Acloudguru - Certified Kubernetes Security Specialist (CKS) 收录时间:2023-06-18 05:59:41 文件大小:2GB 下载次数:1 最近下载:2023-06-18 05:59:41 磁力链接: magnet:?xt=urn:btih:73c50f0fbcadd6ee1690dab58f7fd54e87a72681 立即下载 复制链接 文件列表 07 Monitoring Logging and Runtime Security/008 Setting up Audit Logging.mp4 117MB 05 Minimizing Microservice Vulnerabilities/010 Creating a Container Runtime Sandbox.mp4 114MB 01 Introduction/001 Study Guide PDF.pdf 97MB 02 Cluster Setup/005 Running a CIS Benchmark with kube-bench.mp4 79MB 07 Monitoring Logging and Runtime Security/003 Analyzing Container Behavior with Falco.mp4 79MB 02 Cluster Setup/006 Fixing Security Issues Detected by a CIS Benchmark.mp4 77MB 06 Supply Chain Security/013 Configuring the ImagePolicyWebhook Admission Controller.mp4 77MB 05 Minimizing Microservice Vulnerabilities/004 Using Pod Security Policies.mp4 68MB 02 Cluster Setup/008 Implementing TLS with Ingress.mp4 65MB 05 Minimizing Microservice Vulnerabilities/006 Using OPA Gatekeeper.mp4 64MB 06 Supply Chain Security/009 Scanning Images for Known Vulnerabilities.mp4 63MB 03 Cluster Hardening/003 Restricting Service Account Permissions.mp4 62MB 07 Monitoring Logging and Runtime Security/005 Ensuring Containers are Immutable.mp4 60MB 01 Introduction/004 Building a Kubernetes Cluster.mp4 59MB 01 Introduction/001 Course Introduction.mp4 57MB 05 Minimizing Microservice Vulnerabilities/013 Signing Certificates.mp4 54MB 02 Cluster Setup/003 Allowing Limited Access with NetworkPolicies.mp4 52MB 05 Minimizing Microservice Vulnerabilities/003 Governing Pod Configurations with Pod Security Policies.mp4 50MB 02 Cluster Setup/002 Restricting Default Access with NetworkPolicies.mp4 46MB 05 Minimizing Microservice Vulnerabilities/007 Managing Kubernetes Secrets.mp4 45MB 04 System Hardening/002 Understanding Host OS Security Concerns.mp4 45MB 04 System Hardening/006 Using AppArmor in k8s Containers.mp4 42MB 06 Supply Chain Security/003 Whitelisting Allowed Image Registries.mp4 42MB 06 Supply Chain Security/012 Setting up an Image Scanner.mp4 41MB 01 Introduction/002 About the Exam.mp4 40MB 06 Supply Chain Security/015 Supply Chain Security Review.mp4 37MB 06 Supply Chain Security/005 Analyzing a Dockerfile.mp4 36MB 02 Cluster Setup/012 Verifying Kubernetes Platform Binaries.mp4 35MB 01 Introduction/005 Kubernetes Security Overview.mp4 34MB 05 Minimizing Microservice Vulnerabilities/014 Minimizing Microservice Vulnerabilities Review.mp4 33MB 06 Supply Chain Security/011 Scanning Images with an Admission Controller.mp4 31MB 06 Supply Chain Security/002 Minimizing Base Image Attack Surface.mp4 30MB 05 Minimizing Microservice Vulnerabilities/012 Understanding Pod-to-Pod mTLS.mp4 29MB 05 Minimizing Microservice Vulnerabilities/009 Understanding Container Runtime Sandboxes.mp4 29MB 07 Monitoring Logging and Runtime Security/007 Understanding Audit Logs.mp4 27MB 07 Monitoring Logging and Runtime Security/002 Understanding Behavioral Analytics.mp4 27MB 05 Minimizing Microservice Vulnerabilities/002 Managing Container Access with Security Contexts.mp4 26MB 03 Cluster Hardening/002 Exploring Service Accounts.mp4 26MB 06 Supply Chain Security/004 Validating Signed Images.mp4 25MB 07 Monitoring Logging and Runtime Security/010 Monitoring Logging and Runtime Security Review.mp4 24MB 04 System Hardening/005 Exploring AppArmor.mp4 24MB 06 Supply Chain Security/007 Analyzing Resource YAML Files.mp4 23MB 02 Cluster Setup/010 Securing Node Endpoints.mp4 23MB 04 System Hardening/003 Minimizing IAM Roles.mp4 23MB 02 Cluster Setup/014 Cluster Setup Review.mp4 22MB 03 Cluster Hardening/006 Keeping k8s Updated.mp4 22MB 04 System Hardening/004 Exploring Network-Level Security.mp4 