Jetstack Consult Training
Kubernetes Security in Practice
Ensure your cluster is protected. Learn best-in-class security principles around verification, network security, image security and more.
![](/_next/image/?url=https%3A%2F%2Fcdn.venafi.com%2F994513b8-133f-0003-9fb3-9cbe4b61ffeb%2F19f17fa3-ca21-4af0-a1af-23eeb9ba6afd%2Fmattluke_edited.jpg%3Ffm%3Dwebp%26q%3D85&w=3840&q=75&dpl=dpl_EtJiiEHJWYT4ryJLxutoxERZ44JD)
What you will learn:
Knowledge
-
Kubernetes architecture overview, including the control plane, worker nodes, etc.
-
How to interact with the Kubernetes API
-
Verification and network security principles, including authentication/authorization, pod networking, service networking, policy and ingress/egress
-
Image security and container images for Kubernetes deployments including vulnerability scanners and using container image registries
Skills
-
Configuring pod security policies, using security context and implementing network segmentation
-
Implementing cluster monitoring and logging to help detect security incidents and build an effective security posture
-
Threat modeling to identify potential risks and vulnerabilities in Kubernetes clusters
Contact Jetstack Consult