Kubernetes Security Training Course
Kubernetes offers features for securing a cluster and its applications. The out-of-the-box settings, however, may not provide full protection from hackers and unintentionally harmful actors.
This instructor-led, live training (online or onsite) is aimed at engineers who wish to secure a Kubernetes cluster beyond the default security settings.
By the end of this training, participants will be able to:
- Understand the vulnerabilities that are exposed by a default Kubernetes installation.
- Prevent unauthenticated access to the Kubernetes API, database, and other services.
- Protect a Kubernetes cluster from accidental or malicious access.
- Put together a comprehensive security policy and set of best practices.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
Overview of the Kubernetes API and Security Features
- Access to HTTPS endpoints, Kubernetes API, nodes, and containers
- Kubernetes Authentication and Authorization features
How Hackers Attack Your Cluster
- How hackers find your etcd port, Kubernetes API, and other services
- How hackers execute code inside your container
- How hackers escalate their privileges
- Case study: How Tesla exposed its Kubernetes cluster
Setting up Kubernetes
- Choosing a distribution
- Installing Kubernetes
Using Credentials and Secrets
- The credentials life cycle
- Understanding secrets
- Distributing credentials
Controlling Access to the Kubernetes API
- Encrypting API traffic with TLS
- Implementing authentication for API servers
- Implementing authorization for different roles
Controlling User and Workload Capabilities
- Understanding Kubernetes policies
- Limiting resource usage
- Limiting container privileges
- Limiting network access
Controlling access to nodes
- Separating workload access
Protecting Cluster Components
- Restricting access to etcd
- Disabling features
- Changing, removing and revoking credentials and tokens
Securing Container Image
- Managing Docker and Kubernetes images
- Building secure images
Controlling Access to Cloud Resources
- Understanding cloud platform metadata
- Limiting permissions to cloud resources
Evaluating Third Party Integrations
- Minimizing the permissions granted to third party software
- Evaluating components that can create pods
Establishing a Security Policy
- Reviewing the existing security profile
- Creating a security model
- Cloud native security considerations
- Other best practices
Encrypting Inactive Data
- Encrypting backups
- Encrypting the entire disk
- Encrypting secret resources in etcd
Monitoring Activity
- Enabling audit logging
- Auditing and governing the software supply chain
- Subscribing to security alerts and updates
Summary and Conclusion
Requirements
- Previous experience working with Kubernetes
Audience
- DevOps engineers
- Developers
Open Training Courses require 5+ participants.
Kubernetes Security Training Course - Booking
Kubernetes Security Training Course - Enquiry
Kubernetes Security - Consultancy Enquiry
Consultancy Enquiry
Testimonials (5)
he was patience and understood that we fall behind
Albertina - REGNOLOGY ROMANIA S.R.L.
Course - Deploying Kubernetes Applications with Helm
He explained everything, not only k8s notions.
Stefan Voinea - EMAG IT Research S.R.L
Course - Certified Kubernetes Application Developer (CKAD) - exam preparation
Depth of knowledge of the trainer
Grant Miller - BMW
Course - Certified Kubernetes Administrator (CKA) - exam preparation
It gave a good grounding for Docker and Kubernetes.
Stephen Dowdeswell - Global Knowledge Networks UK
Course - Docker (introducing Kubernetes)
I mostly enjoyed the knowledge of the trainer.
- Inverso Gesellschaft fur innovative Versicherungssoftware mbH
Course - Docker, Kubernetes and OpenShift for Developers
Provisional Upcoming Courses (Require 5+ participants)
Related Courses
Advanced Platform Engineering: Scaling with Microservices and Kubernetes
35 HoursThis instructor-led, live training in Hong Kong (online or onsite) is aimed at advanced-level platform engineers and DevOps professionals who wish to master scaling applications using microservices and Kubernetes.
By the end of this training, participants will be able to:
- Design and implement scalable microservices architectures.
- Deploy and manage applications on Kubernetes clusters.
- Utilize Helm charts for efficient service deployment.
- Monitor and maintain the health of microservices in production.
- Apply best practices for security and compliance in a Kubernetes environment.
Kubernetes Networking with Calico
14 HoursThis instructor-led, live training in Hong Kong (online or onsite) is aimed at engineers who wish to optimize networking for Kubernetes clusters.
By the end of this training, participants will be able to:
- Install and configure Calico.
- Understand how Calico differs from traditional overlay networks.
- Understand how Calico combines internet routing protocols with consensus-based data stores.
- Use Calico to create a container networking solution for Kubernetes clusters.
- Use Calico to provide network policy for Kubernetes.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes is nowadys a leading platform used for containers orchestration.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training companies worldwide in field of containerization.
Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
This instructor-led, live training (online or onsite) is aimed at System Administrators, Kubernetes users who wish to confirm their knowledge by passing CKA exam.
On the other hand, training is focused also on gaining practical experience in Kubernetes Administration, so we recommend taking part in it, even if you don't intend to take CKA exam.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes.
This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.
On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
Certified Kubernetes Security Specialist (CKS)
21 HoursThis instructor-led, live training in Hong Kong (online or onsite) is aimed at Kubernetes practitioners who wish to prepare for the CKS exam.
By the end of this training, participants will know how to secure Kubernetes environments and container-based applications throughout the different stages of an application's life cycle: build, deployment and runtime.
Docker and Kubernetes on AWS
21 HoursThis instructor-led, live training in (online or onsite) is aimed at engineers who wish to evaluate each of these services to make an informed decisions about which to deploy within their organization.
By the end of this training, participants will be able to:
- Set up a development environment that includes all needed libraries, packages and frameworks needed to start developing.
- Set up, configure and deploy a series of demo containers using a number of different approaches.
- Understand the architectural and design differences among different Docker/Kubernetes solutions within AWS.
- Automate the deployment of Docker containers.
- Set up a continuous integration and deployment pipeline.
- Integrate Docker and Kubernetes into an existing continuous integration system.
Docker, Kubernetes and OpenShift 3 for Administrators
35 HoursIn this instructor-led, live training in Hong Kong, participants will learn how to manage Red Hat OpenShift Container Platform.
By the end of this training, participants will be able to:
- Create, configure, manage, and troubleshoot OpenShift clusters.
- Deploy containerized applications on-premise, in public cloud or on a hosted cloud.
- Secure OpenShift Container Platform
- Monitor and gather metrics.
- Manage storage.
Docker and Kubernetes: Building and Scaling a Containerized Application
21 HoursIn this instructor-led, live training in Hong Kong (onsite or remote), participants will learn how to create and manage Docker containers, then deploy a sample application inside a container. Participants will also learn how to automate, scale, and manage their containerized applications within a Kubernetes cluster. Finally, the training goes on to more advanced topics, walking participants through the process of securing, scaling and monitoring a Kubernetes cluster.
By the end of this training, participants will be able to:
- Set up and run a Docker container.
- Deploy a containerized server and web application.
- Build and manage Docker images.
- Set up a Docker and Kubernetes cluster.
- Use Kubernetes to deploy and manage a clustered web application.
- Secure, scale and monitor a Kubernetes cluster.
Docker (introducing Kubernetes)
14 HoursThe objective of this practical course is to provide all the tools that address the practical aspects of Docker and Kubernetes, in order that the participants can count on the necessary skills for the proper management of the program.
Docker and Kubernetes
21 HoursTraining objectives: Acquire theoretical and operational skills on Docker and Kubernetes.
Docker, Kubernetes and OpenShift 3 for Developers
35 HoursIn this instructor-led, live training in Hong Kong, participants will learn how to use OpenShift Container Platform to deploy containerized applications.
By the end of this training, participants will be able to:
- Create and configure an OpenShift setup.
- Quickly deploy applications on-premise, in public cloud or on a hosted cloud.
Running Kubernetes on Fedora CoreOS
14 HoursThis instructor-led, live training in Hong Kong (online or onsite) is aimed at DevOps engineers and developers who wish to use Fedora CoreOS to reduce the maintenance and upgrade costs of running containerized applications on Kubernetes.
By the end of this training, participants will be able to:
- Install and configure Fedora CoreOS.
- Set up Kubernetes cluster on Fedora CoreOS.
- Run and manage Kubernetes deployments on Fedora CoreOS.
- Automatically update Fedora OS with the latest OS improvements, bug fixes, and security updates.
Deploying Kubernetes Applications with Helm
7 HoursThis instructor-led, live training in Hong Kong (online or onsite) is aimed at engineers who wish to use Helm to streamline the process of installing and managing Kubernetes applications.
By the end of this training, participants will be able to:
- Install and configure Helm.
- Create reproducible builds of Kubernetes applications.
- Share applications as Helm charts.
- Run third-party applications saved as Helm charts.
- Manage releases of Helm packages.
Introduction to Minikube and Kubernetes
21 HoursThis instructor-led, live training in Hong Kong (online or onsite) is aimed at beginner-level to intermediate-level software developers and DevOps professionals who wish to learn how to set up and manage a local Kubernetes environment using Minikube.
By the end of this training, participants will be able to:
- Install and configure Minikube on their local machine.
- Understand the basic concepts and architecture of Kubernetes.
- Deploy and manage containers using kubectl and the Minikube dashboard.
- Set up persistent storage and networking solutions for Kubernetes.
- Utilize Minikube for developing, testing, and debugging applications.
Minikube for Developers
14 HoursThis instructor-led, live training in Hong Kong (online or onsite) is aimed at intermediate-level developers and DevOps engineers who wish to use Minikube as a part of their development workflow.
By the end of this training, participants will be able to:
- Set up and manage a local Kubernetes environment using Minikube.
- Understand how to deploy, manage, and debug applications on Minikube.
- Integrate Minikube into their continuous integration and deployment pipelines.
- Optimize their development process using Minikube's advanced features.
- Apply best practices for local Kubernetes development.