Kubernetes Hardening
Kubernetes, the secure way. Learn how to securely build and maintain a Kubernetes environment.
In this module, we will be starting with foundational Kubernetes skills and turning them into an in-depth understanding of security practices used to harden a Kubernetes environment. This will be achieved by exploring Kubernetes security considerations from setting up all the way to when applications are running. This module also covers security considerations that need to be taken into account when using a microservices architecture, and implementing them in a Kubernetes cluster. By the end of this module, you’ll have a greater knowledge of what, as a DevSecOps engineer, your responsibilities would be when using Kubernetes and how the tool fits into the greater DevSecOps landscape.
0%
Cluster Hardening
Learn initial security considerations when creating a Kubernetes cluster.
0%
K8s Best Security Practices
Best Kubernetes security practices at a cluster level.
0%
Microservices Architectures
Explore the problems associated with building a Microservice Architecture and how to overcome these to build a secure environment.
0%
K8s Runtime Security
Secure a Kubernetes environment using in-house offerings and runtime security tools like Falco.
0%
Secure GitOps
Learn how to secure the GitOps framework.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
