589689.xyz

Udemy - Kubernetes CKS 2022 Complete Course Theory Practice

  • 收录时间:2023-06-11 11:19:15
  • 文件大小:5GB
  • 下载次数:1
  • 最近下载:2023-06-11 11:19:15
  • 磁力链接:

文件列表

  1. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/98 - Practice Encrypt ETCD.mp4 222MB
  2. 27 - Runtime Security Auditing/181 - Practice Create advanced Audit Policy.mp4 162MB
  3. 12 - Cluster Hardening RBAC/64 - Practice CertificateSigningRequests.mp4 156MB
  4. 25 - Runtime Security Behavioral Analytics at host and container level/168 - Practice Change Falco Rule.mp4 142MB
  5. 2 - Create your course K8s cluster/8 - Practice Create Kubeadm Cluster in GCP.mp4 123MB
  6. 27 - Runtime Security Auditing/178 - Introduction.mp4 113MB
  7. 20 - Open Policy Agent OPA/129 - Practice Enforce Namespace Labels.mp4 110MB
  8. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/71 - Practice Pod uses custom ServiceAccount.mp4 108MB
  9. 25 - Runtime Security Behavioral Analytics at host and container level/163 - Practice Strace and proc on ETCD.mp4 104MB
  10. 14 - Cluster Hardening Restrict API Access/80 - Practice External Apiserver Access.mp4 101MB
  11. 20 - Open Policy Agent OPA/128 - Practice Deny All Policy.mp4 100MB
  12. 27 - Runtime Security Auditing/179 - Practice Enable Audit Logging in Apiserver.mp4 96MB
  13. 8 - Cluster Setup Secure Ingress/41 - Practice Secure an Ingress.mp4 94MB
  14. 24 - Supply Chain Security Secure Supply Chain/157 - Practice ImagePolicyWebhook.mp4 93MB
  15. 21 - Supply Chain Security Image Footprint/134 - Practice Reduce Image Footprint with MultiStage.mp4 79MB
  16. 14 - Cluster Hardening Restrict API Access/79 - Practice Manual API Request.mp4 78MB
  17. 15 - Cluster Hardening Upgrade Kubernetes/90 - Practice Upgrade controlplane node.mp4 77MB
  18. 12 - Cluster Hardening RBAC/62 - Practice ClusterRole and ClusterRoleBinding.mp4 76MB
  19. 29 - System Hardening Reduce Attack Surface/198 - Practice Investigate Linux Users.mp4 76MB
  20. 2 - Create your course K8s cluster/7 - Practice Configure gcloud command.mp4 75MB
  21. 25 - Runtime Security Behavioral Analytics at host and container level/166 - Practice Use Falco to find malicious processes.mp4 74MB
  22. 4 - Foundation Kubernetes Secure Architecture/16 - Practice Find various K8s certificates.mp4 74MB
  23. 11 - Cluster Setup Verify Platform Binaries/57 - Practice Verify apiserver binary running in our cluster.mp4 74MB
  24. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/110 - Practice Install and use gVisor.mp4 72MB
  25. 19 - Microservice Vulnerabilities mTLS/123 - Practice Create sidecar proxy.mp4 72MB
  26. 28 - System Hardening Kernel Hardening Tools/191 - Practice Seccomp for Kubernetes Nginx.mp4 72MB
  27. 21 - Supply Chain Security Image Footprint/135 - Practice Secure and harden Images.mp4 67MB
  28. 25 - Runtime Security Behavioral Analytics at host and container level/165 - Practice Falco and Installation.mp4 66MB
  29. 29 - System Hardening Reduce Attack Surface/196 - Practice Install and investigate Services.mp4 66MB
  30. 28 - System Hardening Kernel Hardening Tools/187 - Practice AppArmor for Docker Nginx.mp4 62MB
  31. 25 - Runtime Security Behavioral Analytics at host and container level/162 - Practice Strace.mp4 60MB
  32. 27 - Runtime Security Auditing/180 - Practice Create Secret and check Audit Logs.mp4 60MB
  33. 1 - Introduction/4 - K8s Security Best Practices.mp4 57MB
  34. 10 - Cluster Setup CIS Benchmarks/51 - Practice CIS in Action.mp4 56MB
  35. 23 - Supply Chain Security Image Vulnerability Scanning/150 - Practice Use Trivy to scan images.mp4 55MB
  36. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/96 - Practice Hack Secrets in ETCD.mp4 51MB
  37. 6 - Cluster Setup Network Policies/28 - Practice Frontend to Backend traffic.mp4 49MB
  38. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/94 - Practice Create Simple Secret Scenario.mp4 48MB
  39. 19 - Microservice Vulnerabilities mTLS/122 - Intro.mp4 47MB
  40. 14 - Cluster Hardening Restrict API Access/82 - Practice Verify NodeRestriction.mp4 45MB
  41. 10 - Cluster Setup CIS Benchmarks/52 - Practice kubebench.mp4 45MB
  42. 5 - Foundation Containers under the hood/18 - Intro.mp4 45MB
  43. 7 - Cluster Setup GUI Elements/35 - Practice Outside Insecure Access.mp4 45MB
  44. 28 - System Hardening Kernel Hardening Tools/188 - Practice AppArmor for Kubernetes Nginx.mp4 43MB
  45. 9 - Cluster Setup Node Metadata Protection/47 - Practice Protect Node Metadata via NetworkPolicy.mp4 43MB
  46. 2 - Create your course K8s cluster/6 - Practice Create GCP Account.mp4 43MB
  47. 20 - Open Policy Agent OPA/130 - Practice Enforce Deployment replica count.mp4 42MB
  48. 20 - Open Policy Agent OPA/127 - Practice Install OPA.mp4 42MB
  49. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/104 - Introduction.mp4 41MB
