Table of contents
Introduction
35mins
Lock icon
Course Introduction | 3m
Lock icon
About the Exam | 8m
Lock icon
CKS Exam Updates 1.24 | 2m
Lock icon
Building a Kubernetes Cluster | 15m
Lock icon
Kubernetes Security Overview | 5m
Cluster Setup
342mins
Lock icon
Cluster Setup Intro | 1m
Lock icon
Restricting Default Access with NetworkPolicies | 10m
Lock icon
Allowing Limited Access with NetworkPolicies | 11m
Lock icon
Lock Down Inter-Pod Communication with NetworkPolicies | 1h 0m
Lock icon
Running a CIS Benchmark with kube-bench | 8m
Lock icon
Fixing Security Issues Detected by a CIS Benchmark | 9m
Lock icon
Strengthen Cluster Security with a CIS Kubernetes Benchmark | 1h 0m
Lock icon
Implementing TLS with Ingress | 10m
Lock icon
Add TLS to a Kubernetes Service with Ingress | 1h 0m
Lock icon
Securing Node Endpoints | 5m
Lock icon
Securing GUI Elements | 2m
Lock icon
Verifying Kubernetes Platform Binaries | 7m
Lock icon
Verify Kubernetes Binaries | 1h 0m
Lock icon
Cluster Setup Review | 4m
Lock icon
QUIZ: Cluster Setup | 30m
Cluster Hardening
118mins
Lock icon
Cluster Hardening Intro | 0m
Lock icon
Exploring Service Accounts | 5m
Lock icon
Restricting Service Account Permissions | 12m
Lock icon
Limit Service Account Permissions in Kubernetes | 1h 0m
Lock icon
Restricting Access to the Kubernetes API | 3m
Lock icon
Keeping k8s Updated | 4m
Lock icon
Cluster Hardening Review | 2m
Lock icon
QUIZ: Cluster Hardening | 30m
System Hardening
126mins
Lock icon
System Hardening Intro | 0m
Lock icon
Understanding Host OS Security Concerns | 8m
Lock icon
Minimizing IAM Roles | 4m
Lock icon
Exploring Network-Level Security | 3m
Lock icon
Exploring AppArmor | 4m
Lock icon
Using AppArmor in k8s Containers | 10m
Lock icon
Protect a Kubernetes Cluster with AppArmor | 1h 0m
Lock icon
System Hardening Review | 2m
Lock icon
QUIZ: System Hardening | 30m
Minimizing Microservice Vulnerabilities
295mins
Lock icon
Minimizing Microservice Vulnerabilities Intro | 1m
Lock icon
Managing Container Access with Security Contexts | 5m
Lock icon
Governing Pod Configurations with Pod Security Policies | 7m
Lock icon
Using Pod Security Policies | 14m
Lock icon
Prevent Privileged Containers in Kubernetes with PodSecurityPolicies | 1h 0m
Lock icon
Using OPA Gatekeeper | 11m
Lock icon
Managing Kubernetes Secrets | 11m
Lock icon
Manage Sensitive Config Data with Kubernetes Secrets | 1h 0m
Lock icon
Understanding Container Runtime Sandboxes | 5m
Lock icon
Creating a Container Runtime Sandbox | 9m
Lock icon
Move Kubernetes Pods to a Secured Runtime Sandbox | 1h 0m
Lock icon
Understanding Pod-to-Pod mTLS | 3m
Lock icon
Signing Certificates | 8m
Lock icon
Minimizing Microservice Vulnerabilities Review | 4m
Lock icon
QUIZ: Minimizing Microservice Vulnerabilities | 30m
Supply Chain Security
339mins
Lock icon
Supply Chain Security Intro | 1m
Lock icon
Minimizing Base Image Attack Surface | 4m
Lock icon
Whitelisting Allowed Image Registries | 7m
Lock icon
Validating Signed Images | 4m
Lock icon
Analyzing a Dockerfile | 7m
Lock icon
Analyzing a Dockerfile for Security Best Practices | 1h 0m
Lock icon
Analyzing Resource YAML Files | 4m
Lock icon
Analyzing Kubernetes YAML Files for Security Best Practices | 1h 0m
Lock icon
Scanning Images for Known Vulnerabilities | 8m
Lock icon
Scanning Images for Vulnerabilities with Trivy | 1h 0m
Lock icon
Scanning Images with an Admission Controller | 4m
Lock icon
Setting up an Image Scanner | 8m
Lock icon
Configuring the ImagePolicyWebhook Admission Controller | 13m
Lock icon
Automate Kubernetes Image Vulnerability Scanning | 1h 0m
Lock icon
Supply Chain Security Review | 5m
Lock icon
QUIZ: Supply Chain Security | 30m
Monitoring, Logging, and Runtime Security
255mins
Lock icon
Monitoring, Logging, and Runtime Security Intro | 1m
Lock icon
Understanding Behavioral Analytics | 5m
Lock icon
Analyzing Container Behavior with Falco | 11m
Lock icon
Threat Detection in Kubernetes with Falco | 1h 0m
Lock icon
Ensuring Containers are Immutable | 9m
Lock icon
Check Kubernetes Pods for Container Immutability | 1h 0m
Lock icon
Understanding Audit Logs | 4m
Lock icon
Setting up Audit Logging | 9m
Lock icon
Configure Audit Logging in Kubernetes | 1h 0m
Lock icon
Monitoring, Logging, and Runtime Security Review | 3m
Lock icon
QUIZ: Monitoring, Logging, and Runtime Security | 30m
Practice Exam
720mins
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 1 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 2 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 3 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 4 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 5 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 6 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 7 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 8 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 9 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 10 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 11 | 1h 0m
Lock icon
Certified Kubernetes Security Specialist (CKS) - Practice Exam Part 12 | 1h 0m
Conclusion
2mins
Lock icon
Course Summary | 1m
Lock icon
Conclusion and What’s Next | 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon