Udemy - Certified Kubernetes Security Specialist 2023 收录时间:2023-08-26 05:10:19 文件大小:5GB 下载次数:1 最近下载:2023-08-26 05:10:19 磁力链接: magnet:?xt=urn:btih:76755633d97e7eca35b3f1e2cff612169d9e165a 立即下载 复制链接 文件列表 7 - Domain 6 Monitoring Logging and Runtime Security/80 - Audit Logging InDetail.mp4 329MB 2 - Domain 1 Cluster Setup/13 - Revising SSLTLS.mp4 298MB 7 - Domain 6 Monitoring Logging and Runtime Security/77 - Introduction to Sysdig.mp4 190MB 2 - Domain 1 Cluster Setup/33 - Kubelet Security.mp4 155MB 2 - Domain 1 Cluster Setup/10 - ETCD Security Guidelines.mp4 155MB 3 - Domain 2 Cluster Hardening/45 - Upgrading kudeadm Clusters.mp4 152MB 7 - Domain 6 Monitoring Logging and Runtime Security/78 - Creating Custom Falco Rules.mp4 146MB 2 - Domain 1 Cluster Setup/15 - InTransit Encryption with HTTPS.mp4 126MB 3 - Domain 2 Cluster Hardening/37 - Role Based Access Controls RBAC.mp4 118MB 2 - Domain 1 Cluster Setup/12 - Understanding Asymmetric Key Encryption.mp4 115MB 3 - Domain 2 Cluster Hardening/36 - Creating User for RBAC.mp4 114MB 3 - Domain 2 Cluster Hardening/40 - Understanding Ingress Resource and Ingress Controllers.mp4 112MB 5 - Domain 4 System Hardening/65 - Implementing RunTimeClass gVisor.mp4 110MB 4 - Domain 3 Minimize Microservice Vulnerabilities/47 - Admission Controllers.mp4 102MB 5 - Domain 4 System Hardening/68 - Understanding Network Policies Part 02.mp4 101MB 6 - Domain 5 Supply Chain Security/73 - Scanning K8s Clusters for Security Best Practices.mp4 98MB 2 - Domain 1 Cluster Setup/5 - Overview of CIS Benchmarks for Hardening.mp4 98MB 5 - Domain 4 System Hardening/59 - Overview of AppArmor.mp4 98MB 3 - Domain 2 Cluster Hardening/44 - Service Account Security.mp4 94MB 3 - Domain 2 Cluster Hardening/43 - Overview of Service Accounts.mp4 91MB 3 - Domain 2 Cluster Hardening/42 - Ingress Security.mp4 88MB 5 - Domain 4 System Hardening/64 - Overview of Container Runtime Sandboxes.mp4 88MB 4 - Domain 3 Minimize Microservice Vulnerabilities/55 - Custom WebHook Integration with Admission Controller.mp4 86MB 4 - Domain 3 Minimize Microservice Vulnerabilities/51 - Hack Misconfigured Cluster.mp4 85MB 2 - Domain 1 Cluster Setup/6 - Kubernetes CIS Benchmarks.mp4 84MB 4 - Domain 3 Minimize Microservice Vulnerabilities/56 - Overview of Kubernetes Secrets.mp4 83MB 2 - Domain 1 Cluster Setup/20 - Configuring API Server.mp4 81MB 2 - Domain 1 Cluster Setup/19 - API Server Security Guidelines.mp4 80MB 2 - Domain 1 Cluster Setup/29 - Encryption Provider.mp4 80MB 5 - Domain 4 System Hardening/67 - Understanding Network Policies Part 01.mp4 72MB 7 - Domain 6 Monitoring Logging and Runtime Security/76 - Overview of Falco.mp4 70MB 7 - Domain 6 Monitoring Logging and Runtime Security/79 - Falco Rule Writing Exam Perspective.mp4 70MB 2 - Domain 1 Cluster Setup/21 - Transport Security for API Server.mp4 66MB 5 - Domain 4 System Hardening/63 - Container Runtime Interface.mp4 63MB 6 - Domain 5 Supply Chain Security/72 - Scan images for known vulnerabilities.mp4 63MB 6 - Domain 5 Supply Chain Security/70 - Vulnerability Exploit and Payload.mp4 63MB 5 - Domain 4 System Hardening/61 - OCI and Container Runtimes.mp4 62MB 2 - Domain 1 Cluster Setup/30 - Implementing Auditing.mp4 60MB 2 - Domain 1 Cluster Setup/17 - Client Authentication in ETCD.mp4 59MB 4 - Domain 3 Minimize Microservice Vulnerabilities/48 - Security Contexts.mp4 58MB 4 - Domain 3 Minimize Microservice Vulnerabilities/52 - ImagePullPolicy in Kubernetes.mp4 58MB 2 - Domain 1 Cluster Setup/23 - Static Token File Authentication.mp4 58MB 2 - Domain 1 Cluster Setup/31 - Setting up kubeadm cluster.mp4 56MB 2 - Domain 1 Cluster Setup/28 - Authorization.mp4 53MB 2 - Domain 1 Cluster Setup/14 - Overview of Certificate Authority.mp4 53MB 3 - Domain 2 Cluster Hardening/41 - Creating Ingress and Ingress Controller.mp4 51MB 6 - Domain 5 Supply Chain Security/74 - Overview of Static Analysis.mp4 51MB 5 - Domain 4 System Hardening/62 - Configuring containerd and runc.mp4 48MB 2 - Domain 1 Cluster Setup/22 - Access Control.mp4 45MB 4 - Domain 3 Minimize Microservice Vulnerabilities/53 - Admission Controller AlwaysPullImages.mp4 45MB 2 - Domain 1 Cluster Setup/9 - Creating Infrastructure for Labs.mp4 44MB 4 - Domain 3 Minimize Microservice Vulnerabilities/49 - Revising Privileged Container.mp4 44MB 3 - Domain 2 Cluster Hardening/39 - Revising Ingress.mp4 44MB 3 - Domain 2 Cluster Hardening/38 - ClusterRole and ClusterRoleBinding.mp4 40MB 6 - Domain 5 Supply Chain Security/71 - Container Security Scanning.mp4 38MB 2 - Domain 1 Cluster Setup/18 - Integrating Systemd with ETCD.mp4 38MB 4 - Domain 3 Minimize Microservice Vulnerabilities/57 - Mounting Secrets in Pods.mp4 37MB 4 - Domain 3 Minimize Microservice Vulnerabilities/50 - Running Privileged PODS in Kubernetes.mp4 34MB 8 - Exam Preparation Section/84 - Overview of CKS Exams.mp4 33MB 2 - Domain 1 Cluster Setup/11 - Configuring ETCD Binaries.mp4 32MB 4 - Domain 3 Minimize Microservice Vulnerabilities/54 - Admission Controller ImagePolicyWebhook.mp4 32MB 2 - Domain 1 Cluster Setup/34 - Verifying Platform Binaries.mp4 31MB 2 - Domain 1 Cluster Setup/24 - Downsides of Static Token File Authentication.mp4 30MB 1 - Introduction/1 - Introduction to the Course.mp4 28MB 2 - Domain 1 Cluster Setup/16 - Overview of Certificate Based Authentication.mp4 28MB 2 - Domain 1 Cluster Setup/26 - Downsides of X509 Client Authentication.mp4 27MB 8 - Exam Preparation Section/85 - Important Pointers for Exams Part 01.mp4 26MB 2 - Domain 1 Cluster Setup/7 - Our Lab Architecture.mp4 22MB 5 - Domain 4 System Hardening/60 - Integration of AppArmor with Kubernetes.mp4 22MB 1 - Introduction/2 - Course Lecture Format.mp4 22MB 2 - Domain 1 Cluster Setup/27 - Overview of OIDC Authentication.mp4 20MB 2 - Domain 1 Cluster Setup/25 - Implementing X509 Client Authentication.mp4 19MB 5 - Domain 4 System Hardening/66 - Kubeadm and Calcio.mp4 18MB 2 - Domain 1 Cluster Setup/32 - Revising Taints and Tolerations.mp4 17MB 8 - Exam Preparation Section/86 - Important Pointers for Exams Part 02.mp4 8MB 7 - Domain 6 Monitoring Logging and Runtime Security/81 - Immutability at Container Runtime.mp4 8MB 7 - Domain 6 Monitoring Logging and Runtime Security/80 - Audit Logging InDetail English.vtt 28KB 5 - Domain 4 System Hardening/67 - Understanding Network Policies Part 01 English.vtt 24KB 2 - Domain 1 Cluster Setup/13 - Revising SSLTLS English.vtt 20KB 4 - Domain 3 Minimize Microservice Vulnerabilities/56 - Overview of Kubernetes Secrets English.vtt 18KB 2 - Domain 1 Cluster Setup/15 - InTransit Encryption with HTTPS English.vtt 16KB 3 - Domain 2 Cluster Hardening/37 - Role Based Access Controls RBAC English.vtt 16KB 5 - Domain 4 System Hardening/59 - Overview of AppArmor English.vtt 16KB 4 - Domain 3 Minimize Microservice Vulnerabilities/47 - Admission Controllers English.vtt 15KB 7 - Domain 6 Monitoring Logging and Runtime Security/78 - Creating