Kubernetes CKS 2021 Complete Course + Simulator 收录时间:2021-05-16 04:18:21 文件大小:5GB 下载次数:1 最近下载:2021-05-16 04:18:21 磁力链接: magnet:?xt=urn:btih:2d3a658d896569b680c013d4c40256c753d3adb6 立即下载 复制链接 文件列表 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 Practice - Encrypt ETCD.mp4 223MB 26 Runtime Security - Auditing/146 Practice - Create advanced Audit Policy.mp4 163MB 26 Runtime Security - Auditing/147 Practice - Investigate API access history.mp4 156MB 11 Cluster Hardening - RBAC/051 Practice - CertificateSigningRequests.mp4 156MB 24 Runtime Security - Behavioral Analytics at host and container level/136 Practice - Change Falco Rule.mp4 142MB 07 Cluster Setup - Secure Ingress/033 Practice - Secure an Ingress.mp4 130MB 02 Create your course K8s cluster/008 Practice - Create Kubeadm Cluster in GCP.mp4 120MB 17 Microservice Vulnerabilities - OS Level Security Domains/095 Practice - Create and enable PodSecurityPolicy.mp4 115MB 23 Supply Chain Security - Secure Supply Chain/127 Practice - ImagePolicyWebhook.mp4 115MB 19 Open Policy Agent (OPA)/104 Practice - Enforce Namespace Labels.mp4 111MB 27 System Hardening - Kernel Hardening Tools/156 Practice - Seccomp for Kubernetes Nginx.mp4 103MB 13 Cluster Hardening - Restrict API Access/062 Practice - External Apiserver Access.mp4 101MB 19 Open Policy Agent (OPA)/103 Practice - Deny All Policy.mp4 101MB 24 Runtime Security - Behavioral Analytics at host and container level/131 Practice - Strace and _proc on ETCD.mp4 99MB 26 Runtime Security - Auditing/144 Practice - Enable Audit Logging in Apiserver.mp4 96MB 05 Cluster Setup - Network Policies/023 Practice - Backend to Database traffic.mp4 94MB 23 Supply Chain Security - Secure Supply Chain/125 Practice - Whitelist Registries with OPA.mp4 83MB 20 Supply Chain Security - Image Footprint/109 Practice - Reduce Image Footprint with Multi-Stage.mp4 79MB 13 Cluster Hardening - Restrict API Access/061 Practice - Manual API Request.mp4 78MB 07 Cluster Setup - Secure Ingress/032 Practice - Create an Ingress.mp4 76MB 28 System Hardening - Reduce Attack Surface/162 Practice - Investigate Linux Users.mp4 76MB 02 Create your course K8s cluster/007 Practice - Configure _gcloud_ command.mp4 75MB 24 Runtime Security - Behavioral Analytics at host and container level/134 Practice - Use Falco to find malicious processes.mp4 75MB 20 Supply Chain Security - Image Footprint/110 Practice - Secure and harden Images.mp4 67MB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 Practice - Pod uses custom ServiceAccount.mp4 67MB 27 System Hardening - Kernel Hardening Tools/152 Practice - AppArmor for Docker Nginx.mp4 62MB 18 Microservice Vulnerabilities - mTLS/098 Practice - Create sidecar proxy.mp4 62MB 14 Cluster Hardening - Upgrade Kubernetes/068 Practice - Upgrade master node.mp4 60MB 26 Runtime Security - Auditing/145 Practice - Create Secret and check Audit Logs.mp4 60MB 03 Foundation - Kubernetes Secure Architecture/013 Practice - Find various K8s certificates.mp4 59MB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 Practice - Install and use gVisor.mp4 57MB 10 Cluster Setup - Verify Platform Binaries/045 Practice - Verify apiserver binary running in our cluster.mp4 57MB 09 Cluster Setup - CIS Benchmarks/040 Practice - CIS in Action.mp4 56MB 22 Supply Chain Security - Image Vulnerability Scanning/121 Practice - Use Trivy to scan images.mp4 55MB 24 Runtime Security - Behavioral Analytics at host and container level/133 Practice - Falco and Installation.mp4 55MB 05 Cluster Setup - Network Policies/022 Practice - Frontend to Backend traffic.mp4 54MB 28 System Hardening - Reduce Attack Surface/160 Practice - Install and investigate Services.mp4 53MB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/072 Practice - Create Simple Secret Scenario.mp4 48MB 11 Cluster Hardening - RBAC/049 Practice - ClusterRole and ClusterRoleBinding.mp4 48MB 24 Runtime Security - Behavioral