Jetstack Consult Training
Kubernetes Security in Practice
Ensure your cluster is protected. Learn best-in-class security principles around verification, network security, image security and more.
What you will learn:
Knowledge
-
Kubernetes architecture overview, including the control plane, worker nodes, etc.
-
How to interact with the Kubernetes API
-
Verification and network security principles, including authentication/authorization, pod networking, service networking, policy and ingress/egress
-
Image security and container images for Kubernetes deployments including vulnerability scanners and using container image registries
Skills
-
Configuring pod security policies, using security context and implementing network segmentation
-
Implementing cluster monitoring and logging to help detect security incidents and build an effective security posture
-
Threat modeling to identify potential risks and vulnerabilities in Kubernetes clusters
Contact Jetstack Consult