Kubernetes Security Fundamentals (LFS460)
Skills Gained
This course exposes you to knowledge and skills needed to maintain security in dynamic, multi-project environments. This course addresses security concerns for cloud production environments and covers topics related to the security container supply chain, discussing topics from before a cluster has been configured through deployment, and ongoing, as well as agile use, including where to find ongoing security and vulnerability information. The course includes hands-on labs to build and secure a Kubernetes cluster, as well as monitor and log security events.
Who Can Benefit
This course is ideal for anyone holding a CKA certification and interested in or responsible for cloud security.
Course Outline
Introduction
- Linux Foundation
 - Linux Foundation Training
 - Linux Foundation Certifications
 - Linux Foundation Digital Badges
 - Laboratory Exercises, Solutions and Resources
 - E-Learning Course: LFS260
 - Distribution Details
 - Labs
 
Cloud Security Overview
- Multiple Projects
 - What is Security?
 - Assessment
 - Prevention
 - Detection
 - Reaction
 - Classes of Attackers
 - Types of Attacks
 - Attack Surfaces
 - Hardware and Firmware Considerations
 - Security Agencies
 - Manage External Access
 - Labs
 
Preparing to Install
- Image Supply Chain
 - Runtime Sandbox
 - Verify Platform Binaries
 - Minimize Access to GUI
 - Policy Based Control
 - Labs
 
Installing the Cluster
- Update Kubernetes
 - Tools to Harden the Kernel
 - Kernel Hardening Examples
 - Mitigating Kernel Vulnerabilities
 - Labs
 
Securing the kube-apiserver
- Restrict Access to API
 - Enable Kube-apiserver Auditing
 - Configuring RBAC
 - Pod Security Policies
 - Minimize IAM Roles
 - Protecting etcd
 - CIS Benchmark
 - Using Service Accounts
 - Labs
 
Networking
- Firewalling Basics
 - Network Plugins
 - iptables
 - Mitigate Brute Force Login Attempts
 - Netfilter rule management
 - Netfilter Implementation
 - nft Concepts
 - Ingress Objects
 - Pod to Pod Encryption
 - Restrict Cluster Level Access
 - Labs
 
Workload Considerations
- Minimize Base Image
 - Static Analysis of Workloads
 - Runtime Analysis of Workloads
 - Container Immutability
 - Mandatory Access Control
 - SELinux
 - AppArmor
 - Generate AppArmor Profiles
 - Labs
 
Issue Detection
- Understanding Phases of Attack
 - Preparation
 - Understanding an Attack Progression
 - During an Incident
 - Handling Incident Aftermath
 - Intrusion Detection Systems
 - Threat Detection
 - Behavioral Analytics
 - Labs
 
Domain Reviews
- Preparing for the Exam
 - Labs
 
Closing and Evaluation Survey
- Evaluation Survey
 
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date