Analytics at host and container level/130 Practice - Strace.mp4 47MB 17 Microservice Vulnerabilities - OS Level Security Domains/087 Intro and Security Contexts.mp4 44MB 09 Cluster Setup - CIS Benchmarks/041 Practice - kube-bench.mp4 44MB 27 System Hardening - Kernel Hardening Tools/153 Practice - AppArmor for Kubernetes Nginx.mp4 44MB 08 Cluster Setup - Node Metadata Protection/037 Practice_ Protect Node Metadata via NetworkPolicy.mp4 44MB 19 Open Policy Agent (OPA)/105 Practice - Enforce Deployment replica count.mp4 42MB 06 Cluster Setup - GUI Elements/028 Practice - Outside Insecure Access.mp4 42MB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 Practice - Hack Secrets in ETCD.mp4 41MB 25 Runtime Security - Immutability of containers at runtime/141 Practice - SecurityContext renders container immutable.mp4 41MB 21 Supply Chain Security - Static Analysis/117 Practice - OPA Confest for Dockerfile.mp4 41MB 21 Supply Chain Security - Static Analysis/114 Practice - Kubesec.mp4 40MB 23 Supply Chain Security - Secure Supply Chain/124 Practice - Image Digest.mp4 39MB 04 Foundation - Containers under the hood/015 Intro.mp4 38MB 26 Runtime Security - Auditing/143 Introduction.mp4 37MB 10 Cluster Setup - Verify Platform Binaries/044 Practice - Download and verify K8s release.mp4 37MB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 Practice - Disable ServiceAccount mounting.mp4 34MB 19 Open Policy Agent (OPA)/102 Practice - Install OPA.mp4 33MB 05 Cluster Setup - Network Policies/021 Practice - Default Deny.mp4 33MB 03 Foundation - Kubernetes Secure Architecture/012 Intro.mp4 32MB 13 Cluster Hardening - Restrict API Access/060 Practice - Insecure Access.mp4 32MB 27 System Hardening - Kernel Hardening Tools/151 Practice - AppArmor for curl.mp4 32MB 17 Microservice Vulnerabilities - OS Level Security Domains/088 Practice - Set Container User and Group.mp4 31MB 11 Cluster Hardening - RBAC/048 Practice - Role and Rolebinding.mp4 30MB 25 Runtime Security - Immutability of containers at runtime/140 Practice - StartupProbe changes container.mp4 28MB 19 Open Policy Agent (OPA)/106 Practice - The Rego Playground and more examples.mp4 28MB 01 Introduction/004 K8s Security Best Practices.mp4 28MB 11 Cluster Hardening - RBAC/047 Intro.mp4 27MB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/073 Practice - Hack Secrets in Docker.mp4 27MB 14 Cluster Hardening - Upgrade Kubernetes/069 Practice - Upgrade worker node.mp4 27MB 28 System Hardening - Reduce Attack Surface/159 Practice - Systemctl and Services.mp4 26MB 24 Runtime Security - Behavioral Analytics at host and container level/132 Practice - _proc and env variables.mp4 26MB 24 Runtime Security - Behavioral Analytics at host and container level/135 Practice - Investigate Falco rules.mp4 26MB 20 Supply Chain Security - Image Footprint/111 Recap.mp4 25MB 21 Supply Chain Security - Static Analysis/116 Practice - OPA Confest for K8s YAML.mp4 25MB 05 Cluster Setup - Network Policies/020 Introduction 2.mp4 24MB 14 Cluster Hardening - Upgrade Kubernetes/066 Introduction.mp4 23MB 18 Microservice Vulnerabilities - mTLS/097 Intro.mp4 22MB 28 System Hardening - Reduce Attack Surface/161 Practice - Disable application listening on port.mp4 22MB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/079 Practice - Container calls Linux Kernel.mp4 21MB 13 Cluster Hardening - Restrict API Access/064 Practice - Verify NodeRestriction.mp4 21MB 06 Cluster Setup - GUI Elements/026 Introduction.mp4 21MB 21 Supply Chain Security - Static Analysis/112 Introduction.mp4 21MB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 Recap.mp4 20MB 22 Supply Chain Security - Image Vulnerability Scanning/119 Introduction.mp4 20MB 24 Runtime Security - Behavioral Analytics at host and container level/129 Introduction.mp4 19MB 06 Cluster Setup - GUI Elements/030 Recap.mp4 19MB 01 Introduction/001 Welcome.mp4 19MB 19 Open Policy