  50. 6 - Cluster Setup Network Policies/29 - Practice Backend to Database traffic.mp4 41MB
  51. 26 - Runtime Security Immutability of containers at runtime/175 - Practice SecurityContext renders container immutable.mp4 41MB
  52. 22 - Supply Chain Security Static Analysis/144 - Practice OPA Conftest for Dockerfile.mp4 41MB
  53. 22 - Supply Chain Security Static Analysis/141 - Practice Kubesec.mp4 40MB
  54. 24 - Supply Chain Security Secure Supply Chain/154 - Practice Image Digest.mp4 39MB
  55. 22 - Supply Chain Security Static Analysis/143 - Practice OPA Conftest for K8s YAML.mp4 38MB
  56. 18 - Microservice Vulnerabilities OS Level Security Domains/113 - Intro and Security Contexts.mp4 38MB
  57. 24 - Supply Chain Security Secure Supply Chain/155 - Practice Whitelist Registries with OPA.mp4 36MB
  58. 6 - Cluster Setup Network Policies/25 - Introduction 1.mp4 34MB
  59. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/72 - Practice Disable ServiceAccount mounting.mp4 33MB
  60. 4 - Foundation Kubernetes Secure Architecture/15 - Intro.mp4 32MB
  61. 28 - System Hardening Kernel Hardening Tools/186 - Practice AppArmor for curl.mp4 32MB
  62. 6 - Cluster Setup Network Policies/27 - Practice Default Deny.mp4 31MB
  63. 18 - Microservice Vulnerabilities OS Level Security Domains/114 - Practice Set Container User and Group.mp4 31MB
  64. 25 - Runtime Security Behavioral Analytics at host and container level/161 - Introduction.mp4 30MB
  65. 8 - Cluster Setup Secure Ingress/40 - Practice Create an Ingress.mp4 30MB
  66. 12 - Cluster Hardening RBAC/61 - Practice Role and Rolebinding.mp4 30MB
  67. 15 - Cluster Hardening Upgrade Kubernetes/89 - Practice Create outdated cluster.mp4 29MB
  68. 26 - Runtime Security Immutability of containers at runtime/174 - Practice StartupProbe changes container.mp4 28MB
  69. 20 - Open Policy Agent OPA/131 - Practice The Rego Playground and more examples.mp4 28MB
  70. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/109 - Practice Create and use RuntimeClasses.mp4 28MB
  71. 1 - Introduction/1 - Welcome.mp4 27MB
  72. 12 - Cluster Hardening RBAC/60 - Intro.mp4 27MB
  73. 25 - Runtime Security Behavioral Analytics at host and container level/164 - Practice proc and env variables.mp4 27MB
  74. 29 - System Hardening Reduce Attack Surface/195 - Practice Systemctl and Services.mp4 26MB
  75. 25 - Runtime Security Behavioral Analytics at host and container level/167 - Practice Investigate Falco rules.mp4 26MB
  76. 21 - Supply Chain Security Image Footprint/136 - Recap.mp4 25MB
  77. 23 - Supply Chain Security Image Vulnerability Scanning/148 - Introduction.mp4 25MB
  78. 6 - Cluster Setup Network Policies/26 - Introduction 2.mp4 24MB
  79. 2 - Create your course K8s cluster/5 - Cluster Specification.mp4 23MB
  80. 15 - Cluster Hardening Upgrade Kubernetes/87 - Introduction.mp4 23MB
  81. 15 - Cluster Hardening Upgrade Kubernetes/91 - Practice Upgrade node.mp4 22MB
  82. 7 - Cluster Setup GUI Elements/36 - Practice RBAC for the Dashboard.mp4 22MB
  83. 29 - System Hardening Reduce Attack Surface/197 - Practice Disable application listening on port.mp4 22MB
  84. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/105 - Practice Container calls Linux Kernel.mp4 21MB
  85. 29 - System Hardening Reduce Attack Surface/194 - Introduction.mp4 21MB
  86. 10 - Cluster Setup CIS Benchmarks/53 - Recap.mp4 21MB
  87. 14 - Cluster Hardening Restrict API Access/77 - Practice Anonymous Access.mp4 21MB
  88. 7 - Cluster Setup GUI Elements/33 - Introduction.mp4 21MB
  89. 22 - Supply Chain Security Static Analysis/139 - Introduction.mp4 20MB
  90. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/99 - Recap.mp4 20MB
  91. 11 - Cluster Setup Verify Platform Binaries/56 - Practice Download and verify K8s release.mp4 20MB
  92. 7 - Cluster Setup GUI Elements/37 - Recap.mp4 19MB
  93. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/95 - Practice Hack Secrets in Container Runtime.mp4 19MB
  94. 20 - Open Policy Agent OPA/126 - Introduction.mp4 18MB
  95. 14 - Cluster Hardening Restrict API Access/76 - Introduction.mp4 18MB
  96. 28 - System Hardening Kernel Hardening Tools/192 - Recap.mp4 18MB
  97. 24 - Supply Chain Security Secure Supply Chain/153 - Introduction.mp4 17MB
  98. 25 - Runtime Security Behavioral Analytics at host and container level/169 - Recap.mp4 17MB
  99. 5 - Foundation Containers under the hood/19 - Container Tools Introduction.mp4 16MB
  100. 14 - Cluster Hardening Restrict API Access/78 - Practice Insecure Access.mp4 16MB
  101. 28 - System Hardening Kernel Hardening Tools/190 - Practice Seccomp for Docker Nginx.mp4 16MB
  102. 21 - Supply Chain Security Image Footprint/133 - Introduction.mp4 15MB
  103. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/97 - ETCD Encryption.mp4 15MB