21MB 03 Cluster Hardening/005 Restricting Access to the Kubernetes API.mp4 20MB 04 System Hardening/008 System Hardening Review.mp4 18MB 09 Conclusion/002 Conclusion and Whats Next.mp4 16MB 01 Introduction/003 CKS Exam Updates 1.20.mp4 14MB 02 Cluster Setup/011 Securing GUI Elements.mp4 13MB 03 Cluster Hardening/007 Cluster Hardening Review.mp4 12MB 05 Minimizing Microservice Vulnerabilities/001 Minimizing Microservice Vulnerabilities Intro.mp4 9MB 06 Supply Chain Security/001 Supply Chain Security Intro.mp4 8MB 09 Conclusion/001 Course Summary.mp4 8MB 02 Cluster Setup/001 Cluster Setup Intro.mp4 8MB 07 Monitoring Logging and Runtime Security/001 Monitoring Logging and Runtime Security Intro.mp4 5MB 04 System Hardening/001 System Hardening Intro.mp4 5MB 03 Cluster Hardening/001 Cluster Hardening Intro.mp4 4MB 01 Introduction/002 CKS Study Guide.pdf 276KB 05 Minimizing Microservice Vulnerabilities/010 Lesson Reference.pdf 120KB 05 Minimizing Microservice Vulnerabilities/006 Lesson Reference.pdf 108KB 04 System Hardening/006 Lesson Reference.pdf 108KB 04 System Hardening/006 AppArmor in k8s.pdf 107KB 06 Supply Chain Security/003 Lesson Reference.pdf 105KB 05 Minimizing Microservice Vulnerabilities/004 Lesson Reference.pdf 104KB 06 Supply Chain Security/013 Lesson Reference.pdf 103KB 07 Monitoring Logging and Runtime Security/003 Lesson Reference.pdf 100KB 05 Minimizing Microservice Vulnerabilities/007 Lesson Reference.pdf 96KB 06 Supply Chain Security/012 Lesson Reference.pdf 94KB 01 Introduction/004 Lesson Reference.pdf 93KB 02 Cluster Setup/002 Lesson Reference.pdf 92KB 04 System Hardening/003 IAM Roles for Amazon EC2.html 91KB 03 Cluster Hardening/003 Lesson Reference.pdf 91KB 02 Cluster Setup/006 Lesson Reference.pdf 90KB 05 Minimizing Microservice Vulnerabilities/013 Lesson Reference.pdf 89KB 07 Monitoring Logging and Runtime Security/005 Lesson Reference.pdf 87KB 02 Cluster Setup/008 Lesson Reference.pdf 84KB 06 Supply Chain Security/009 Lesson Reference.pdf 82KB 02 Cluster Setup/003 Lesson Reference.pdf 76KB 07 Monitoring Logging and Runtime Security/008 Lesson Reference.pdf 76KB 06 Supply Chain Security/005 Lesson Reference.pdf 75KB 06 Supply Chain Security/007 Lesson Reference.pdf 74KB 06 Supply Chain Security/004 Lesson Reference.pdf 72KB 02 Cluster Setup/005 Lesson Reference.pdf 72KB 05 Minimizing Microservice Vulnerabilities/002 Lesson Reference.pdf 71KB 02 Cluster Setup/012 Lesson Reference.pdf 68KB 06 Supply Chain Security/013 api-server-client.txt 222B 06 Supply Chain Security/004 Busybox 1.33.txt 163B 06 Supply Chain Security/007 Sample YAML File.txt 135B 06 Supply Chain Security/005 Sample Dockerfile.txt 115B 02 Cluster Setup/010 kubeadm - Required Ports.txt 109B 03 Cluster Hardening/003 deployment-viewer-pod Manifest.txt 108B 02 Cluster Setup/012 Install kubectl binary with curl on Linux.txt 105B 03 Cluster Hardening/003 pod-viewer-pod Manifest.txt 101B 05 Minimizing Microservice Vulnerabilities/002 API Reference - Container Security Context.txt 99B 06 Supply Chain Security/011 ImagePolicyWebhook Admission Controller.txt 99B 06 Supply Chain Security/012 ImagePolicyWebhook Admission Controller.txt 99B 06 Supply Chain Security/013 ImagePolicyWebhook Admission Controller.txt 99B 07 Monitoring Logging and Runtime Security/005 Container Security Context.txt 99B 05 Minimizing Microservice Vulnerabilities/003 PodSecurityPolicy Admission Controller.txt 98B 05 Minimizing Microservice Vulnerabilities/004 PodSecurityPolicy Admission Controller.txt 98B 05 Minimizing Microservice Vulnerabilities/002 API Reference - Pod Security Context.txt 97B 06 Supply Chain Security/013 imagepolicywebhook-ca.txt 96B 01 Introduction/004 