mp4 5MB
  140. 11 Cluster Hardening - RBAC/052 Recap.mp4 5MB
  141. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/057 Recap.mp4 5MB
  142. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 Recap.mp4 5MB
  143. 21 Supply Chain Security - Static Analysis/118 Recap.mp4 5MB
  144. 23 Supply Chain Security - Secure Supply Chain/126 ImagePolicyWebhook.mp4 4MB
  145. 19 Open Policy Agent (OPA)/107 Recap.mp4 4MB
  146. 03 Foundation - Kubernetes Secure Architecture/014 Recap.mp4 4MB
  147. 18 Microservice Vulnerabilities - mTLS/099 Recap.mp4 4MB
  148. 06 Cluster Setup - GUI Elements/025 Feedback.mp4 4MB
  149. 28 System Hardening - Reduce Attack Surface/163 Recap.mp4 4MB
  150. 17 Microservice Vulnerabilities - OS Level Security Domains/090 Privileged Containers.mp4 4MB
  151. 10 Cluster Setup - Verify Platform Binaries/043 Introduction.mp4 4MB
  152. 21 Supply Chain Security - Static Analysis/115 OPA Confest.mp4 4MB
  153. 23 Supply Chain Security - Secure Supply Chain/128 Recap.mp4 3MB
  154. 05 Cluster Setup - Network Policies/018 Cluster Reset.mp4 3MB
  155. 19 Open Policy Agent (OPA)/100 Cluster Reset.mp4 3MB
  156. 25 Runtime Security - Immutability of containers at runtime/142 Recap.mp4 3MB
  157. 04 Foundation - Containers under the hood/017 Recap.mp4 3MB
  158. 02 Create your course K8s cluster/009 Practice - Firewall rules for NodePorts.mp4 3MB
  159. 08 Cluster Setup - Node Metadata Protection/038 Recap.mp4 3MB
  160. 17 Microservice Vulnerabilities - OS Level Security Domains/092 PrivilegeEscalation.mp4 3MB
  161. 22 Supply Chain Security - Image Vulnerability Scanning/120 Clair and Trivy.mp4 3MB
  162. 07 Cluster Setup - Secure Ingress/034 Recap.mp4 2MB
  163. 01 Introduction/002 Best Video Quality.mp4 2MB
  164. 10 Cluster Setup - Verify Platform Binaries/046 Recap.mp4 2MB
  165. 09 Cluster Setup - CIS Benchmarks/040 CIS-Kubernetes-Benchmark-v1.6.0.pdf 1MB
  166. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 Practice - Encrypt ETCD.en.srt 22KB
  167. 26 Runtime Security - Auditing/143 Introduction.en.srt 15KB
  168. 03 Foundation - Kubernetes Secure Architecture/012 Intro.en.srt 15KB
  169. 01 Introduction/004 K8s Security Best Practices.en.srt 14KB
  170. 26 Runtime Security - Auditing/147 Practice - Investigate API access history.en.srt 14KB
  171. 19 Open Policy Agent (OPA)/103 Practice - Deny All Policy.en.srt 13KB
  172. 04 Foundation - Containers under the hood/015 Intro.en.srt 13KB
  173. 11 Cluster Hardening - RBAC/047 Intro.en.srt 12KB
  174. 23 Supply Chain Security - Secure Supply Chain/127 Practice - ImagePolicyWebhook.en.srt 12KB
  175. 19 Open Policy Agent (OPA)/104 Practice - Enforce Namespace Labels.en.srt 12KB
  176. 11 Cluster Hardening - RBAC/051 Practice - CertificateSigningRequests.en.srt 12KB
  177. 20 Supply Chain Security - Image Footprint/110 Practice - Secure and harden Images.en.srt 11KB
  178. 24 Runtime Security - Behavioral Analytics at host and container level/136 Practice - Change Falco Rule.en.srt 11KB
  179. 18 Microservice Vulnerabilities - mTLS/097 Intro.en.srt 11KB
  180. 17 Microservice Vulnerabilities - OS Level Security Domains/095 Practice - Create and enable PodSecurityPolicy.en.srt 11KB
  181. 02 Create your course K8s cluster/008 Practice - Create Kubeadm Cluster in GCP.en.srt 11KB
  182. 26 Runtime Security - Auditing/146 Practice - Create advanced Audit Policy.en.srt 11KB
  183. 21 Supply Chain Security - Static Analysis/112 Introduction.en.srt 10KB
  184. 22 Supply Chain Security - Image Vulnerability Scanning/119 Introduction.en.srt 10KB