  104. 6 - Cluster Setup Network Policies/30 - Recap.mp4 14MB
  105. 18 - Microservice Vulnerabilities OS Level Security Domains/117 - Practice Create Privileged Containers.mp4 14MB
  106. 9 - Cluster Setup Node Metadata Protection/46 - Practice Access Node Metadata.mp4 13MB
  107. 5 - Foundation Containers under the hood/20 - Practice The PID Namespace.mp4 12MB
  108. 26 - Runtime Security Immutability of containers at runtime/173 - Ways to enforce immutability.mp4 12MB
  109. 7 - Cluster Setup GUI Elements/34 - Practice Install Dashboard.mp4 12MB
  110. 9 - Cluster Setup Node Metadata Protection/45 - Introduction.mp4 12MB
  111. 8 - Cluster Setup Secure Ingress/39 - Introduction.mp4 12MB
  112. 12 - Cluster Hardening RBAC/63 - Accounts and Users.mp4 12MB
  113. 28 - System Hardening Kernel Hardening Tools/189 - Seccomp.mp4 10MB
  114. 26 - Runtime Security Immutability of containers at runtime/172 - Introduction.mp4 10MB
  115. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/93 - Introduction.mp4 10MB
  116. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/106 - Open Container Initiative OCI.mp4 9MB
  117. 10 - Cluster Setup CIS Benchmarks/50 - Introduction.mp4 9MB
  118. 28 - System Hardening Kernel Hardening Tools/184 - Introduction.mp4 9MB
  119. 23 - Supply Chain Security Image Vulnerability Scanning/151 - Recap.mp4 9MB
  120. 22 - Supply Chain Security Static Analysis/140 - Kubesec.mp4 9MB
  121. 18 - Microservice Vulnerabilities OS Level Security Domains/115 - Practice Force Container NonRoot.mp4 8MB
  122. 2 - Create your course K8s cluster/10 - Notice Always stop your instances.mp4 8MB
  123. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/73 - Practice Limit ServiceAccounts using RBAC.mp4 8MB
  124. 28 - System Hardening Kernel Hardening Tools/185 - AppArmor.mp4 7MB
  125. 15 - Cluster Hardening Upgrade Kubernetes/92 - Recap.mp4 7MB
  126. 2 - Create your course K8s cluster/12 - Recap.mp4 7MB
  127. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/107 - Sandbox Runtime Katacontainers.mp4 6MB
  128. 12 - Cluster Hardening RBAC/65 - Recap.mp4 6MB
  129. 27 - Runtime Security Auditing/182 - Recap.mp4 6MB
  130. 18 - Microservice Vulnerabilities OS Level Security Domains/119 - Practice Disable PriviledgeEscalation.mp4 6MB
  131. 14 - Cluster Hardening Restrict API Access/81 - NodeRestriction AdmissionController.mp4 6MB
  132. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/108 - Sandbox Runtime gVisor.mp4 5MB
  133. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/70 - Intro.mp4 5MB
  134. 14 - Cluster Hardening Restrict API Access/83 - Recap.mp4 5MB
  135. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/74 - Recap.mp4 5MB
  136. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/111 - Recap.mp4 5MB
  137. 22 - Supply Chain Security Static Analysis/145 - Recap.mp4 5MB
  138. 1 - Introduction/2 - Best Video Quality.mp4 4MB
  139. 24 - Supply Chain Security Secure Supply Chain/156 - ImagePolicyWebhook.mp4 4MB
  140. 4 - Foundation Kubernetes Secure Architecture/17 - Recap.mp4 4MB
  141. 19 - Microservice Vulnerabilities mTLS/124 - Recap.mp4 4MB
  142. 20 - Open Policy Agent OPA/132 - Recap.mp4 4MB
  143. 29 - System Hardening Reduce Attack Surface/199 - Recap.mp4 4MB
  144. 18 - Microservice Vulnerabilities OS Level Security Domains/116 - Privileged Containers.mp4 4MB
  145. 5 - Foundation Containers under the hood/21 - Recap.mp4 4MB
  146. 11 - Cluster Setup Verify Platform Binaries/55 - Introduction.mp4 4MB
  147. 24 - Supply Chain Security Secure Supply Chain/158 - Recap.mp4 3MB
  148. 22 - Supply Chain Security Static Analysis/142 - OPA Conftest.mp4 3MB
  149. 6 - Cluster Setup Network Policies/24 - Cluster Reset.mp4 3MB
  150. 20 - Open Policy Agent OPA/125 - Cluster Reset.mp4 3MB
  151. 26 - Runtime Security Immutability of containers at runtime/176 - Recap.mp4 3MB
  152. 8 - Cluster Setup Secure Ingress/38 - K8s Docs in correct Version.mp4 3MB
  153. 2 - Create your course K8s cluster/9 - Practice Firewall rules for NodePorts.mp4 3MB
  154. 9 - Cluster Setup Node Metadata Protection/48 - Recap.mp4 3MB
  155. 18 - Microservice Vulnerabilities OS Level Security Domains/118 - PrivilegeEscalation.mp4 3MB
  156. 23 - Supply Chain Security Image Vulnerability Scanning/149 - Clair and Trivy.mp4 3MB
  157. 2 - Create your course K8s cluster/11 - Containerd Course Upgrade.mp4 2MB
  158. 3 - Killercoda Access/13 - How to get Access.mp4 2MB
  159. 8 - Cluster Setup Secure Ingress/42 - Recap.mp4 2MB
  160. 11 - Cluster Setup Verify Platform Binaries/58 - Recap.mp4 2MB
  161. 10 - Cluster Setup CIS Benchmarks/51 - CIS-Kubernetes-Benchmark-v1.6.0.pdf 1MB
  162. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/98 - Practice Encrypt ETCD English.vtt 19KB