Custom Falco Rules English.vtt 15KB 2 - Domain 1 Cluster Setup/33 - Kubelet Security English.vtt 15KB 7 - Domain 6 Monitoring Logging and Runtime Security/77 - Introduction to Sysdig English.vtt 15KB 5 - Domain 4 System Hardening/68 - Understanding Network Policies Part 02 English.vtt 14KB 2 - Domain 1 Cluster Setup/10 - ETCD Security Guidelines English.vtt 14KB 2 - Domain 1 Cluster Setup/29 - Encryption Provider English.vtt 13KB 3 - Domain 2 Cluster Hardening/36 - Creating User for RBAC English.vtt 13KB 3 - Domain 2 Cluster Hardening/45 - Upgrading kudeadm Clusters English.vtt 13KB 2 - Domain 1 Cluster Setup/12 - Understanding Asymmetric Key Encryption English.vtt 13KB 3 - Domain 2 Cluster Hardening/40 - Understanding Ingress Resource and Ingress Controllers English.vtt 13KB 2 - Domain 1 Cluster Setup/5 - Overview of CIS Benchmarks for Hardening English.vtt 12KB 4 - Domain 3 Minimize Microservice Vulnerabilities/48 - Security Contexts English.vtt 12KB 3 - Domain 2 Cluster Hardening/44 - Service Account Security English.vtt 12KB 5 - Domain 4 System Hardening/61 - OCI and Container Runtimes English.vtt 12KB 3 - Domain 2 Cluster Hardening/43 - Overview of Service Accounts English.vtt 12KB 5 - Domain 4 System Hardening/65 - Implementing RunTimeClass gVisor English.vtt 11KB 4 - Domain 3 Minimize Microservice Vulnerabilities/55 - Custom WebHook Integration with Admission Controller English.vtt 11KB 4 - Domain 3 Minimize Microservice Vulnerabilities/51 - Hack Misconfigured Cluster English.vtt 11KB 3 - Domain 2 Cluster Hardening/39 - Revising Ingress English.vtt 11KB 8 - Exam Preparation Section/85 - Important Pointers for Exams Part 01 English.vtt 10KB 2 - Domain 1 Cluster Setup/28 - Authorization English.vtt 10KB 5 - Domain 4 System Hardening/62 - Configuring containerd and runc English.vtt 10KB 2 - Domain 1 Cluster Setup/30 - Implementing Auditing English.vtt 10KB 5 - Domain 4 System Hardening/64 - Overview of Container Runtime Sandboxes English.vtt 9KB 2 - Domain 1 Cluster Setup/20 - Configuring API Server English.vtt 9KB 3 - Domain 2 Cluster Hardening/38 - ClusterRole and ClusterRoleBinding English.vtt 9KB 7 - Domain 6 Monitoring Logging and Runtime Security/76 - Overview of Falco English.vtt 9KB 3 - Domain 2 Cluster Hardening/42 - Ingress Security English.vtt 9KB 2 - Domain 1 Cluster Setup/23 - Static Token File Authentication English.vtt 9KB 2 - Domain 1 Cluster Setup/21 - Transport Security for API Server English.vtt 9KB 2 - Domain 1 Cluster Setup/31 - Setting up kubeadm cluster English.vtt 8KB 4 - Domain 3 Minimize Microservice Vulnerabilities/49 - Revising Privileged Container English.vtt 8KB 2 - Domain 1 Cluster Setup/17 - Client Authentication in ETCD English.vtt 8KB 2 - Domain 1 Cluster Setup/19 - API Server Security Guidelines English.vtt 8KB 3 - Domain 2 Cluster Hardening/41 - Creating Ingress and Ingress Controller English.vtt 8KB 8 - Exam Preparation Section/84 - Overview of CKS Exams English.vtt 8KB 2 - Domain 1 Cluster Setup/6 - Kubernetes CIS Benchmarks English.vtt 8KB 2 - Domain 1 Cluster Setup/9 - Creating Infrastructure for Labs English.vtt 8KB 4 - Domain 3 Minimize Microservice Vulnerabilities/52 - ImagePullPolicy in Kubernetes English.vtt 8KB 6 - Domain 5 Supply Chain Security/70 - Vulnerability Exploit and Payload English.vtt 7KB 8 - Exam Preparation Section/88 - Exam Preparation Practice Tests.html 7KB 2 - Domain 1 Cluster Setup/7 - Our Lab Architecture English.vtt 7KB 4 - Domain 3 Minimize Microservice Vulnerabilities/57 - Mounting Secrets in Pods English.vtt 7KB 2 - Domain 1 Cluster Setup/14 - Overview of Certificate Authority English.vtt 7KB 7 - Domain 6 Monitoring Logging and Runtime Security/79 - Falco Rule Writing Exam Perspective English.vtt 7KB 4 - Domain 3 Minimize Microservice Vulnerabilities/53 - Admission Controller AlwaysPullImages English.vtt 7KB 2 - Domain 1 Cluster Setup/22 - Access Control English.vtt 7KB 6 - Domain 5 Supply Chain Security/73 - Scanning K8s Clusters for Security Best Practices English.vtt 6KB 5 - Domain 4 System Hardening/60 - Integration of AppArmor with Kubernetes English.vtt 6KB 5 - Domain 4 System Hardening/63 - Container Runtime Interface English.vtt 6KB 4 - Domain 3 Minimize Microservice Vulnerabilities/50 - Running Privileged PODS in Kubernetes English.vtt 6KB 6 - Domain 5 Supply Chain Security/71 - Container Security Scanning English.vtt 6KB 6 - Domain 5 Supply Chain Security/74 - Overview of Static Analysis English.vtt 6KB 2 - Domain 1 Cluster Setup/27 - Overview of OIDC Authentication English.vtt 6KB 2 - Domain 1 Cluster Setup/32 - Revising Taints and Tolerations English.vtt 6KB 8 - Exam Preparation Section/89 - Practice Test Solution Part 01.html 6KB 2 - Domain 1 Cluster Setup/16 - Overview of Certificate Based Authentication English.vtt 6KB 2 - Domain 1 Cluster Setup/18 - Integrating Systemd with ETCD English.vtt 6KB 1 - Introduction/1 - Introduction to the Course English.vtt 5KB 1 - Introduction/2 - Course Lecture Format English.vtt 5KB 2 - Domain 1 Cluster Setup/25 - Implementing X509 Client Authentication English.vtt 5KB 2 - Domain 1 Cluster Setup/34 - Verifying Platform Binaries English.vtt 5KB 6 - Domain 5 Supply Chain Security/72 - Scan images for known vulnerabilities English.vtt 5KB 2 - Domain 1 Cluster Setup/24 - Downsides of Static Token File Authentication English.vtt 5KB 2 - Domain 1 Cluster Setup/11 - Configuring ETCD Binaries English.vtt 5KB 4 - Domain 3 Minimize Microservice Vulnerabilities/54 - Admission Controller ImagePolicyWebhook English.vtt 5KB 8 - Exam Preparation Section/90 - Practice Test Solution Part 02.html 5KB 2 - Domain 1 Cluster Setup/26 - Downsides of X509 Client Authentication English.vtt 4KB 8 - Exam Preparation Section/92 - Practice Test Solution Part 04.html 4KB 5 - Domain 4 System Hardening/66 - Kubeadm and Calcio English.vtt 4KB 8 - Exam Preparation Section/86 - Important Pointers for Exams Part 02 English.vtt 4KB 8 - Exam Preparation Section/91 - Practice Test Solution Part 03.html 3KB 7 - Domain 6 Monitoring Logging and Runtime Security/81 - Immutability at Container Runtime English.vtt 2KB 1 - Introduction/4 - Our Community.html 567B 8 - Exam Preparation Section/83 - Our Community.html 567B 2 - Domain 1 Cluster Setup/8 - Document Lecture.html 267B 2 - Domain 1 Cluster Setup/35 - Notes Cluster Setup.html 103B 3 - Domain 2 Cluster Hardening/46 - Notes Cluster Hardening.html 103B 4 - Domain 3 Minimize Microservice Vulnerabilities/58 - Notes Minimize Microservice Vulnerabilities.html 103B 5 - Domain 4 System Hardening/69 - Notes System Hardening.html 103B 6 - Domain 5 Supply Chain Security/75 - Notes Supply Chain Security.html 103B 7 - Domain 6 Monitoring Logging and Runtime Security/82 - Notes Monitoring Logging and Runtime Security.html 103B 8 - Exam Preparation Section/87 - Notes Exam Preparation Section.html 103B 1 - Introduction/3 - Document Link to Code Repository.html 75B