Agent (OPA)/101 Introduction.mp4 19MB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/078 Introduction.mp4 19MB 13 Cluster Hardening - Restrict API Access/058 Introduction.mp4 18MB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/084 Practice - Create and use RuntimeClasses.mp4 18MB 06 Cluster Setup - GUI Elements/029 Practice - RBAC for the Dashboard.mp4 18MB 13 Cluster Hardening - Restrict API Access/059 Practice - Anonymous Access.mp4 18MB 14 Cluster Hardening - Upgrade Kubernetes/067 Practice - Create outdated cluster.mp4 18MB 28 System Hardening - Reduce Attack Surface/158 Introduction.mp4 18MB 23 Supply Chain Security - Secure Supply Chain/123 Introduction.mp4 17MB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/081 Practice - Crictl.mp4 17MB 05 Cluster Setup - Network Policies/019 Introduction 1.mp4 16MB 20 Supply Chain Security - Image Footprint/108 Introduction.mp4 16MB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/075 ETCD Encryption.mp4 16MB 05 Cluster Setup - Network Policies/024 Recap.mp4 14MB 17 Microservice Vulnerabilities - OS Level Security Domains/091 Practice - Create Privileged Containers.mp4 14MB 02 Create your course K8s cluster/006 Practice - Create GCP Account.mp4 14MB 27 System Hardening - Kernel Hardening Tools/155 Practice - Seccomp for Docker Nginx.mp4 13MB 09 Cluster Setup - CIS Benchmarks/042 Recap.mp4 13MB 04 Foundation - Containers under the hood/016 Practice - The PID Namespace.mp4 13MB 25 Runtime Security - Immutability of containers at runtime/139 Ways to enforce immutability.mp4 12MB 27 System Hardening - Kernel Hardening Tools/157 Recap.mp4 12MB 06 Cluster Setup - GUI Elements/027 Practice - Install Dashboard.mp4 12MB 07 Cluster Setup - Secure Ingress/031 Introduction.mp4 12MB 11 Cluster Hardening - RBAC/050 Accounts and Users.mp4 12MB 17 Microservice Vulnerabilities - OS Level Security Domains/096 Recap.mp4 11MB 08 Cluster Setup - Node Metadata Protection/036 Practice_ Access Node Metadata.mp4 11MB 24 Runtime Security - Behavioral Analytics at host and container level/137 Recap.mp4 11MB 27 System Hardening - Kernel Hardening Tools/154 Seccomp.mp4 10MB 25 Runtime Security - Immutability of containers at runtime/138 Introduction.mp4 10MB 02 Create your course K8s cluster/005 Cluster Specification.mp4 10MB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/071 Introduction.mp4 10MB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/080 Open Container Initiative OCI.mp4 10MB 08 Cluster Setup - Node Metadata Protection/035 Introduction.mp4 9MB 27 System Hardening - Kernel Hardening Tools/149 Introduction.mp4 9MB 31 Rating and feedback/167 Rating and feedback.mp4 9MB 21 Supply Chain Security - Static Analysis/113 Kubesec.mp4 9MB 17 Microservice Vulnerabilities - OS Level Security Domains/089 Practice - Force Container Non-Root.mp4 8MB 30 CKS Simulator/165 Introduction.mp4 8MB 02 Create your course K8s cluster/010 Notice_ Always stop your instances.mp4 8MB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/056 Practice - Limit ServiceAccounts using RBAC.mp4 8MB 09 Cluster Setup - CIS Benchmarks/039 Introduction.mp4 7MB 27 System Hardening - Kernel Hardening Tools/150 AppArmor.mp4 7MB 14 Cluster Hardening - Upgrade Kubernetes/070 Recap.mp4 7MB 22 Supply Chain Security - Image Vulnerability Scanning/122 Recap.mp4 6MB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/082 Sandbox Runtime Katacontainers.mp4 6MB 26 Runtime Security - Auditing/148 Recap.mp4 6MB 17 Microservice Vulnerabilities - OS Level Security Domains/094 PodSecurityPolicies.mp4 6MB 17 Microservice Vulnerabilities - OS Level Security Domains/093 Practice - Disable PriviledgeEscalation.mp4 6MB 13 Cluster Hardening - Restrict API Access/063 NodeRestriction AdmissionController.mp4 6MB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/083 Sandbox Runtime gVisor.mp4 5MB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/053 Intro.mp4 5MB 02 Create your course K8s cluster/011 Recap.mp4 5MB 13 Cluster Hardening - Restrict API Access/065 Recap.mp4 5MB 11 Cluster Hardening - RBAC/052 Recap.mp4 5MB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/057 Recap.mp4 5MB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 Recap.mp4 5MB 21 Supply Chain Security - Static Analysis/118 Recap.mp4 5MB 23 Supply Chain Security - Secure Supply Chain/126 ImagePolicyWebhook.mp4 4MB 19 Open Policy Agent (OPA)/107 Recap.mp4 4MB 03 Foundation - Kubernetes Secure Architecture/014 Recap.mp4 4MB 18 Microservice Vulnerabilities - mTLS/099 Recap.mp4 4MB 06 Cluster Setup - GUI Elements/025 Feedback.mp4 4MB 28 System Hardening - Reduce Attack Surface/163 Recap.mp4 4MB 17 Microservice Vulnerabilities - OS Level Security Domains/090 Privileged Containers.mp4 4MB 10 Cluster Setup - Verify Platform Binaries/043 Introduction.mp4 4MB 21 Supply Chain Security - Static Analysis/115 OPA Confest.mp4 4MB 23 Supply Chain Security - Secure Supply Chain/128 Recap.mp4 3MB 05 Cluster Setup - Network Policies/018 Cluster Reset.mp4 3MB 19 Open Policy Agent (OPA)/100 Cluster Reset.mp4 3MB 25 Runtime Security - Immutability of containers at runtime/142 Recap.mp4 3MB 04 Foundation - Containers under the hood/017 Recap.mp4 3MB 02 Create your course K8s cluster/009 Practice - Firewall rules for NodePorts.mp4 3MB 08 Cluster Setup - Node Metadata Protection/038 Recap.mp4 3MB 17 Microservice Vulnerabilities - OS Level Security Domains/092 PrivilegeEscalation.mp4 3MB 22 Supply Chain Security - Image Vulnerability Scanning/120 Clair and Trivy.mp4 3MB 07 Cluster Setup - Secure Ingress/034 Recap.mp4 2MB 01 Introduction/002 Best Video Quality.mp4 2MB 10 Cluster Setup - Verify Platform Binaries/046 Recap.mp4 2MB 09 Cluster Setup - CIS Benchmarks/040 CIS-Kubernetes-Benchmark-v1.6.0.pdf 1MB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 Practice - Encrypt ETCD.en.srt 22KB 26 Runtime Security - Auditing/143 Introduction.en.srt 15KB 03 Foundation - Kubernetes Secure Architecture/012 Intro.en.srt 15KB 01 Introduction/004 K8s Security Best Practices.en.srt 14KB 26 Runtime Security - Auditing/147 Practice - Investigate API access history.en.srt 14KB 19 Open Policy Agent (OPA)/103 Practice - Deny All Policy.en.srt 13KB 04 Foundation - Containers under the hood/015 Intro.en.srt 13KB 11 Cluster Hardening - RBAC/047 Intro.en.srt 12KB 23 Supply Chain Security - Secure Supply Chain/127 Practice - ImagePolicyWebhook.en.srt 12KB 19 Open Policy Agent (OPA)/104 Practice - Enforce Namespace Labels.en.srt 12KB 11 Cluster Hardening - RBAC/051 Practice - CertificateSigningRequests.en.srt 12KB 20 Supply Chain Security - Image Footprint/110 Practice - Secure and harden Images.en.srt 11KB 24 Runtime Security - Behavioral Analytics at host and container level/136 Practice - Change Falco Rule.en.srt 11KB 18 Microservice Vulnerabilities - mTLS/097 Intro.en.srt 11KB 17 Microservice Vulnerabilities - OS Level Security Domains/095 Practice - Create and enable PodSecurityPolicy.en.srt 11KB 02 Create your course K8s cluster/008 Practice - Create Kubeadm Cluster in GCP.en.srt 11KB 26 Runtime Security - Auditing/146 Practice - Create advanced Audit Policy.en.srt 11KB 21 Supply Chain Security - Static Analysis/112 Introduction.en.srt 10KB 22 Supply Chain Security - Image Vulnerability Scanning/119 Introduction.en.srt 10KB 24 Runtime Security - Behavioral Analytics at host and container level/131 Practice - Strace and _proc on ETCD.en.srt 10KB 07 Cluster Setup - Secure Ingress/033 Practice - Secure an Ingress.en.srt 10KB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/078 Introduction.en.srt 9KB 27 System Hardening - Kernel Hardening Tools/156 Practice - Seccomp for Kubernetes Nginx.en.srt 9KB 14 Cluster Hardening - Upgrade Kubernetes/066 Introduction.en.srt 9KB 07 Cluster Setup - Secure Ingress/032 Practice - Create an Ingress.en.srt 