  163. 4 - Foundation Kubernetes Secure Architecture/15 - Intro English.vtt 13KB
  164. 27 - Runtime Security Auditing/178 - Introduction English.vtt 13KB
  165. 1 - Introduction/4 - K8s Security Best Practices English.vtt 12KB
  166. 5 - Foundation Containers under the hood/18 - Intro English.vtt 11KB
  167. 20 - Open Policy Agent OPA/128 - Practice Deny All Policy English.vtt 11KB
  168. 12 - Cluster Hardening RBAC/60 - Intro English.vtt 11KB
  169. 24 - Supply Chain Security Secure Supply Chain/157 - Practice ImagePolicyWebhook English.vtt 10KB
  170. 20 - Open Policy Agent OPA/129 - Practice Enforce Namespace Labels English.vtt 10KB
  171. 12 - Cluster Hardening RBAC/64 - Practice CertificateSigningRequests English.vtt 10KB
  172. 2 - Create your course K8s cluster/8 - Practice Create Kubeadm Cluster in GCP English.vtt 10KB
  173. 21 - Supply Chain Security Image Footprint/135 - Practice Secure and harden Images English.vtt 10KB
  174. 19 - Microservice Vulnerabilities mTLS/122 - Intro English.vtt 9KB
  175. 25 - Runtime Security Behavioral Analytics at host and container level/168 - Practice Change Falco Rule English.vtt 9KB
  176. 27 - Runtime Security Auditing/181 - Practice Create advanced Audit Policy English.vtt 9KB
  177. 8 - Cluster Setup Secure Ingress/41 - Practice Secure an Ingress English.vtt 9KB
  178. 23 - Supply Chain Security Image Vulnerability Scanning/148 - Introduction English.vtt 9KB
  179. 22 - Supply Chain Security Static Analysis/139 - Introduction English.vtt 9KB
  180. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/71 - Practice Pod uses custom ServiceAccount English.vtt 8KB
  181. 25 - Runtime Security Behavioral Analytics at host and container level/163 - Practice Strace and proc on ETCD English.vtt 8KB
  182. 28 - System Hardening Kernel Hardening Tools/191 - Practice Seccomp for Kubernetes Nginx English.vtt 8KB
  183. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/104 - Introduction English.vtt 8KB
  184. 8 - Cluster Setup Secure Ingress/40 - Practice Create an Ingress English.vtt 8KB
  185. 15 - Cluster Hardening Upgrade Kubernetes/87 - Introduction English.vtt 8KB
  186. 21 - Supply Chain Security Image Footprint/134 - Practice Reduce Image Footprint with MultiStage English.vtt 7KB
  187. 4 - Foundation Kubernetes Secure Architecture/16 - Practice Find various K8s certificates English.vtt 7KB
  188. 10 - Cluster Setup CIS Benchmarks/51 - Practice CIS in Action English.vtt 7KB
  189. 28 - System Hardening Kernel Hardening Tools/186 - Practice AppArmor for curl English.vtt 7KB
  190. 14 - Cluster Hardening Restrict API Access/80 - Practice External Apiserver Access English.vtt 7KB
  191. 6 - Cluster Setup Network Policies/29 - Practice Backend to Database traffic English.vtt 7KB
  192. 20 - Open Policy Agent OPA/126 - Introduction English.vtt 7KB
  193. 28 - System Hardening Kernel Hardening Tools/187 - Practice AppArmor for Docker Nginx English.vtt 6KB
  194. 5 - Foundation Containers under the hood/19 - Container Tools Introduction English.vtt 6KB
  195. 6 - Cluster Setup Network Policies/28 - Practice Frontend to Backend traffic English.vtt 6KB
  196. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/97 - ETCD Encryption English.vtt 6KB
  197. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/95 - Practice Hack Secrets in Container Runtime English.vtt 6KB
  198. 29 - System Hardening Reduce Attack Surface/194 - Introduction English.vtt 6KB
  199. 25 - Runtime Security Behavioral Analytics at host and container level/166 - Practice Use Falco to find malicious processes English.vtt 6KB
  200. 26 - Runtime Security Immutability of containers at runtime/173 - Ways to enforce immutability English.vtt 6KB
  201. 28 - System Hardening Kernel Hardening Tools/188 - Practice AppArmor for Kubernetes Nginx English.vtt 6KB
  202. 27 - Runtime Security Auditing/179 - Practice Enable Audit Logging in Apiserver English.vtt 6KB
  203. 19 - Microservice Vulnerabilities mTLS/123 - Practice Create sidecar proxy English.vtt 6KB
  204. 21 - Supply Chain Security Image Footprint/133 - Introduction English.vtt 6KB
  205. 24 - Supply Chain Security Secure Supply Chain/155 - Practice Whitelist Registries with OPA English.vtt 6KB
  206. 6 - Cluster Setup Network Policies/26 - Introduction 2 English.vtt 6KB
  207. 25 - Runtime Security Behavioral Analytics at host and container level/167 - Practice Investigate Falco rules English.vtt 5KB
  208. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/99 - Recap English.vtt 5KB
  209. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/94 - Practice Create Simple Secret Scenario English.vtt 5KB
  210. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/110 - Practice Install and use gVisor English.vtt 5KB
  211. 29 - System Hardening Reduce Attack Surface/198 - Practice Investigate Linux Users English.vtt 5KB
  212. 14 - Cluster Hardening Restrict API Access/76 - Introduction English.vtt 5KB
  213. 25 - Runtime Security Behavioral Analytics at host and container level/164 - Practice proc and env variables English.vtt 5KB
  214. 11 - Cluster Setup Verify Platform Binaries/57 - Practice Verify apiserver binary running in our cluster English.vtt 5KB
  215. 12 - Cluster Hardening RBAC/63 - Accounts and Users English.vtt 5KB
  216. 29 - System Hardening Reduce Attack Surface/196 - Practice Install and investigate Services English.vtt 5KB
  217. 20 - Open Policy Agent OPA/131 - Practice The Rego Playground and more examples English.vtt 5KB
  218. 25 - Runtime Security Behavioral Analytics at host and container level/162 - Practice Strace English.vtt 5KB
  219. 7 - Cluster Setup GUI Elements/33 - Introduction English.vtt 5KB
  220. 7 - Cluster Setup GUI Elements/35 - Practice Outside Insecure Access English.vtt 5KB
  221. 15 - Cluster Hardening Upgrade Kubernetes/90 - Practice Upgrade controlplane node English.vtt 5KB
  222. 6 - Cluster Setup Network Policies/25 - Introduction 1 English.vtt 5KB
  223. 26 - Runtime Security Immutability of containers at runtime/175 - Practice SecurityContext renders container immutable English.vtt 5KB
  224. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/93 - Introduction English.vtt 5KB
  225. 12 - Cluster Hardening RBAC/61 - Practice Role and Rolebinding English.vtt 5KB
  226. 14 - Cluster Hardening Restrict API Access/78 - Practice Insecure Access English.vtt 5KB
  227. 25 - Runtime Security Behavioral Analytics at host and container level/165 - Practice Falco and Installation English.vtt 5KB
  228. 2 - Create your course K8s cluster/7 - Practice Configure gcloud command English.vtt 4KB
  229. 10 - Cluster Setup CIS Benchmarks/52 - Practice kubebench English.vtt 4KB
  230. 8 - Cluster Setup Secure Ingress/39 - Introduction English.vtt 4KB
  231. 22 - Supply Chain Security Static Analysis/143 - Practice OPA Conftest for K8s YAML English.vtt 4KB
  232. 2 - Create your course K8s cluster/6 - Practice Create GCP Account English.vtt 4KB
  233. 20 - Open Policy Agent OPA/130 - Practice Enforce Deployment replica count English.vtt 4KB
  234. 9 - Cluster Setup Node Metadata Protection/47 - Practice Protect Node Metadata via NetworkPolicy English.vtt 4KB
  235. 22 - Supply Chain Security Static Analysis/141 - Practice Kubesec English.vtt 4KB
  236. 6 - Cluster Setup Network Policies/27 - Practice Default Deny English.vtt 4KB
  237. 24 - Supply Chain Security Secure Supply Chain/153 - Introduction English.vtt 4KB
  238. 23 - Supply Chain Security Image Vulnerability Scanning/150 - Practice Use Trivy to scan images English.vtt 4KB
  239. 12 - Cluster Hardening RBAC/62 - Practice ClusterRole and ClusterRoleBinding English.vtt 4KB
  240. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/96 - Practice Hack Secrets in ETCD English.vtt 4KB
  241. 26 - Runtime Security Immutability of containers at runtime/172 - Introduction English.vtt 4KB
  242. 24 - Supply Chain Security Secure Supply Chain/154 - Practice Image Digest English.vtt 4KB
  243. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/109 - Practice Create and use RuntimeClasses English.vtt 4KB
  244. 22 - Supply Chain Security Static Analysis/144 - Practice OPA Conftest for Dockerfile English.vtt 4KB
  245. 25 - Runtime Security Behavioral Analytics at host and container level/161 - Introduction English.vtt 4KB
  246. 28 - System Hardening Kernel Hardening Tools/189 - Seccomp English.vtt 4KB
  247. 14 - Cluster Hardening Restrict API Access/82 - Practice Verify NodeRestriction English.vtt 4KB
  248. 5 - Foundation Containers under the hood/20 - Practice The PID Namespace English.vtt 4KB
  249. 7 - Cluster Setup GUI Elements/36 - Practice RBAC for the Dashboard English.vtt 4KB
  250. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/106 - Open Container Initiative OCI English.vtt 4KB
  251. 18 - Microservice Vulnerabilities OS Level Security Domains/113 - Intro and Security Contexts English.vtt 4KB
  252. 14 - Cluster Hardening Restrict API Access/79 - Practice Manual API Request English.vtt 4KB
  253. 20 - Open Policy Agent OPA/127 - Practice Install OPA English.vtt 4KB
  254. 14 - Cluster Hardening Restrict API Access/77 - Practice Anonymous Access English.vtt 4KB
  255. 18 - Microservice Vulnerabilities OS Level Security Domains/114 - Practice Set Container User and Group English.vtt 4KB
  256. 11 - Cluster Setup Verify Platform Binaries/56 - Practice Download and verify K8s release English.vtt 4KB
  257. 15 - Cluster Hardening Upgrade Kubernetes/89 - Practice Create outdated cluster English.vtt 4KB
  258. 27 - Runtime Security Auditing/180 - Practice Create Secret and check Audit Logs English.vtt 3KB
