Download link
File List
-
7 - Domain 6 Monitoring Logging and Runtime Security/80 - Audit Logging InDetail.mp4 328.62 MB
1 - Introduction/1 - Introduction to the Course.mp4 28.27 MB
1 - Introduction/2 - Course Lecture Format English.vtt 5.24 KB
1 - Introduction/2 - Course Lecture Format.mp4 21.62 MB
1 - Introduction/3 - Document Link to Code Repository.html 75 B
1 - Introduction/4 - Our Community.html 567 B
2 - Domain 1 Cluster Setup/5 - Overview of CIS Benchmarks for Hardening English.vtt 12.45 KB
2 - Domain 1 Cluster Setup/5 - Overview of CIS Benchmarks for Hardening.mp4 97.89 MB
2 - Domain 1 Cluster Setup/6 - Kubernetes CIS Benchmarks English.vtt 7.82 KB
2 - Domain 1 Cluster Setup/6 - Kubernetes CIS Benchmarks.mp4 84.2 MB
2 - Domain 1 Cluster Setup/7 - Our Lab Architecture English.vtt 7.27 KB
2 - Domain 1 Cluster Setup/7 - Our Lab Architecture.mp4 22.4 MB
2 - Domain 1 Cluster Setup/8 - Document Lecture.html 267 B
2 - Domain 1 Cluster Setup/9 - Creating Infrastructure for Labs English.vtt 7.75 KB
2 - Domain 1 Cluster Setup/9 - Creating Infrastructure for Labs.mp4 44.43 MB
2 - Domain 1 Cluster Setup/10 - ETCD Security Guidelines English.vtt 13.96 KB
2 - Domain 1 Cluster Setup/10 - ETCD Security Guidelines.mp4 154.89 MB
2 - Domain 1 Cluster Setup/11 - Configuring ETCD Binaries English.vtt 5.02 KB
2 - Domain 1 Cluster Setup/11 - Configuring ETCD Binaries.mp4 31.95 MB
2 - Domain 1 Cluster Setup/12 - Understanding Asymmetric Key Encryption English.vtt 13.08 KB
2 - Domain 1 Cluster Setup/12 - Understanding Asymmetric Key Encryption.mp4 114.53 MB
2 - Domain 1 Cluster Setup/13 - Revising SSLTLS English.vtt 20.22 KB
2 - Domain 1 Cluster Setup/13 - Revising SSLTLS.mp4 298.26 MB
2 - Domain 1 Cluster Setup/14 - Overview of Certificate Authority English.vtt 7.01 KB
2 - Domain 1 Cluster Setup/14 - Overview of Certificate Authority.mp4 52.79 MB
2 - Domain 1 Cluster Setup/15 - InTransit Encryption with HTTPS English.vtt 16.17 KB
2 - Domain 1 Cluster Setup/15 - InTransit Encryption with HTTPS.mp4 126.37 MB
2 - Domain 1 Cluster Setup/16 - Overview of Certificate Based Authentication English.vtt 5.69 KB
2 - Domain 1 Cluster Setup/16 - Overview of Certificate Based Authentication.mp4 27.58 MB
2 - Domain 1 Cluster Setup/17 - Client Authentication in ETCD English.vtt 8.43 KB
2 - Domain 1 Cluster Setup/17 - Client Authentication in ETCD.mp4 59.13 MB
2 - Domain 1 Cluster Setup/18 - Integrating Systemd with ETCD English.vtt 5.55 KB
2 - Domain 1 Cluster Setup/18 - Integrating Systemd with ETCD.mp4 37.67 MB
2 - Domain 1 Cluster Setup/19 - API Server Security Guidelines English.vtt 8.29 KB
2 - Domain 1 Cluster Setup/19 - API Server Security Guidelines.mp4 80.01 MB
2 - Domain 1 Cluster Setup/20 - Configuring API Server English.vtt 9.28 KB
2 - Domain 1 Cluster Setup/20 - Configuring API Server.mp4 80.64 MB
2 - Domain 1 Cluster Setup/21 - Transport Security for API Server English.vtt 8.53 KB
2 - Domain 1 Cluster Setup/21 - Transport Security for API Server.mp4 65.51 MB
2 - Domain 1 Cluster Setup/22 - Access Control English.vtt 6.64 KB
2 - Domain 1 Cluster Setup/22 - Access Control.mp4 44.95 MB
2 - Domain 1 Cluster Setup/23 - Static Token File Authentication English.vtt 8.59 KB
2 - Domain 1 Cluster Setup/23 - Static Token File Authentication.mp4 57.67 MB
2 - Domain 1 Cluster Setup/24 - Downsides of Static Token File Authentication English.vtt 5.07 KB
2 - Domain 1 Cluster Setup/24 - Downsides of Static Token File Authentication.mp4 29.89 MB
2 - Domain 1 Cluster Setup/25 - Implementing X509 Client Authentication English.vtt 5.21 KB
2 - Domain 1 Cluster Setup/25 - Implementing X509 Client Authentication.mp4 18.54 MB
2 - Domain 1 Cluster Setup/26 - Downsides of X509 Client Authentication English.vtt 4.33 KB
2 - Domain 1 Cluster Setup/26 - Downsides of X509 Client Authentication.mp4 27.19 MB
2 - Domain 1 Cluster Setup/27 - Overview of OIDC Authentication English.vtt 5.81 KB
2 - Domain 1 Cluster Setup/27 - Overview of OIDC Authentication.mp4 19.67 MB
2 - Domain 1 Cluster Setup/28 - Authorization English.vtt 10.34 KB
2 - Domain 1 Cluster Setup/28 - Authorization.mp4 53.19 MB
2 - Domain 1 Cluster Setup/29 - Encryption Provider English.vtt 13.37 KB
2 - Domain 1 Cluster Setup/29 - Encryption Provider.mp4 79.69 MB
2 - Domain 1 Cluster Setup/30 - Implementing Auditing English.vtt 9.88 KB
2 - Domain 1 Cluster Setup/30 - Implementing Auditing.mp4 59.88 MB
2 - Domain 1 Cluster Setup/31 - Setting up kubeadm cluster English.vtt 8.48 KB
2 - Domain 1 Cluster Setup/31 - Setting up kubeadm cluster.mp4 55.8 MB
2 - Domain 1 Cluster Setup/32 - Revising Taints and Tolerations English.vtt 5.77 KB
2 - Domain 1 Cluster Setup/32 - Revising Taints and Tolerations.mp4 17.02 MB
2 - Domain 1 Cluster Setup/33 - Kubelet Security English.vtt 14.93 KB
2 - Domain 1 Cluster Setup/33 - Kubelet Security.mp4 155.28 MB
2 - Domain 1 Cluster Setup/34 - Verifying Platform Binaries English.vtt 5.19 KB
2 - Domain 1 Cluster Setup/34 - Verifying Platform Binaries.mp4 30.94 MB
2 - Domain 1 Cluster Setup/35 - Notes Cluster Setup.html 103 B
3 - Domain 2 Cluster Hardening/36 - Creating User for RBAC English.vtt 13.29 KB
3 - Domain 2 Cluster Hardening/36 - Creating User for RBAC.mp4 113.89 MB
3 - Domain 2 Cluster Hardening/37 - Role Based Access Controls RBAC English.vtt 16.1 KB
3 - Domain 2 Cluster Hardening/37 - Role Based Access Controls RBAC.mp4 117.68 MB
3 - Domain 2 Cluster Hardening/38 - ClusterRole and ClusterRoleBinding English.vtt 8.92 KB
3 - Domain 2 Cluster Hardening/38 - ClusterRole and ClusterRoleBinding.mp4 39.75 MB
3 - Domain 2 Cluster Hardening/39 - Revising Ingress English.vtt 10.53 KB
3 - Domain 2 Cluster Hardening/39 - Revising Ingress.mp4 44.05 MB
3 - Domain 2 Cluster Hardening/40 - Understanding Ingress Resource and Ingress Controllers English.vtt 12.95 KB
3 - Domain 2 Cluster Hardening/40 - Understanding Ingress Resource and Ingress Controllers.mp4 111.77 MB
3 - Domain 2 Cluster Hardening/41 - Creating Ingress and Ingress Controller English.vtt 8.28 KB
3 - Domain 2 Cluster Hardening/41 - Creating Ingress and Ingress Controller.mp4 51.19 MB
3 - Domain 2 Cluster Hardening/42 - Ingress Security English.vtt 8.72 KB
3 - Domain 2 Cluster Hardening/42 - Ingress Security.mp4 88.01 MB
3 - Domain 2 Cluster Hardening/43 - Overview of Service Accounts English.vtt 11.57 KB
3 - Domain 2 Cluster Hardening/43 - Overview of Service Accounts.mp4 91.47 MB
3 - Domain 2 Cluster Hardening/44 - Service Account Security English.vtt 12.1 KB
3 - Domain 2 Cluster Hardening/44 - Service Account Security.mp4 94.45 MB
3 - Domain 2 Cluster Hardening/45 - Upgrading kudeadm Clusters English.vtt 13.09 KB
3 - Domain 2 Cluster Hardening/45 - Upgrading kudeadm Clusters.mp4 152.11 MB
3 - Domain 2 Cluster Hardening/46 - Notes Cluster Hardening.html 103 B
