Course description
Upon completion of the course, you will be able to:
- Build a solid foundation that is required to understand the container and Kubernetes security landscape.
- Gain the necessary skills to analyze, assess, evaluate, and secure applications; APIs and microservices; containers; and Kubernetes.
- Gain a practical understanding of how to hack misconfigured Kubernetes workloads.
- Learn and implement different ways of Authentication and Authorization methods used in Kubernetes.
- Learn how different Admission controllers help apply defense in depth to regulate and audit workloads in a Kubernetes Cluster.
- Learn, apply and practice different techniques to manage clusterwide data in a distributed setup.
- Practice and implement a myriad of techniques to secure secrets and other sensitive data processed and consumed in a Kubernetes Cluster.
- Experience Network security and Zero Trust in action using Network policies and Service Meshes.
- Gain the necessary skills to Defend Kubernetes cluster from most common attacks.