  259. 9 - Cluster Setup Node Metadata Protection/45 - Introduction English.vtt 3KB
  260. 2 - Create your course K8s cluster/5 - Cluster Specification English.vtt 3KB
  261. 26 - Runtime Security Immutability of containers at runtime/174 - Practice StartupProbe changes container English.vtt 3KB
  262. 1 - Introduction/1 - Welcome English.vtt 3KB
  263. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/72 - Practice Disable ServiceAccount mounting English.vtt 3KB
  264. 28 - System Hardening Kernel Hardening Tools/184 - Introduction English.vtt 3KB
  265. 10 - Cluster Setup CIS Benchmarks/50 - Introduction English.vtt 3KB
  266. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/105 - Practice Container calls Linux Kernel English.vtt 3KB
  267. 28 - System Hardening Kernel Hardening Tools/185 - AppArmor English.vtt 3KB
  268. 18 - Microservice Vulnerabilities OS Level Security Domains/117 - Practice Create Privileged Containers English.vtt 3KB
  269. 28 - System Hardening Kernel Hardening Tools/190 - Practice Seccomp for Docker Nginx English.vtt 3KB
  270. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/73 - Practice Limit ServiceAccounts using RBAC English.vtt 3KB
  271. 22 - Supply Chain Security Static Analysis/140 - Kubesec English.vtt 3KB
  272. 15 - Cluster Hardening Upgrade Kubernetes/91 - Practice Upgrade node English.vtt 3KB
  273. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/107 - Sandbox Runtime Katacontainers English.vtt 2KB
  274. 14 - Cluster Hardening Restrict API Access/81 - NodeRestriction AdmissionController English.vtt 2KB
  275. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/108 - Sandbox Runtime gVisor English.vtt 2KB
  276. 29 - System Hardening Reduce Attack Surface/195 - Practice Systemctl and Services English.vtt 2KB
  277. 18 - Microservice Vulnerabilities OS Level Security Domains/115 - Practice Force Container NonRoot English.vtt 2KB
  278. 21 - Supply Chain Security Image Footprint/136 - Recap English.vtt 2KB
  279. 10 - Cluster Setup CIS Benchmarks/53 - Recap English.vtt 2KB
  280. 9 - Cluster Setup Node Metadata Protection/46 - Practice Access Node Metadata English.vtt 2KB
  281. 24 - Supply Chain Security Secure Supply Chain/156 - ImagePolicyWebhook English.vtt 2KB
  282. 2 - Create your course K8s cluster/10 - Notice Always stop your instances English.vtt 2KB
  283. 20 - Open Policy Agent OPA/132 - Recap English.vtt 2KB
  284. 29 - System Hardening Reduce Attack Surface/197 - Practice Disable application listening on port English.vtt 2KB
  285. 7 - Cluster Setup GUI Elements/37 - Recap English.vtt 2KB
  286. 18 - Microservice Vulnerabilities OS Level Security Domains/116 - Privileged Containers English.vtt 2KB
  287. 22 - Supply Chain Security Static Analysis/142 - OPA Conftest English.vtt 2KB
  288. 25 - Runtime Security Behavioral Analytics at host and container level/169 - Recap English.vtt 2KB
  289. 28 - System Hardening Kernel Hardening Tools/192 - Recap English.vtt 2KB
  290. 22 - Supply Chain Security Static Analysis/145 - Recap English.vtt 2KB
  291. 27 - Runtime Security Auditing/182 - Recap English.vtt 2KB
  292. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/70 - Intro English.vtt 2KB
  293. 11 - Cluster Setup Verify Platform Binaries/55 - Introduction English.vtt 1KB
  294. 4 - Foundation Kubernetes Secure Architecture/17 - Recap English.vtt 1KB
  295. 3 - Killercoda Access/13 - How to get Access English.vtt 1KB
  296. 15 - Cluster Hardening Upgrade Kubernetes/92 - Recap English.vtt 1KB
  297. 18 - Microservice Vulnerabilities OS Level Security Domains/119 - Practice Disable PriviledgeEscalation English.vtt 1KB
  298. 23 - Supply Chain Security Image Vulnerability Scanning/149 - Clair and Trivy English.vtt 1KB
  299. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/111 - Recap English.vtt 1KB
  300. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/74 - Recap English.vtt 1KB
  301. 6 - Cluster Setup Network Policies/30 - Recap English.vtt 1KB
  302. 23 - Supply Chain Security Image Vulnerability Scanning/151 - Recap English.vtt 1KB
  303. 2 - Create your course K8s cluster/9 - Practice Firewall rules for NodePorts English.vtt 1KB
  304. 2 - Create your course K8s cluster/11 - Containerd Course Upgrade English.vtt 1KB
  305. 19 - Microservice Vulnerabilities mTLS/124 - Recap English.vtt 1KB
  306. 29 - System Hardening Reduce Attack Surface/199 - Recap English.vtt 1KB
  307. 2 - Create your course K8s cluster/12 - Recap English.vtt 1KB
  308. 12 - Cluster Hardening RBAC/65 - Recap English.vtt 1KB
  309. 26 - Runtime Security Immutability of containers at runtime/176 - Recap English.vtt 1KB
  310. 7 - Cluster Setup GUI Elements/34 - Practice Install Dashboard English.vtt 1KB
  311. 14 - Cluster Hardening Restrict API Access/83 - Recap English.vtt 1KB