8KB 20 Supply Chain Security - Image Footprint/109 Practice - Reduce Image Footprint with Multi-Stage.en.srt 8KB 03 Foundation - Kubernetes Secure Architecture/013 Practice - Find various K8s certificates.en.srt 8KB 09 Cluster Setup - CIS Benchmarks/040 Practice - CIS in Action.en.srt 8KB 27 System Hardening - Kernel Hardening Tools/151 Practice - AppArmor for curl.en.srt 8KB 13 Cluster Hardening - Restrict API Access/062 Practice - External Apiserver Access.en.srt 8KB 05 Cluster Setup - Network Policies/023 Practice - Backend to Database traffic.en.srt 8KB 19 Open Policy Agent (OPA)/101 Introduction.en.srt 8KB 27 System Hardening - Kernel Hardening Tools/152 Practice - AppArmor for Docker Nginx.en.srt 7KB 05 Cluster Setup - Network Policies/022 Practice - Frontend to Backend traffic.en.srt 7KB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/075 ETCD Encryption.en.srt 7KB 25 Runtime Security - Immutability of containers at runtime/139 Ways to enforce immutability.en.srt 7KB 24 Runtime Security - Behavioral Analytics at host and container level/134 Practice - Use Falco to find malicious processes.en.srt 7KB 28 System Hardening - Reduce Attack Surface/158 Introduction.en.srt 7KB 27 System Hardening - Kernel Hardening Tools/153 Practice - AppArmor for Kubernetes Nginx.en.srt 7KB 26 Runtime Security - Auditing/144 Practice - Enable Audit Logging in Apiserver.en.srt 7KB 18 Microservice Vulnerabilities - mTLS/098 Practice - Create sidecar proxy.en.srt 7KB 23 Supply Chain Security - Secure Supply Chain/125 Practice - Whitelist Registries with OPA.en.srt 7KB 20 Supply Chain Security - Image Footprint/108 Introduction.en.srt 6KB 05 Cluster Setup - Network Policies/020 Introduction 2.en.srt 6KB 24 Runtime Security - Behavioral Analytics at host and container level/135 Practice - Investigate Falco rules.en.srt 6KB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/072 Practice - Create Simple Secret Scenario.en.srt 6KB 28 System Hardening - Reduce Attack Surface/162 Practice - Investigate Linux Users.en.srt 6KB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 Recap.en.srt 6KB 13 Cluster Hardening - Restrict API Access/058 Introduction.en.srt 6KB 24 Runtime Security - Behavioral Analytics at host and container level/132 Practice - _proc and env variables.en.srt 6KB 28 System Hardening - Reduce Attack Surface/160 Practice - Install and investigate Services.en.srt 6KB 24 Runtime Security - Behavioral Analytics at host and container level/130 Practice - Strace.en.srt 6KB 19 Open Policy Agent (OPA)/106 Practice - The Rego Playground and more examples.en.srt 6KB 11 Cluster Hardening - RBAC/050 Accounts and Users.en.srt 6KB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 Practice - Pod uses custom ServiceAccount.en.srt 6KB 06 Cluster Setup - GUI Elements/026 Introduction.en.srt 6KB 10 Cluster Setup - Verify Platform Binaries/045 Practice - Verify apiserver binary running in our cluster.en.srt 6KB 25 Runtime Security - Immutability of containers at runtime/141 Practice - SecurityContext renders container immutable.en.srt 5KB 05 Cluster Setup - Network Policies/019 Introduction 1.en.srt 5KB 11 Cluster Hardening - RBAC/048 Practice - Role and Rolebinding.en.srt 5KB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/071 Introduction.en.srt 5KB 02 Create your course K8s cluster/007 Practice - Configure _gcloud_ command.en.srt 5KB 24 Runtime Security - Behavioral Analytics at host and container level/133 Practice - Falco and Installation.en.srt 5KB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 Practice - Install and use gVisor.en.srt 5KB 02 Create your course K8s cluster/006 Practice - Create GCP Account.en.srt 5KB 21 Supply Chain Security - Static Analysis/116 Practice - OPA Confest for K8s YAML.en.srt 5KB 21 Supply Chain Security - Static Analysis/114 Practice - Kubesec.en.srt 5KB 07 Cluster Setup - Secure Ingress/031 Introduction.en.srt 