  185. 24 Runtime Security - Behavioral Analytics at host and container level/131 Practice - Strace and _proc on ETCD.en.srt 10KB
  186. 07 Cluster Setup - Secure Ingress/033 Practice - Secure an Ingress.en.srt 10KB
  187. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/078 Introduction.en.srt 9KB
  188. 27 System Hardening - Kernel Hardening Tools/156 Practice - Seccomp for Kubernetes Nginx.en.srt 9KB
  189. 14 Cluster Hardening - Upgrade Kubernetes/066 Introduction.en.srt 9KB
  190. 07 Cluster Setup - Secure Ingress/032 Practice - Create an Ingress.en.srt 8KB
  191. 20 Supply Chain Security - Image Footprint/109 Practice - Reduce Image Footprint with Multi-Stage.en.srt 8KB
  192. 03 Foundation - Kubernetes Secure Architecture/013 Practice - Find various K8s certificates.en.srt 8KB
  193. 09 Cluster Setup - CIS Benchmarks/040 Practice - CIS in Action.en.srt 8KB
  194. 27 System Hardening - Kernel Hardening Tools/151 Practice - AppArmor for curl.en.srt 8KB
  195. 13 Cluster Hardening - Restrict API Access/062 Practice - External Apiserver Access.en.srt 8KB
  196. 05 Cluster Setup - Network Policies/023 Practice - Backend to Database traffic.en.srt 8KB
  197. 19 Open Policy Agent (OPA)/101 Introduction.en.srt 8KB
  198. 27 System Hardening - Kernel Hardening Tools/152 Practice - AppArmor for Docker Nginx.en.srt 7KB
  199. 05 Cluster Setup - Network Policies/022 Practice - Frontend to Backend traffic.en.srt 7KB
  200. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/075 ETCD Encryption.en.srt 7KB
  201. 25 Runtime Security - Immutability of containers at runtime/139 Ways to enforce immutability.en.srt 7KB
  202. 24 Runtime Security - Behavioral Analytics at host and container level/134 Practice - Use Falco to find malicious processes.en.srt 7KB
  203. 28 System Hardening - Reduce Attack Surface/158 Introduction.en.srt 7KB
  204. 27 System Hardening - Kernel Hardening Tools/153 Practice - AppArmor for Kubernetes Nginx.en.srt 7KB
  205. 26 Runtime Security - Auditing/144 Practice - Enable Audit Logging in Apiserver.en.srt 7KB
  206. 18 Microservice Vulnerabilities - mTLS/098 Practice - Create sidecar proxy.en.srt 7KB
  207. 23 Supply Chain Security - Secure Supply Chain/125 Practice - Whitelist Registries with OPA.en.srt 7KB
  208. 20 Supply Chain Security - Image Footprint/108 Introduction.en.srt 6KB
  209. 05 Cluster Setup - Network Policies/020 Introduction 2.en.srt 6KB
  210. 24 Runtime Security - Behavioral Analytics at host and container level/135 Practice - Investigate Falco rules.en.srt 6KB
  211. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/072 Practice - Create Simple Secret Scenario.en.srt 6KB
  212. 28 System Hardening - Reduce Attack Surface/162 Practice - Investigate Linux Users.en.srt 6KB
  213. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 Recap.en.srt 6KB
  214. 13 Cluster Hardening - Restrict API Access/058 Introduction.en.srt 6KB
  215. 24 Runtime Security - Behavioral Analytics at host and container level/132 Practice - _proc and env variables.en.srt 6KB
  216. 28 System Hardening - Reduce Attack Surface/160 Practice - Install and investigate Services.en.srt 6KB
  217. 24 Runtime Security - Behavioral Analytics at host and container level/130 Practice - Strace.en.srt 6KB
  218. 19 Open Policy Agent (OPA)/106 Practice - The Rego Playground and more examples.en.srt 6KB
  219. 11 Cluster Hardening - RBAC/050 Accounts and Users.en.srt 6KB