  312. 15 - Cluster Hardening Upgrade Kubernetes/88 - Ubuntu 2004 Update.html 1KB
  313. 18 - Microservice Vulnerabilities OS Level Security Domains/118 - PrivilegeEscalation English.vtt 1KB
  314. 2 - Create your course K8s cluster/8 - resources.txt 1KB
  315. 8 - Cluster Setup Secure Ingress/38 - K8s Docs in correct Version English.vtt 873B
  316. 30 - Linux Foundation Simulator Sessions/202 - Linux Foundation Simulator Sessions.html 864B
  317. 3 - Killercoda Access/14 - Your Access Code.html 816B
  318. 6 - Cluster Setup Network Policies/24 - Cluster Reset English.vtt 763B
  319. 20 - Open Policy Agent OPA/125 - Cluster Reset English.vtt 763B
  320. 9 - Cluster Setup Node Metadata Protection/48 - Recap English.vtt 728B
  321. 5 - Foundation Containers under the hood/21 - Recap English.vtt 719B
  322. 12 - Cluster Hardening RBAC/62 - resources.txt 702B
  323. 12 - Cluster Hardening RBAC/61 - resources.txt 673B
  324. 24 - Supply Chain Security Secure Supply Chain/158 - Recap English.vtt 663B
  325. 15 - Cluster Hardening Upgrade Kubernetes/90 - resources.txt 623B
  326. 1 - Introduction/2 - Best Video Quality English.vtt 595B
  327. 11 - Cluster Setup Verify Platform Binaries/58 - Recap English.vtt 566B
  328. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/96 - resources.txt 562B
  329. 15 - Cluster Hardening Upgrade Kubernetes/91 - resources.txt 528B
  330. 8 - Cluster Setup Secure Ingress/41 - resources.txt 520B
  331. 12 - Cluster Hardening RBAC/64 - resources.txt 506B
  332. 8 - Cluster Setup Secure Ingress/42 - Recap English.vtt 503B
  333. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/110 - resources.txt 486B
  334. 24 - Supply Chain Security Secure Supply Chain/157 - resources.txt 422B
  335. 1 - Introduction/3 - Slack Community.html 420B
  336. 8 - Cluster Setup Secure Ingress/40 - resources.txt 403B
  337. 25 - Runtime Security Behavioral Analytics at host and container level/165 - resources.txt 397B
  338. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/98 - resources.txt 377B
  339. 2 - Create your course K8s cluster/5 - resources.txt 374B
  340. 6 - Cluster Setup Network Policies/28 - resources.txt 355B
  341. 10 - Cluster Setup CIS Benchmarks/52 - resources.txt 354B
  342. 24 - Supply Chain Security Secure Supply Chain/155 - resources.txt 309B
  343. 10 - Cluster Setup CIS Benchmarks/54 - TEST Apply CIS rules for Controlplane.html 294B
  344. 12 - Cluster Hardening RBAC/68 - TEST CertificateSigningRequests Sign Manually.html 294B
  345. 12 - Cluster Hardening RBAC/69 - TEST CertificateSigningRequests Sign via API.html 289B
  346. 23 - Supply Chain Security Image Vulnerability Scanning/152 - TEST Scan images using Trivy.html 286B
  347. 29 - System Hardening Reduce Attack Surface/200 - TEST Close Open Ports.html 285B
  348. 11 - Cluster Setup Verify Platform Binaries/59 - TEST Verify Kubelet Binary.html 284B
  349. 29 - System Hardening Reduce Attack Surface/201 - TEST Manage Packages.html 284B
  350. 12 - Cluster Hardening RBAC/66 - TEST RBAC ServiceAccount Permissions.html 283B
  351. 18 - Microservice Vulnerabilities OS Level Security Domains/121 - TEST Privilege Escalation Containers.html 283B
  352. 15 - Cluster Hardening Upgrade Kubernetes/89 - resources.txt 282B
  353. 21 - Supply Chain Security Image Footprint/137 - TEST Image Footprint User.html 282B
  354. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/75 - TEST ServiceAccount Token Mounting.html 281B
  355. 22 - Supply Chain Security Static Analysis/147 - TEST Manual Static Analysis Docker.html 281B
  356. 4 - Foundation Kubernetes Secure Architecture/17 - resources.txt 280B
  357. 5 - Foundation Containers under the hood/22 - TEST Docker Container Namespaces.html 279B
  358. 6 - Cluster Setup Network Policies/32 - TEST NetworkPolicy Namespace Communication.html 278B
  359. 14 - Cluster Hardening Restrict API Access/86 - TEST NodeRestriction.html 278B
  360. 22 - Supply Chain Security Static Analysis/146 - TEST Manual Static Analysis K8s.html 278B
  361. 24 - Supply Chain Security Secure Supply Chain/159 - TEST Complete ImagePolicyWebhook Setup.html 278B
  362. 27 - Runtime Security Auditing/183 - TEST Enable Audit Logging.html 278B
  363. 26 - Runtime Security Immutability of containers at runtime/177 - TEST Immutability Readonly Filesystem.html 276B
  364. 14 - Cluster Hardening Restrict API Access/85 - TEST Apiserver Manifest Misconfigured.html 275B
  365. 25 - Runtime Security Behavioral Analytics at host and container level/170 - TEST Syscall Activity Strace.html 275B
  366. 6 - Cluster Setup Network Policies/31 - TEST DefaultDeny Network Policy.html 274B
  367. 9 - Cluster Setup Node Metadata Protection/49 - TEST NetworkPolicy Metadata Protection.html 274B
  368. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/103 - TEST ETCD Encryption.html 274B
