My updated course “Configuring and Managing Kubernetes Security” is now available on Pluralsight here! If you want to learn about the course, check out the trailer here, or if you’re going to dive right in, check it out here!
This course will teach you the fundamentals needed to configure and manage security in Kubernetes clusters.
This course targets IT professionals who design and maintain Kubernetes and container-based solutions. The course can be used by the IT pro learning new skills and the system administrator or developer preparing to use Kubernetes both on-premises and in the Cloud.
Let’s take your Kubernetes administration and configuration skills to the next level and get you started now!
The modules of the course are:
Kubernetes Security Fundamentals - You will learn Kubernetes Security fundamentals in this module. We will start with a closer look at Authentication, the strategies available, and how you can use Users, Groups and Service Accounts to control access to the Kubernetes API. Next, you will then learn about Authorization. You will learn the different authorization models and how they are used to implement fine-grained access controls to resources in your cluster. And finally, we will take a brief look at Admission Control and how it’s used to assert administrative policy on resources deployed in your cluster.
Managing Certificates and kubeconfig Files - Certificates are core to the security model in Kubernetes. This module will teach TLS certificate basics and where and how TLS Certificates are used in Kubernetes. You will learn the required tools and techniques to create and sign certificates in your cluster via the Kubernetes API. Then finally, you will learn how to create and use kubeconfig files to configure contexts to access your clusters.
Managing Role Based Access Controls - In this module, we will look at the Kubernetes Role Based Access Control Model, which enables you to implement fine-grained controls for controlling access to resources in your cluster. You will learn how to use Rules, Verbs, and Resources to build RBAC policies and enforce those policies with Roles and ClusterRoles. Once created, you will learn how to bind those RBAC policies to users and groups with RoleBinding and ClusterRoleBinding.