4 - Domain 3 Minimize Microservice Vulnerabilities/47 - Admission Controllers English.vtt 15.04 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/47 - Admission Controllers.mp4 101.78 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/48 - Security Contexts English.vtt 12.14 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/48 - Security Contexts.mp4 58.43 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/49 - Revising Privileged Container English.vtt 8.43 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/49 - Revising Privileged Container.mp4 44.08 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/50 - Running Privileged PODS in Kubernetes English.vtt 5.97 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/50 - Running Privileged PODS in Kubernetes.mp4 33.76 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/51 - Hack Misconfigured Cluster English.vtt 10.63 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/51 - Hack Misconfigured Cluster.mp4 84.61 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/52 - ImagePullPolicy in Kubernetes English.vtt 7.69 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/52 - ImagePullPolicy in Kubernetes.mp4 58.25 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/53 - Admission Controller AlwaysPullImages English.vtt 6.65 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/53 - Admission Controller AlwaysPullImages.mp4 44.94 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/54 - Admission Controller ImagePolicyWebhook English.vtt 4.97 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/54 - Admission Controller ImagePolicyWebhook.mp4 31.69 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/55 - Custom WebHook Integration with Admission Controller English.vtt 10.65 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/55 - Custom WebHook Integration with Admission Controller.mp4 85.84 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/56 - Overview of Kubernetes Secrets English.vtt 17.74 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/56 - Overview of Kubernetes Secrets.mp4 82.97 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/57 - Mounting Secrets in Pods English.vtt 7.22 KB
4 - Domain 3 Minimize Microservice Vulnerabilities/57 - Mounting Secrets in Pods.mp4 37.17 MB
4 - Domain 3 Minimize Microservice Vulnerabilities/58 - Notes Minimize Microservice Vulnerabilities.html 103 B
5 - Domain 4 System Hardening/59 - Overview of AppArmor English.vtt 15.76 KB
5 - Domain 4 System Hardening/59 - Overview of AppArmor.mp4 97.5 MB
5 - Domain 4 System Hardening/60 - Integration of AppArmor with Kubernetes English.vtt 6.05 KB
5 - Domain 4 System Hardening/60 - Integration of AppArmor with Kubernetes.mp4 22.38 MB
5 - Domain 4 System Hardening/61 - OCI and Container Runtimes English.vtt 11.7 KB
5 - Domain 4 System Hardening/61 - OCI and Container Runtimes.mp4 62.42 MB
5 - Domain 4 System Hardening/62 - Configuring containerd and runc English.vtt 10.12 KB
5 - Domain 4 System Hardening/62 - Configuring containerd and runc.mp4 47.86 MB
5 - Domain 4 System Hardening/63 - Container Runtime Interface English.vtt 5.99 KB
5 - Domain 4 System Hardening/63 - Container Runtime Interface.mp4 63.44 MB
5 - Domain 4 System Hardening/64 - Overview of Container Runtime Sandboxes English.vtt 9.34 KB
5 - Domain 4 System Hardening/64 - Overview of Container Runtime Sandboxes.mp4 87.89 MB
5 - Domain 4 System Hardening/65 - Implementing RunTimeClass gVisor English.vtt 11.36 KB
5 - Domain 4 System Hardening/65 - Implementing RunTimeClass gVisor.mp4 109.52 MB
5 - Domain 4 System Hardening/66 - Kubeadm and Calcio English.vtt 3.95 KB
5 - Domain 4 System Hardening/66 - Kubeadm and Calcio.mp4 17.67 MB
5 - Domain 4 System Hardening/67 - Understanding Network Policies Part 01 English.vtt 23.57 KB
5 - Domain 4 System Hardening/67 - Understanding Network Policies Part 01.mp4 72.48 MB
5 - Domain 4 System Hardening/68 - Understanding Network Policies Part 02 English.vtt 14.32 KB