5KB 09 Cluster Setup - CIS Benchmarks/041 Practice - kube-bench.en.srt 5KB 19 Open Policy Agent (OPA)/105 Practice - Enforce Deployment replica count.en.srt 5KB 08 Cluster Setup - Node Metadata Protection/037 Practice_ Protect Node Metadata via NetworkPolicy.en.srt 5KB 11 Cluster Hardening - RBAC/049 Practice - ClusterRole and ClusterRoleBinding.en.srt 5KB 05 Cluster Setup - Network Policies/021 Practice - Default Deny.en.srt 5KB 23 Supply Chain Security - Secure Supply Chain/123 Introduction.en.srt 5KB 22 Supply Chain Security - Image Vulnerability Scanning/121 Practice - Use Trivy to scan images.en.srt 5KB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 Practice - Hack Secrets in ETCD.en.srt 5KB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/084 Practice - Create and use RuntimeClasses.en.srt 5KB 21 Supply Chain Security - Static Analysis/117 Practice - OPA Confest for Dockerfile.en.srt 5KB 25 Runtime Security - Immutability of containers at runtime/138 Introduction.en.srt 5KB 23 Supply Chain Security - Secure Supply Chain/124 Practice - Image Digest.en.srt 5KB 13 Cluster Hardening - Restrict API Access/064 Practice - Verify NodeRestriction.en.srt 4KB 24 Runtime Security - Behavioral Analytics at host and container level/129 Introduction.en.srt 4KB 27 System Hardening - Kernel Hardening Tools/154 Seccomp.en.srt 4KB 04 Foundation - Containers under the hood/016 Practice - The PID Namespace.en.srt 4KB 06 Cluster Setup - GUI Elements/029 Practice - RBAC for the Dashboard.en.srt 4KB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/080 Open Container Initiative OCI.en.srt 4KB 13 Cluster Hardening - Restrict API Access/061 Practice - Manual API Request.en.srt 4KB 17 Microservice Vulnerabilities - OS Level Security Domains/088 Practice - Set Container User and Group.en.srt 4KB 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/073 Practice - Hack Secrets in Docker.en.srt 4KB 17 Microservice Vulnerabilities - OS Level Security Domains/087 Intro and Security Contexts.en.srt 4KB 19 Open Policy Agent (OPA)/102 Practice - Install OPA.en.srt 4KB 10 Cluster Setup - Verify Platform Binaries/044 Practice - Download and verify K8s release.en.srt 4KB 26 Runtime Security - Auditing/145 Practice - Create Secret and check Audit Logs.en.srt 4KB 25 Runtime Security - Immutability of containers at runtime/140 Practice - StartupProbe changes container.en.srt 4KB 02 Create your course K8s cluster/005 Cluster Specification.en.srt 4KB 13 Cluster Hardening - Restrict API Access/060 Practice - Insecure Access.en.srt 4KB 08 Cluster Setup - Node Metadata Protection/035 Introduction.en.srt 4KB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 Practice - Disable ServiceAccount mounting.en.srt 4KB 01 Introduction/001 Welcome.en.srt 4KB 13 Cluster Hardening - Restrict API Access/059 Practice - Anonymous Access.en.srt 4KB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/079 Practice - Container calls Linux Kernel.en.srt 4KB 27 System Hardening - Kernel Hardening Tools/149 Introduction.en.srt 4KB 09 Cluster Setup - CIS Benchmarks/039 Introduction.en.srt 3KB 27 System Hardening - Kernel Hardening Tools/150 AppArmor.en.srt 3KB 17 Microservice Vulnerabilities - OS Level Security Domains/091 Practice - Create Privileged Containers.en.srt 3KB 14 Cluster Hardening - Upgrade Kubernetes/069 Practice - Upgrade worker node.en.srt 3KB 27 System Hardening - Kernel Hardening Tools/155 Practice - Seccomp for Docker Nginx.en.srt 3KB 21 Supply Chain Security - Static Analysis/113 Kubesec.en.srt 3KB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/056 Practice - Limit ServiceAccounts using RBAC.en.srt 3KB 14 Cluster Hardening - Upgrade Kubernetes/068 Practice - Upgrade master node.en.srt 3KB 17 Microservice Vulnerabilities - OS Level Security Domains/094 PodSecurityPolicies.en.srt 3KB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/082 Sandbox Runtime