  220. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 Practice - Pod uses custom ServiceAccount.en.srt 6KB
  221. 06 Cluster Setup - GUI Elements/026 Introduction.en.srt 6KB
  222. 10 Cluster Setup - Verify Platform Binaries/045 Practice - Verify apiserver binary running in our cluster.en.srt 6KB
  223. 25 Runtime Security - Immutability of containers at runtime/141 Practice - SecurityContext renders container immutable.en.srt 5KB
  224. 05 Cluster Setup - Network Policies/019 Introduction 1.en.srt 5KB
  225. 11 Cluster Hardening - RBAC/048 Practice - Role and Rolebinding.en.srt 5KB
  226. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/071 Introduction.en.srt 5KB
  227. 02 Create your course K8s cluster/007 Practice - Configure _gcloud_ command.en.srt 5KB
  228. 24 Runtime Security - Behavioral Analytics at host and container level/133 Practice - Falco and Installation.en.srt 5KB
  229. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 Practice - Install and use gVisor.en.srt 5KB
  230. 02 Create your course K8s cluster/006 Practice - Create GCP Account.en.srt 5KB
  231. 21 Supply Chain Security - Static Analysis/116 Practice - OPA Confest for K8s YAML.en.srt 5KB
  232. 21 Supply Chain Security - Static Analysis/114 Practice - Kubesec.en.srt 5KB
  233. 07 Cluster Setup - Secure Ingress/031 Introduction.en.srt 5KB
  234. 09 Cluster Setup - CIS Benchmarks/041 Practice - kube-bench.en.srt 5KB
  235. 19 Open Policy Agent (OPA)/105 Practice - Enforce Deployment replica count.en.srt 5KB
  236. 08 Cluster Setup - Node Metadata Protection/037 Practice_ Protect Node Metadata via NetworkPolicy.en.srt 5KB
  237. 11 Cluster Hardening - RBAC/049 Practice - ClusterRole and ClusterRoleBinding.en.srt 5KB
  238. 05 Cluster Setup - Network Policies/021 Practice - Default Deny.en.srt 5KB
  239. 23 Supply Chain Security - Secure Supply Chain/123 Introduction.en.srt 5KB
  240. 22 Supply Chain Security - Image Vulnerability Scanning/121 Practice - Use Trivy to scan images.en.srt 5KB
  241. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 Practice - Hack Secrets in ETCD.en.srt 5KB
  242. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/084 Practice - Create and use RuntimeClasses.en.srt 5KB
  243. 21 Supply Chain Security - Static Analysis/117 Practice - OPA Confest for Dockerfile.en.srt 5KB
  244. 25 Runtime Security - Immutability of containers at runtime/138 Introduction.en.srt 5KB
  245. 23 Supply Chain Security - Secure Supply Chain/124 Practice - Image Digest.en.srt 5KB
  246. 13 Cluster Hardening - Restrict API Access/064 Practice - Verify NodeRestriction.en.srt 4KB
  247. 24 Runtime Security - Behavioral Analytics at host and container level/129 Introduction.en.srt 4KB
  248. 27 System Hardening - Kernel Hardening Tools/154 Seccomp.en.srt 4KB
  249. 04 Foundation - Containers under the hood/016 Practice - The PID Namespace.en.srt 4KB
  250. 06 Cluster Setup - GUI Elements/029 Practice - RBAC for the Dashboard.en.srt 4KB
  251. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/080 Open Container Initiative OCI.en.srt 4KB
  252. 13 Cluster Hardening - Restrict API Access/061 Practice - Manual API Request.en.srt 4KB
  253. 17 Microservice Vulnerabilities - OS Level Security Domains/088 Practice - Set Container User and Group.en.srt 4KB
  254. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/073 Practice - Hack Secrets in Docker.en.srt 4KB
  255. 17 Microservice Vulnerabilities - OS Level Security Domains/087 Intro and Security Contexts.en.srt 4KB
  256. 19 Open Policy Agent (OPA)/102 Practice - Install OPA.en.srt 4KB
