589689.xyz

Acloudguru - Certified Kubernetes Security Specialist (CKS)

  • 收录时间:2023-06-18 05:59:41
  • 文件大小:2GB
  • 下载次数:1
  • 最近下载:2023-06-18 05:59:41
  • 磁力链接:

文件列表

  1. 07 Monitoring Logging and Runtime Security/008 Setting up Audit Logging.mp4 117MB
  2. 05 Minimizing Microservice Vulnerabilities/010 Creating a Container Runtime Sandbox.mp4 114MB
  3. 01 Introduction/001 Study Guide PDF.pdf 97MB
  4. 02 Cluster Setup/005 Running a CIS Benchmark with kube-bench.mp4 79MB
  5. 07 Monitoring Logging and Runtime Security/003 Analyzing Container Behavior with Falco.mp4 79MB
  6. 02 Cluster Setup/006 Fixing Security Issues Detected by a CIS Benchmark.mp4 77MB
  7. 06 Supply Chain Security/013 Configuring the ImagePolicyWebhook Admission Controller.mp4 77MB
  8. 05 Minimizing Microservice Vulnerabilities/004 Using Pod Security Policies.mp4 68MB
  9. 02 Cluster Setup/008 Implementing TLS with Ingress.mp4 65MB
  10. 05 Minimizing Microservice Vulnerabilities/006 Using OPA Gatekeeper.mp4 64MB
  11. 06 Supply Chain Security/009 Scanning Images for Known Vulnerabilities.mp4 63MB
  12. 03 Cluster Hardening/003 Restricting Service Account Permissions.mp4 62MB
  13. 07 Monitoring Logging and Runtime Security/005 Ensuring Containers are Immutable.mp4 60MB
  14. 01 Introduction/004 Building a Kubernetes Cluster.mp4 59MB
  15. 01 Introduction/001 Course Introduction.mp4 57MB
  16. 05 Minimizing Microservice Vulnerabilities/013 Signing Certificates.mp4 54MB
  17. 02 Cluster Setup/003 Allowing Limited Access with NetworkPolicies.mp4 52MB
  18. 05 Minimizing Microservice Vulnerabilities/003 Governing Pod Configurations with Pod Security Policies.mp4 50MB
  19. 02 Cluster Setup/002 Restricting Default Access with NetworkPolicies.mp4 46MB
  20. 05 Minimizing Microservice Vulnerabilities/007 Managing Kubernetes Secrets.mp4 45MB
  21. 04 System Hardening/002 Understanding Host OS Security Concerns.mp4 45MB
  22. 04 System Hardening/006 Using AppArmor in k8s Containers.mp4 42MB
  23. 06 Supply Chain Security/003 Whitelisting Allowed Image Registries.mp4 42MB
  24. 06 Supply Chain Security/012 Setting up an Image Scanner.mp4 41MB
  25. 01 Introduction/002 About the Exam.mp4 40MB
  26. 06 Supply Chain Security/015 Supply Chain Security Review.mp4 37MB
  27. 06 Supply Chain Security/005 Analyzing a Dockerfile.mp4 36MB
  28. 02 Cluster Setup/012 Verifying Kubernetes Platform Binaries.mp4 35MB
  29. 01 Introduction/005 Kubernetes Security Overview.mp4 34MB
  30. 05 Minimizing Microservice Vulnerabilities/014 Minimizing Microservice Vulnerabilities Review.mp4 33MB
  31. 06 Supply Chain Security/011 Scanning Images with an Admission Controller.mp4 31MB
  32. 06 Supply Chain Security/002 Minimizing Base Image Attack Surface.mp4 30MB
  33. 05 Minimizing Microservice Vulnerabilities/012 Understanding Pod-to-Pod mTLS.mp4 29MB
  34. 05 Minimizing Microservice Vulnerabilities/009 Understanding Container Runtime Sandboxes.mp4 29MB
  35. 07 Monitoring Logging and Runtime Security/007 Understanding Audit Logs.mp4 27MB
  36. 07 Monitoring Logging and Runtime Security/002 Understanding Behavioral Analytics.mp4 27MB
  37. 05 Minimizing Microservice Vulnerabilities/002 Managing Container Access with Security Contexts.mp4 26MB
  38. 03 Cluster Hardening/002 Exploring Service Accounts.mp4 26MB
  39. 06 Supply Chain Security/004 Validating Signed Images.mp4 25MB
  40. 07 Monitoring Logging and Runtime Security/010 Monitoring Logging and Runtime Security Review.mp4 24MB
  41. 04 System Hardening/005 Exploring AppArmor.mp4 24MB
  42. 06 Supply Chain Security/007 Analyzing Resource YAML Files.mp4 23MB
  43. 02 Cluster Setup/010 Securing Node Endpoints.mp4 23MB
  44. 04 System Hardening/003 Minimizing IAM Roles.mp4 23MB
  45. 02 Cluster Setup/014 Cluster Setup Review.mp4 22MB
  46. 03 Cluster Hardening/006 Keeping k8s Updated.mp4 22MB
  47. 04 System Hardening/004 Exploring Network-Level Security.mp4 21MB
  48. 03 Cluster Hardening/005 Restricting Access to the Kubernetes API.mp4 20MB
  49. 04 System Hardening/008 System Hardening Review.mp4 18MB
  50. 09 Conclusion/002 Conclusion and Whats Next.mp4 16MB
  51. 01 Introduction/003 CKS Exam Updates 1.20.mp4 14MB
  52. 02 Cluster Setup/011 Securing GUI Elements.mp4 13MB
  53. 03 Cluster Hardening/007 Cluster Hardening Review.mp4 12MB
  54. 05 Minimizing Microservice Vulnerabilities/001 Minimizing Microservice Vulnerabilities Intro.mp4 9MB
  55. 06 Supply Chain Security/001 Supply Chain Security Intro.mp4 8MB
  56. 09 Conclusion/001 Course Summary.mp4 8MB
  57. 02 Cluster Setup/001 Cluster Setup Intro.mp4 8MB
  58. 07 Monitoring Logging and Runtime Security/001 Monitoring Logging and Runtime Security Intro.mp4 5MB
  59. 04 System Hardening/001 System Hardening Intro.mp4 5MB
  60. 03 Cluster Hardening/001 Cluster Hardening Intro.mp4 4MB
  61. 01 Introduction/002 CKS Study Guide.pdf 276KB
  62. 05 Minimizing Microservice Vulnerabilities/010 Lesson Reference.pdf 120KB
  63. 05 Minimizing Microservice Vulnerabilities/006 Lesson Reference.pdf 108KB
  64. 04 System Hardening/006 Lesson Reference.pdf 108KB
  65. 04 System Hardening/006 AppArmor in k8s.pdf 107KB
  66. 06 Supply Chain Security/003 Lesson Reference.pdf 105KB
  67. 05 Minimizing Microservice Vulnerabilities/004 Lesson Reference.pdf 104KB
  68. 06 Supply Chain Security/013 Lesson Reference.pdf 103KB
  69. 07 Monitoring Logging and Runtime Security/003 Lesson Reference.pdf 100KB
  70. 05 Minimizing Microservice Vulnerabilities/007 Lesson Reference.pdf 96KB
  71. 06 Supply Chain Security/012 Lesson Reference.pdf 94KB
  72. 01 Introduction/004 Lesson Reference.pdf 93KB
  73. 02 Cluster Setup/002 Lesson Reference.pdf 92KB
  74. 04 System Hardening/003 IAM Roles for Amazon EC2.html 91KB
  75. 03 Cluster Hardening/003 Lesson Reference.pdf 91KB
  76. 02 Cluster Setup/006 Lesson Reference.pdf 90KB
  77. 05 Minimizing Microservice Vulnerabilities/013 Lesson Reference.pdf 89KB
  78. 07 Monitoring Logging and Runtime Security/005 Lesson Reference.pdf 87KB
  79. 02 Cluster Setup/008 Lesson Reference.pdf 84KB
  80. 06 Supply Chain Security/009 Lesson Reference.pdf 82KB
  81. 02 Cluster Setup/003 Lesson Reference.pdf 76KB
  82. 07 Monitoring Logging and Runtime Security/008 Lesson Reference.pdf 76KB
  83. 06 Supply Chain Security/005 Lesson Reference.pdf 75KB
  84. 06 Supply Chain Security/007 Lesson Reference.pdf 74KB
  85. 06 Supply Chain Security/004 Lesson Reference.pdf 72KB
  86. 02 Cluster Setup/005 Lesson Reference.pdf 72KB
  87. 05 Minimizing Microservice Vulnerabilities/002 Lesson Reference.pdf 71KB
  88. 02 Cluster Setup/012 Lesson Reference.pdf 68KB
  89. 06 Supply Chain Security/013 api-server-client.txt 222B
  90. 06 Supply Chain Security/004 Busybox 1.33.txt 163B
  91. 06 Supply Chain Security/007 Sample YAML File.txt 135B
  92. 06 Supply Chain Security/005 Sample Dockerfile.txt 115B
  93. 02 Cluster Setup/010 kubeadm - Required Ports.txt 109B
  94. 03 Cluster Hardening/003 deployment-viewer-pod Manifest.txt 108B
  95. 02 Cluster Setup/012 Install kubectl binary with curl on Linux.txt 105B
  96. 03 Cluster Hardening/003 pod-viewer-pod Manifest.txt 101B
  97. 05 Minimizing Microservice Vulnerabilities/002 API Reference - Container Security Context.txt 99B
  98. 06 Supply Chain Security/011 ImagePolicyWebhook Admission Controller.txt 99B
  99. 06 Supply Chain Security/012 ImagePolicyWebhook Admission Controller.txt 99B
  100. 06 Supply Chain Security/013 ImagePolicyWebhook Admission Controller.txt 99B
  101. 07 Monitoring Logging and Runtime Security/005 Container Security Context.txt 99B
  102. 05 Minimizing Microservice Vulnerabilities/003 PodSecurityPolicy Admission Controller.txt 98B
  103. 05 Minimizing Microservice Vulnerabilities/004 PodSecurityPolicy Admission Controller.txt 98B
  104. 05 Minimizing Microservice Vulnerabilities/002 API Reference - Pod Security Context.txt 97B
  105. 06 Supply Chain Security/013 imagepolicywebhook-ca.txt 96B
  106. 01 Introduction/004 Creating a cluster with kubeadm.txt 95B
  107. 04 System Hardening/002 Kubernetes API Reference - SecurityContext.txt 94B
  108. 05 Minimizing Microservice Vulnerabilities/003 PodSecurityPolicy Deprecation Past Present and Future.txt 94B
  109. 03 Cluster Hardening/003 Setup Manifest.txt 92B
  110. 04 System Hardening/003 AWs Docs - Security Best Practices in IAM.txt 92B
  111. 06 Supply Chain Security/003 Blog OPA Gatekeeper.txt 92B
  112. 07 Monitoring Logging and Runtime Security/008 Policy Configuration Reference.txt 92B
  113. 01 Introduction/004 Installing kubeadm.txt 88B
  114. 04 System Hardening/002 Kubernetes API Reference - PodSpec.txt 86B
  115. 03 Cluster Hardening/002 Configure Service Accounts for Pods.txt 85B
  116. 03 Cluster Hardening/003 Configure Service Accounts for Pods.txt 85B
  117. 03 Cluster Hardening/002 Managing Service Accounts.txt 81B
  118. 03 Cluster Hardening/003 Managing Service Accounts.txt 81B
  119. 02 Cluster Setup/011 Web UI (Dashboard).txt 79B
  120. 04 System Hardening/002 Security Context.txt 76B