Creating a cluster with kubeadm.txt 95B 04 System Hardening/002 Kubernetes API Reference - SecurityContext.txt 94B 05 Minimizing Microservice Vulnerabilities/003 PodSecurityPolicy Deprecation Past Present and Future.txt 94B 03 Cluster Hardening/003 Setup Manifest.txt 92B 04 System Hardening/003 AWs Docs - Security Best Practices in IAM.txt 92B 06 Supply Chain Security/003 Blog OPA Gatekeeper.txt 92B 07 Monitoring Logging and Runtime Security/008 Policy Configuration Reference.txt 92B 01 Introduction/004 Installing kubeadm.txt 88B 04 System Hardening/002 Kubernetes API Reference - PodSpec.txt 86B 03 Cluster Hardening/002 Configure Service Accounts for Pods.txt 85B 03 Cluster Hardening/003 Configure Service Accounts for Pods.txt 85B 03 Cluster Hardening/002 Managing Service Accounts.txt 81B 03 Cluster Hardening/003 Managing Service Accounts.txt 81B 02 Cluster Setup/011 Web UI (Dashboard).txt 79B 04 System Hardening/002 Security Context.txt 76B 05 Minimizing Microservice Vulnerabilities/002 Configure a Security Context for a Pod or Container.txt 76B 02 Cluster Setup/002 Network Policies.txt 75B 02 Cluster Setup/003 Network Policies.txt 75B 04 System Hardening/004 Cluster Networking.txt 72B 02 Cluster Setup/008 Ingress - TLS.txt 70B 07 Monitoring Logging and Runtime Security/007 Auditing.txt 67B 07 Monitoring Logging and Runtime Security/008 Auditing.txt 67B 03 Cluster Hardening/005 Controlling Access to the Kubernetes API.txt 66B 06 Supply Chain Security/009 Cloud Native Security - Container.txt 66B 06 Supply Chain Security/011 Cloud Native Security - Container.txt 66B 05 Minimizing Microservice Vulnerabilities/003 Pod Security Policies.txt 65B 05 Minimizing Microservice Vulnerabilities/004 Pod Security Policies.txt 65B 05 Minimizing Microservice Vulnerabilities/012 Manage TLS Certificates in a Cluster.txt 65B 05 Minimizing Microservice Vulnerabilities/013 Manage TLS Certificates in a Cluster.txt 65B 03 Cluster Hardening/002 Using RBAC Authorization.txt 63B 03 Cluster Hardening/003 Using RBAC Authorization.txt 63B 03 Cluster Hardening/006 Kubernetes version and version skew support policy.txt 63B 05 Minimizing Microservice Vulnerabilities/009 Runtime Class.txt 63B 05 Minimizing Microservice Vulnerabilities/010 Runtime Class.txt 63B 06 Supply Chain Security/012 Sample Webhook App Source Code.txt 63B 04 System Hardening/005 AppArmor Documentation.txt 60B 04 System Hardening/006 AppArmor Documentation.txt 60B 05 Minimizing Microservice Vulnerabilities/007 Secrets.txt 59B 06 Supply Chain Security/002 Images.txt 56B 06 Supply Chain Security/002 Overview of Cloud Native Security.txt 56B 06 Supply Chain Security/007 Overview of Cloud Native Security.txt 56B 05 Minimizing Microservice Vulnerabilities/012 Mutual Authentication (Wikipedia).txt 53B 06 Supply Chain Security/005 Dockerfile Reference.txt 51B 02 Cluster Setup/005 CIS Kubernetes Benchmark.txt 50B 02 Cluster Setup/006 CIS Kubernetes Benchmark.txt 50B 05 Minimizing Microservice Vulnerabilities/006 OPA Gatekeeper Docs.txt 49B 06 Supply Chain Security/003 OPA Gatekeeper - GitHub.txt 49B 02 Cluster Setup/005 kube-bench.txt 44B 02 Cluster Setup/006 kube-bench.txt 44B 07 Monitoring Logging and Runtime Security/003 Falco - formatting.txt 43B 06 Supply Chain Security/009 Trivy Documentation.txt 39B 05 Minimizing Microservice Vulnerabilities/009 Kata Containers Docs.txt 33B 05 Minimizing Microservice Vulnerabilities/009 gVisor Docs.txt 26B 05 Minimizing Microservice Vulnerabilities/010 gVisor Docs.txt 26B 07 Monitoring Logging and Runtime Security/003 Sysdig.txt 26B 07 Monitoring Logging and Runtime Security/002 Falco.txt 25B 07 Monitoring Logging and Runtime Security/003 Falco.txt 25B