  257. 10 Cluster Setup - Verify Platform Binaries/044 Practice - Download and verify K8s release.en.srt 4KB
  258. 26 Runtime Security - Auditing/145 Practice - Create Secret and check Audit Logs.en.srt 4KB
  259. 25 Runtime Security - Immutability of containers at runtime/140 Practice - StartupProbe changes container.en.srt 4KB
  260. 02 Create your course K8s cluster/005 Cluster Specification.en.srt 4KB
  261. 13 Cluster Hardening - Restrict API Access/060 Practice - Insecure Access.en.srt 4KB
  262. 08 Cluster Setup - Node Metadata Protection/035 Introduction.en.srt 4KB
  263. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 Practice - Disable ServiceAccount mounting.en.srt 4KB
  264. 01 Introduction/001 Welcome.en.srt 4KB
  265. 13 Cluster Hardening - Restrict API Access/059 Practice - Anonymous Access.en.srt 4KB
  266. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/079 Practice - Container calls Linux Kernel.en.srt 4KB
  267. 27 System Hardening - Kernel Hardening Tools/149 Introduction.en.srt 4KB
  268. 09 Cluster Setup - CIS Benchmarks/039 Introduction.en.srt 3KB
  269. 27 System Hardening - Kernel Hardening Tools/150 AppArmor.en.srt 3KB
  270. 17 Microservice Vulnerabilities - OS Level Security Domains/091 Practice - Create Privileged Containers.en.srt 3KB
  271. 14 Cluster Hardening - Upgrade Kubernetes/069 Practice - Upgrade worker node.en.srt 3KB
  272. 27 System Hardening - Kernel Hardening Tools/155 Practice - Seccomp for Docker Nginx.en.srt 3KB
  273. 21 Supply Chain Security - Static Analysis/113 Kubesec.en.srt 3KB
  274. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/056 Practice - Limit ServiceAccounts using RBAC.en.srt 3KB
  275. 14 Cluster Hardening - Upgrade Kubernetes/068 Practice - Upgrade master node.en.srt 3KB
  276. 17 Microservice Vulnerabilities - OS Level Security Domains/094 PodSecurityPolicies.en.srt 3KB
  277. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/082 Sandbox Runtime Katacontainers.en.srt 3KB
  278. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/081 Practice - Crictl.en.srt 3KB
  279. 13 Cluster Hardening - Restrict API Access/063 NodeRestriction AdmissionController.en.srt 3KB
  280. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/083 Sandbox Runtime gVisor.en.srt 3KB
  281. 28 System Hardening - Reduce Attack Surface/159 Practice - Systemctl and Services.en.srt 3KB
  282. 17 Microservice Vulnerabilities - OS Level Security Domains/089 Practice - Force Container Non-Root.en.srt 3KB
  283. 08 Cluster Setup - Node Metadata Protection/036 Practice_ Access Node Metadata.en.srt 3KB
  284. 09 Cluster Setup - CIS Benchmarks/042 Recap.en.srt 3KB
  285. 20 Supply Chain Security - Image Footprint/111 Recap.en.srt 2KB
  286. 14 Cluster Hardening - Upgrade Kubernetes/067 Practice - Create outdated cluster.en.srt 2KB
  287. 23 Supply Chain Security - Secure Supply Chain/126 ImagePolicyWebhook.en.srt 2KB
  288. 30 CKS Simulator/165 Introduction.en.srt 2KB
  289. 02 Create your course K8s cluster/010 Notice_ Always stop your instances.en.srt 2KB
  290. 17 Microservice Vulnerabilities - OS Level Security Domains/096 Recap.en.srt 2KB
  291. 28 System Hardening - Reduce Attack Surface/161 Practice - Disable application listening on port.en.srt 2KB
  292. 19 Open Policy Agent (OPA)/107 Recap.en.srt 2KB
  293. 21 Supply Chain Security - Static Analysis/115 OPA Confest.en.srt 2KB
  294. 06 Cluster Setup - GUI Elements/030 Recap.en.srt 2KB
  295. 17 Microservice Vulnerabilities - OS Level Security Domains/090 Privileged Containers.en.srt 2KB