  121. 05 Minimizing Microservice Vulnerabilities/002 Configure a Security Context for a Pod or Container.txt 76B
  122. 02 Cluster Setup/002 Network Policies.txt 75B
  123. 02 Cluster Setup/003 Network Policies.txt 75B
  124. 04 System Hardening/004 Cluster Networking.txt 72B
  125. 02 Cluster Setup/008 Ingress - TLS.txt 70B
  126. 07 Monitoring Logging and Runtime Security/007 Auditing.txt 67B
  127. 07 Monitoring Logging and Runtime Security/008 Auditing.txt 67B
  128. 03 Cluster Hardening/005 Controlling Access to the Kubernetes API.txt 66B
  129. 06 Supply Chain Security/009 Cloud Native Security - Container.txt 66B
  130. 06 Supply Chain Security/011 Cloud Native Security - Container.txt 66B
  131. 05 Minimizing Microservice Vulnerabilities/003 Pod Security Policies.txt 65B
  132. 05 Minimizing Microservice Vulnerabilities/004 Pod Security Policies.txt 65B
  133. 05 Minimizing Microservice Vulnerabilities/012 Manage TLS Certificates in a Cluster.txt 65B
  134. 05 Minimizing Microservice Vulnerabilities/013 Manage TLS Certificates in a Cluster.txt 65B
  135. 03 Cluster Hardening/002 Using RBAC Authorization.txt 63B
  136. 03 Cluster Hardening/003 Using RBAC Authorization.txt 63B
  137. 03 Cluster Hardening/006 Kubernetes version and version skew support policy.txt 63B
  138. 05 Minimizing Microservice Vulnerabilities/009 Runtime Class.txt 63B
  139. 05 Minimizing Microservice Vulnerabilities/010 Runtime Class.txt 63B
  140. 06 Supply Chain Security/012 Sample Webhook App Source Code.txt 63B
  141. 04 System Hardening/005 AppArmor Documentation.txt 60B
  142. 04 System Hardening/006 AppArmor Documentation.txt 60B
  143. 05 Minimizing Microservice Vulnerabilities/007 Secrets.txt 59B
  144. 06 Supply Chain Security/002 Images.txt 56B
  145. 06 Supply Chain Security/002 Overview of Cloud Native Security.txt 56B
  146. 06 Supply Chain Security/007 Overview of Cloud Native Security.txt 56B
  147. 05 Minimizing Microservice Vulnerabilities/012 Mutual Authentication (Wikipedia).txt 53B
  148. 06 Supply Chain Security/005 Dockerfile Reference.txt 51B
  149. 02 Cluster Setup/005 CIS Kubernetes Benchmark.txt 50B
  150. 02 Cluster Setup/006 CIS Kubernetes Benchmark.txt 50B
  151. 05 Minimizing Microservice Vulnerabilities/006 OPA Gatekeeper Docs.txt 49B
  152. 06 Supply Chain Security/003 OPA Gatekeeper - GitHub.txt 49B
  153. 02 Cluster Setup/005 kube-bench.txt 44B
  154. 02 Cluster Setup/006 kube-bench.txt 44B
  155. 07 Monitoring Logging and Runtime Security/003 Falco - formatting.txt 43B
  156. 06 Supply Chain Security/009 Trivy Documentation.txt 39B
  157. 05 Minimizing Microservice Vulnerabilities/009 Kata Containers Docs.txt 33B
  158. 05 Minimizing Microservice Vulnerabilities/009 gVisor Docs.txt 26B
  159. 05 Minimizing Microservice Vulnerabilities/010 gVisor Docs.txt 26B
  160. 07 Monitoring Logging and Runtime Security/003 Sysdig.txt 26B
  161. 07 Monitoring Logging and Runtime Security/002 Falco.txt 25B
  162. 07 Monitoring Logging and Runtime Security/003 Falco.txt 25B