  369. 7 - Cluster Setup GUI Elements/36 - resources.txt 273B
  370. 12 - Cluster Hardening RBAC/67 - TEST RBAC User Permissions.html 273B
  371. 18 - Microservice Vulnerabilities OS Level Security Domains/120 - TEST Privileged Containers.html 273B
  372. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/101 - TEST Read Secret Values.html 271B
  373. 21 - Supply Chain Security Image Footprint/138 - TEST Image Container Hardening.html 271B
  374. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/100 - TEST Access Secrets in Pods.html 269B
  375. 5 - Foundation Containers under the hood/23 - TEST Podman Container Namespaces.html 268B
  376. 24 - Supply Chain Security Secure Supply Chain/160 - TEST Use Image Digest.html 268B
  377. 8 - Cluster Setup Secure Ingress/44 - TEST Secure an Ingress.html 266B
  378. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/102 - TEST Secrets Pods and ServiceAccount.html 266B
  379. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/112 - TEST gVisor and RuntimeClass.html 266B
  380. 28 - System Hardening Kernel Hardening Tools/193 - TEST AppArmor.html 260B
  381. 25 - Runtime Security Behavioral Analytics at host and container level/171 - TEST Falco Rule Change.html 258B
  382. 14 - Cluster Hardening Restrict API Access/84 - TEST Crash that Apiserver.html 256B
  383. 8 - Cluster Setup Secure Ingress/43 - TEST Create an Ingress.html 255B
  384. 28 - System Hardening Kernel Hardening Tools/187 - resources.txt 254B
  385. 2 - Create your course K8s cluster/7 - resources.txt 227B
  386. 16 - Microservice Vulnerabilities Manage Kubernetes Secrets/99 - resources.txt 221B
  387. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/111 - resources.txt 191B
  388. 17 - Microservice Vulnerabilities Container Runtime Sandboxes/109 - resources.txt 178B
  389. 7 - Cluster Setup GUI Elements/37 - resources.txt 176B
  390. 22 - Supply Chain Security Static Analysis/143 - resources.txt 176B
  391. 15 - Cluster Hardening Upgrade Kubernetes/92 - resources.txt 172B
  392. 22 - Supply Chain Security Static Analysis/144 - resources.txt 172B
  393. 9 - Cluster Setup Node Metadata Protection/46 - resources.txt 171B
  394. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/74 - resources.txt 164B
  395. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/71 - resources.txt 156B
  396. 28 - System Hardening Kernel Hardening Tools/190 - resources.txt 154B
  397. 6 - Cluster Setup Network Policies/29 - resources.txt 136B
  398. 28 - System Hardening Kernel Hardening Tools/192 - resources.txt 135B
  399. 20 - Open Policy Agent OPA/127 - resources.txt 127B
  400. 6 - Cluster Setup Network Policies/27 - resources.txt 122B
  401. 21 - Supply Chain Security Image Footprint/134 - resources.txt 118B
  402. 21 - Supply Chain Security Image Footprint/135 - resources.txt 118B
  403. 9 - Cluster Setup Node Metadata Protection/47 - resources.txt 115B
  404. 23 - Supply Chain Security Image Vulnerability Scanning/150 - resources.txt 111B
  405. 7 - Cluster Setup GUI Elements/34 - resources.txt 108B
  406. 20 - Open Policy Agent OPA/130 - resources.txt 108B
  407. 27 - Runtime Security Auditing/179 - resources.txt 106B
  408. 27 - Runtime Security Auditing/180 - resources.txt 106B
  409. 27 - Runtime Security Auditing/181 - resources.txt 106B
  410. 20 - Open Policy Agent OPA/129 - resources.txt 100B
  411. 18 - Microservice Vulnerabilities OS Level Security Domains/113 - resources.txt 96B
  412. 10 - Cluster Setup CIS Benchmarks/53 - resources.txt 93B
  413. 20 - Open Policy Agent OPA/128 - resources.txt 93B
  414. 5 - Foundation Containers under the hood/21 - resources.txt 89B
  415. 7 - Cluster Setup GUI Elements/35 - resources.txt 87B
  416. 14 - Cluster Hardening Restrict API Access/80 - resources.txt 86B
  417. 20 - Open Policy Agent OPA/131 - resources.txt 85B
  418. 13 - Cluster Hardening Exercise caution in using ServiceAccounts/72 - resources.txt 84B
  419. 6 - Cluster Setup Network Policies/30 - resources.txt 73B
  420. 21 - Supply Chain Security Image Footprint/136 - resources.txt 73B
  421. 25 - Runtime Security Behavioral Analytics at host and container level/169 - resources.txt 72B
  422. 2 - Create your course K8s cluster/9 - resources.txt 71B
  423. 22 - Supply Chain Security Static Analysis/141 - resources.txt 66B
  424. 14 - Cluster Hardening Restrict API Access/83 - resources.txt 65B
  425. 25 - Runtime Security Behavioral Analytics at host and container level/161 - resources.txt 55B
  426. 25 - Runtime Security Behavioral Analytics at host and container level/168 - resources.txt 46B
  427. 1 - Introduction/4 - resources.txt 44B
  428. 20 - Open Policy Agent OPA/132 - resources.txt 44B
  429. 27 - Runtime Security Auditing/182 - resources.txt 44B
  430. 2 - Create your course K8s cluster/6 - resources.txt 33B