  296. 24 Runtime Security - Behavioral Analytics at host and container level/137 Recap.en.srt 2KB
  297. 27 System Hardening - Kernel Hardening Tools/157 Recap.en.srt 2KB
  298. 26 Runtime Security - Auditing/148 Recap.en.srt 2KB
  299. 21 Supply Chain Security - Static Analysis/118 Recap.en.srt 2KB
  300. 31 Rating and feedback/167 Rating and feedback.en.srt 2KB
  301. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/053 Intro.en.srt 2KB
  302. 10 Cluster Setup - Verify Platform Binaries/043 Introduction.en.srt 2KB
  303. 03 Foundation - Kubernetes Secure Architecture/014 Recap.en.srt 2KB
  304. 17 Microservice Vulnerabilities - OS Level Security Domains/093 Practice - Disable PriviledgeEscalation.en.srt 2KB
  305. 14 Cluster Hardening - Upgrade Kubernetes/070 Recap.en.srt 1KB
  306. 22 Supply Chain Security - Image Vulnerability Scanning/120 Clair and Trivy.en.srt 1KB
  307. 29 CKS Exam Series/164 CKS Exam Series.html 1KB
  308. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 Recap.en.srt 1KB
  309. 01 Introduction/003 Slack Community.html 1KB
  310. 05 Cluster Setup - Network Policies/024 Recap.en.srt 1KB
  311. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/057 Recap.en.srt 1KB
  312. 22 Supply Chain Security - Image Vulnerability Scanning/122 Recap.en.srt 1KB
  313. 02 Create your course K8s cluster/009 Practice - Firewall rules for NodePorts.en.srt 1KB
  314. 02 Create your course K8s cluster/011 Recap.en.srt 1KB
  315. 18 Microservice Vulnerabilities - mTLS/099 Recap.en.srt 1KB
  316. 28 System Hardening - Reduce Attack Surface/163 Recap.en.srt 1KB
  317. 11 Cluster Hardening - RBAC/052 Recap.en.srt 1KB
  318. 13 Cluster Hardening - Restrict API Access/065 Recap.en.srt 1KB
  319. 25 Runtime Security - Immutability of containers at runtime/142 Recap.en.srt 1KB
  320. 06 Cluster Setup - GUI Elements/027 Practice - Install Dashboard.en.srt 1KB
  321. 06 Cluster Setup - GUI Elements/025 Feedback.en.srt 1KB
  322. 17 Microservice Vulnerabilities - OS Level Security Domains/092 PrivilegeEscalation.en.srt 1KB
  323. 02 Create your course K8s cluster/008 resources.txt 1KB
  324. 05 Cluster Setup - Network Policies/018 Cluster Reset.en.srt 843B
  325. 19 Open Policy Agent (OPA)/100 Cluster Reset.en.srt 843B
  326. 08 Cluster Setup - Node Metadata Protection/038 Recap.en.srt 808B
  327. 04 Foundation - Containers under the hood/017 Recap.en.srt 799B
  328. 23 Supply Chain Security - Secure Supply Chain/128 Recap.en.srt 743B
  329. 11 Cluster Hardening - RBAC/049 resources.txt 702B
  330. 11 Cluster Hardening - RBAC/048 resources.txt 673B
  331. 01 Introduction/002 Best Video Quality.en.srt 662B
  332. 10 Cluster Setup - Verify Platform Binaries/046 Recap.en.srt 620B
  333. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 resources.txt 562B
  334. 07 Cluster Setup - Secure Ingress/034 Recap.en.srt 557B
  335. 11 Cluster Hardening - RBAC/051 resources.txt 506B
  336. 23 Supply Chain Security - Secure Supply Chain/127 resources.txt 422B
  337. 24 Runtime Security - Behavioral Analytics at host and container level/133 resources.txt 391B
  338. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 resources.txt 377B
  339. 02 Create your course K8s cluster/005 resources.txt 374B
  340. 05 Cluster Setup - Network Policies/022 resources.txt 355B
  341. 09 Cluster Setup - CIS Benchmarks/041 resources.txt 316B
  342. 23 Supply Chain Security - Secure Supply Chain/125 resources.txt 309B
  343. 14 Cluster Hardening - Upgrade Kubernetes/067 resources.txt 282B