5 - Domain 4 System Hardening/68 - Understanding Network Policies Part 02.mp4 101.09 MB
5 - Domain 4 System Hardening/69 - Notes System Hardening.html 103 B
6 - Domain 5 Supply Chain Security/70 - Vulnerability Exploit and Payload English.vtt 7.36 KB
6 - Domain 5 Supply Chain Security/70 - Vulnerability Exploit and Payload.mp4 62.56 MB
6 - Domain 5 Supply Chain Security/71 - Container Security Scanning English.vtt 5.96 KB
6 - Domain 5 Supply Chain Security/71 - Container Security Scanning.mp4 38.43 MB
6 - Domain 5 Supply Chain Security/72 - Scan images for known vulnerabilities English.vtt 5.13 KB
6 - Domain 5 Supply Chain Security/72 - Scan images for known vulnerabilities.mp4 62.9 MB
6 - Domain 5 Supply Chain Security/73 - Scanning K8s Clusters for Security Best Practices English.vtt 6.41 KB
6 - Domain 5 Supply Chain Security/73 - Scanning K8s Clusters for Security Best Practices.mp4 98.14 MB
6 - Domain 5 Supply Chain Security/74 - Overview of Static Analysis English.vtt 5.92 KB
6 - Domain 5 Supply Chain Security/74 - Overview of Static Analysis.mp4 50.57 MB
6 - Domain 5 Supply Chain Security/75 - Notes Supply Chain Security.html 103 B
7 - Domain 6 Monitoring Logging and Runtime Security/76 - Overview of Falco English.vtt 8.81 KB
7 - Domain 6 Monitoring Logging and Runtime Security/76 - Overview of Falco.mp4 69.93 MB
7 - Domain 6 Monitoring Logging and Runtime Security/77 - Introduction to Sysdig English.vtt 14.68 KB
7 - Domain 6 Monitoring Logging and Runtime Security/77 - Introduction to Sysdig.mp4 190.41 MB
7 - Domain 6 Monitoring Logging and Runtime Security/78 - Creating Custom Falco Rules English.vtt 14.96 KB
7 - Domain 6 Monitoring Logging and Runtime Security/78 - Creating Custom Falco Rules.mp4 145.55 MB
7 - Domain 6 Monitoring Logging and Runtime Security/79 - Falco Rule Writing Exam Perspective English.vtt 7 KB
7 - Domain 6 Monitoring Logging and Runtime Security/79 - Falco Rule Writing Exam Perspective.mp4 69.79 MB
7 - Domain 6 Monitoring Logging and Runtime Security/80 - Audit Logging InDetail English.vtt 28.31 KB
1 - Introduction/1 - Introduction to the Course English.vtt 5.43 KB
7 - Domain 6 Monitoring Logging and Runtime Security/81 - Immutability at Container Runtime English.vtt 2.18 KB
7 - Domain 6 Monitoring Logging and Runtime Security/81 - Immutability at Container Runtime.mp4 7.74 MB
7 - Domain 6 Monitoring Logging and Runtime Security/82 - Notes Monitoring Logging and Runtime Security.html 103 B
8 - Exam Preparation Section/83 - Our Community.html 567 B
8 - Exam Preparation Section/84 - Overview of CKS Exams English.vtt 8.21 KB
8 - Exam Preparation Section/84 - Overview of CKS Exams.mp4 32.78 MB
8 - Exam Preparation Section/85 - Important Pointers for Exams Part 01 English.vtt 10.44 KB
8 - Exam Preparation Section/85 - Important Pointers for Exams Part 01.mp4 26.15 MB
8 - Exam Preparation Section/86 - Important Pointers for Exams Part 02 English.vtt 3.66 KB
8 - Exam Preparation Section/86 - Important Pointers for Exams Part 02.mp4 8.07 MB
8 - Exam Preparation Section/87 - Notes Exam Preparation Section.html 103 B
8 - Exam Preparation Section/88 - Exam Preparation Practice Tests.html 7.3 KB
8 - Exam Preparation Section/89 - Practice Test Solution Part 01.html 5.71 KB
8 - Exam Preparation Section/90 - Practice Test Solution Part 02.html 4.53 KB
8 - Exam Preparation Section/91 - Practice Test Solution Part 03.html 2.7 KB
8 - Exam Preparation Section/92 - Practice Test Solution Part 04.html 4.14 KB
Download Info
-
Tips
“Udemy - Certified Kubernetes Security Specialist 2023” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.