Katacontainers.en.srt 3KB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/081 Practice - Crictl.en.srt 3KB 13 Cluster Hardening - Restrict API Access/063 NodeRestriction AdmissionController.en.srt 3KB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/083 Sandbox Runtime gVisor.en.srt 3KB 28 System Hardening - Reduce Attack Surface/159 Practice - Systemctl and Services.en.srt 3KB 17 Microservice Vulnerabilities - OS Level Security Domains/089 Practice - Force Container Non-Root.en.srt 3KB 08 Cluster Setup - Node Metadata Protection/036 Practice_ Access Node Metadata.en.srt 3KB 09 Cluster Setup - CIS Benchmarks/042 Recap.en.srt 3KB 20 Supply Chain Security - Image Footprint/111 Recap.en.srt 2KB 14 Cluster Hardening - Upgrade Kubernetes/067 Practice - Create outdated cluster.en.srt 2KB 23 Supply Chain Security - Secure Supply Chain/126 ImagePolicyWebhook.en.srt 2KB 30 CKS Simulator/165 Introduction.en.srt 2KB 02 Create your course K8s cluster/010 Notice_ Always stop your instances.en.srt 2KB 17 Microservice Vulnerabilities - OS Level Security Domains/096 Recap.en.srt 2KB 28 System Hardening - Reduce Attack Surface/161 Practice - Disable application listening on port.en.srt 2KB 19 Open Policy Agent (OPA)/107 Recap.en.srt 2KB 21 Supply Chain Security - Static Analysis/115 OPA Confest.en.srt 2KB 06 Cluster Setup - GUI Elements/030 Recap.en.srt 2KB 17 Microservice Vulnerabilities - OS Level Security Domains/090 Privileged Containers.en.srt 2KB 24 Runtime Security - Behavioral Analytics at host and container level/137 Recap.en.srt 2KB 27 System Hardening - Kernel Hardening Tools/157 Recap.en.srt 2KB 26 Runtime Security - Auditing/148 Recap.en.srt 2KB 21 Supply Chain Security - Static Analysis/118 Recap.en.srt 2KB 31 Rating and feedback/167 Rating and feedback.en.srt 2KB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/053 Intro.en.srt 2KB 10 Cluster Setup - Verify Platform Binaries/043 Introduction.en.srt 2KB 03 Foundation - Kubernetes Secure Architecture/014 Recap.en.srt 2KB 17 Microservice Vulnerabilities - OS Level Security Domains/093 Practice - Disable PriviledgeEscalation.en.srt 2KB 14 Cluster Hardening - Upgrade Kubernetes/070 Recap.en.srt 1KB 22 Supply Chain Security - Image Vulnerability Scanning/120 Clair and Trivy.en.srt 1KB 29 CKS Exam Series/164 CKS Exam Series.html 1KB 16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 Recap.en.srt 1KB 01 Introduction/003 Slack Community.html 1KB 05 Cluster Setup - Network Policies/024 Recap.en.srt 1KB 12 Cluster Hardening - Exercise caution in using ServiceAccounts/057 Recap.en.srt 1KB 22 Supply Chain Security - Image Vulnerability Scanning/122 Recap.en.srt 1KB 02 Create your course K8s cluster/009 Practice - Firewall rules for NodePorts.en.srt 1KB 02 Create your course K8s cluster/011 Recap.en.srt 1KB 18 Microservice Vulnerabilities - mTLS/099 Recap.en.srt 1KB 28 System Hardening - Reduce Attack Surface/163 Recap.en.srt 1KB 11 Cluster Hardening - RBAC/052 Recap.en.srt 1KB 13 Cluster Hardening - Restrict API Access/065 Recap.en.srt 1KB 25 Runtime Security - Immutability of containers at runtime/142 Recap.en.srt 1KB 06 Cluster Setup - GUI Elements/027 Practice - Install Dashboard.en.srt 1KB 06 Cluster Setup - GUI Elements/025 Feedback.en.srt 1KB 17 Microservice Vulnerabilities - OS Level Security Domains/092 PrivilegeEscalation.en.srt 1KB 02 Create your course K8s cluster/008 resources.txt 1KB 05 Cluster Setup - Network Policies/018 Cluster Reset.en.srt 843B 19 Open Policy Agent (OPA)/100 Cluster Reset.en.srt 843B 08 Cluster Setup - Node Metadata Protection/038 Recap.en.srt 808B 04 Foundation - Containers under the hood/017 Recap.en.srt 799B 23 Supply Chain Security - Secure Supply Chain/128 Recap.en.srt 743B 11 Cluster Hardening - RBAC/049 resources.txt 702B 11 Cluster Hardening - RBAC/048 resources.txt 673B 01 Introduction/002 Best Video Quality.en.srt 662B 10 Cluster Setup - Verify Platform Binaries/046 Recap.en.srt 620B 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 resources.txt 562B 07 Cluster Setup - Secure Ingress/034 Recap.en.srt 557B 11 Cluster Hardening - RBAC/051 resources.txt 506B 23 Supply Chain Security - Secure Supply Chain/127 resources.txt 422B 24 Runtime Security - Behavioral Analytics at host and container level/133 resources.txt 391B 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 resources.txt 377B 02 Create your course K8s cluster/005 resources.txt 374B 05 Cluster Setup - Network Policies/022 resources.txt 355B 09 Cluster Setup - CIS Benchmarks/041 resources.txt 316B 23 Supply Chain Security - Secure Supply Chain/125 resources.txt 309B 14 Cluster Hardening - Upgrade Kubernetes/067 resources.txt 282B 03 Foundation - Kubernetes Secure Architecture/014 resources.txt 280B 06 Cluster Setup - GUI Elements/029 resources.txt 273B 07 Cluster Setup - Secure Ingress/033 resources.txt 254B 27 System Hardening - Kernel Hardening Tools/152 resources.txt 254B 07 Cluster Setup - Secure Ingress/032 resources.txt 248B 02 Create your course K8s cluster/007 resources.txt 227B 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 resources.txt 210B 16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 resources.txt 205B 16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 resources.txt 191B 06 Cluster Setup - GUI Elements/030 resources.txt 176B 21 Supply Chain Security - Static Analysis/116 resources.txt 176B 14 Cluster Hardening - Upgrade Kubernetes/070 resources.txt 172B 21 Supply Chain Security - Static Analysis/117 resources.txt 172B 08 Cluster Setup - Node Metadata Protection/036 resources.txt 171B 12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 resources.txt 156B 27 System Hardening - Kernel Hardening Tools/155 resources.txt 154B 05 Cluster Setup - Network Policies/023 resources.txt 136B 27 System Hardening - Kernel Hardening Tools/157 resources.txt 135B 19 Open Policy Agent (OPA)/102 resources.txt 127B 05 Cluster Setup - Network Policies/021 resources.txt 122B 20 Supply Chain Security - Image Footprint/109 resources.txt 118B 20 Supply Chain Security - Image Footprint/110 resources.txt 118B 08 Cluster Setup - Node Metadata Protection/037 resources.txt 115B 22 Supply Chain Security - Image Vulnerability Scanning/121 resources.txt 111B 06 Cluster Setup - GUI Elements/027 resources.txt 108B 19 Open Policy Agent (OPA)/105 resources.txt 108B 26 Runtime Security - Auditing/144 resources.txt 106B 26 Runtime Security - Auditing/145 resources.txt 106B 26 Runtime Security - Auditing/146 resources.txt 106B 26 Runtime Security - Auditing/147 resources.txt 106B 19 Open Policy Agent (OPA)/104 resources.txt 100B 17 Microservice Vulnerabilities - OS Level Security Domains/087 resources.txt 96B 09 Cluster Setup - CIS Benchmarks/042 resources.txt 93B 19 Open Policy Agent (OPA)/103 resources.txt 93B 04 Foundation - Containers under the hood/017 resources.txt 89B 06 Cluster Setup - GUI Elements/028 resources.txt 87B 13 Cluster Hardening - Restrict API Access/062 resources.txt 86B 19 Open Policy Agent (OPA)/106 resources.txt 85B 12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 resources.txt 84B 05 Cluster Setup - Network Policies/024 resources.txt 73B 20 Supply Chain Security - Image Footprint/111 resources.txt 73B 24 Runtime Security - Behavioral Analytics at host and container level/137 resources.txt 72B 02 Create your course K8s cluster/009 resources.txt 71B 21 Supply Chain Security - Static Analysis/114 resources.txt 66B 13 Cluster Hardening - Restrict API Access/065 resources.txt 65B 24 Runtime Security - Behavioral Analytics at host and container level/129 resources.txt 55B 24 Runtime Security - Behavioral Analytics at host and container level/136 resources.txt 46B 01 Introduction/004 resources.txt 44B 19 Open Policy Agent (OPA)/107 resources.txt 44B 02 Create your course K8s cluster/006 resources.txt 33B