  344. 03 Foundation - Kubernetes Secure Architecture/014 resources.txt 280B
  345. 06 Cluster Setup - GUI Elements/029 resources.txt 273B
  346. 07 Cluster Setup - Secure Ingress/033 resources.txt 254B
  347. 27 System Hardening - Kernel Hardening Tools/152 resources.txt 254B
  348. 07 Cluster Setup - Secure Ingress/032 resources.txt 248B
  349. 02 Create your course K8s cluster/007 resources.txt 227B
  350. 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 resources.txt 210B
  351. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 resources.txt 205B
  352. 16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 resources.txt 191B
  353. 06 Cluster Setup - GUI Elements/030 resources.txt 176B
  354. 21 Supply Chain Security - Static Analysis/116 resources.txt 176B
  355. 14 Cluster Hardening - Upgrade Kubernetes/070 resources.txt 172B
  356. 21 Supply Chain Security - Static Analysis/117 resources.txt 172B
  357. 08 Cluster Setup - Node Metadata Protection/036 resources.txt 171B
  358. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 resources.txt 156B
  359. 27 System Hardening - Kernel Hardening Tools/155 resources.txt 154B
  360. 05 Cluster Setup - Network Policies/023 resources.txt 136B
  361. 27 System Hardening - Kernel Hardening Tools/157 resources.txt 135B
  362. 19 Open Policy Agent (OPA)/102 resources.txt 127B
  363. 05 Cluster Setup - Network Policies/021 resources.txt 122B
  364. 20 Supply Chain Security - Image Footprint/109 resources.txt 118B
  365. 20 Supply Chain Security - Image Footprint/110 resources.txt 118B
  366. 08 Cluster Setup - Node Metadata Protection/037 resources.txt 115B
  367. 22 Supply Chain Security - Image Vulnerability Scanning/121 resources.txt 111B
  368. 06 Cluster Setup - GUI Elements/027 resources.txt 108B
  369. 19 Open Policy Agent (OPA)/105 resources.txt 108B
  370. 26 Runtime Security - Auditing/144 resources.txt 106B
  371. 26 Runtime Security - Auditing/145 resources.txt 106B
  372. 26 Runtime Security - Auditing/146 resources.txt 106B
  373. 26 Runtime Security - Auditing/147 resources.txt 106B
  374. 19 Open Policy Agent (OPA)/104 resources.txt 100B
  375. 17 Microservice Vulnerabilities - OS Level Security Domains/087 resources.txt 96B
  376. 09 Cluster Setup - CIS Benchmarks/042 resources.txt 93B
  377. 19 Open Policy Agent (OPA)/103 resources.txt 93B
  378. 04 Foundation - Containers under the hood/017 resources.txt 89B
  379. 06 Cluster Setup - GUI Elements/028 resources.txt 87B
  380. 13 Cluster Hardening - Restrict API Access/062 resources.txt 86B
  381. 19 Open Policy Agent (OPA)/106 resources.txt 85B
  382. 12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 resources.txt 84B
  383. 05 Cluster Setup - Network Policies/024 resources.txt 73B
  384. 20 Supply Chain Security - Image Footprint/111 resources.txt 73B
  385. 24 Runtime Security - Behavioral Analytics at host and container level/137 resources.txt 72B
  386. 02 Create your course K8s cluster/009 resources.txt 71B
  387. 21 Supply Chain Security - Static Analysis/114 resources.txt 66B
  388. 13 Cluster Hardening - Restrict API Access/065 resources.txt 65B
  389. 24 Runtime Security - Behavioral Analytics at host and container level/129 resources.txt 55B
  390. 24 Runtime Security - Behavioral Analytics at host and container level/136 resources.txt 46B
  391. 01 Introduction/004 resources.txt 44B
  392. 19 Open Policy Agent (OPA)/107 resources.txt 44B
  393. 02 Create your course K8s cluster/006 resources.txt 33B