MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

Certified Kubernetes Security Specialist (CKS)

磁力链接/BT种子名称

Certified Kubernetes Security Specialist (CKS)

磁力链接/BT种子简介

种子哈希:86af8909e9ac8cc9b75d3ab35945b320fa4f6015
文件大小: 4.4G
已经下载:1408次
下载速度:极快
收录时间:2025-02-26
最近下载:2025-08-12

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:86AF8909E9AC8CC9B75D3AB35945B320FA4F6015
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 TikTok成人版 PornHub 草榴社区 哆哔涩漫 呦乐园 萝莉岛

最近搜索

男技师 lisa ann 岩本あい wild. things 徳山弘子 阿姨 国产勾引按摩女 无套 三飞 腰 mompov+-+mallory 自慰喷水合集 电影 fc2 preteen 若妻の the enforcer 这腿玩一年颜值 midv+-+734+ 2025樱 粉丝房 spec spec 259luxu-467+高坂麗子 waaa+uncen ssis386 带老婆 stsk 无套 虎牙++静静 甜儿儿 苏小涵

文件列表

  • Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/004. 4.3 Segmentation.mp4 104.0 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.mp4 94.9 MB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/005. 22.4 Policy Enforcement Image Policy Webhook.mp4 82.1 MB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.mp4 71.0 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/003. 21.2 Using Cilium for Pod-to-Pod Encryption.mp4 68.1 MB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/005. 10.4 API Server Hardening.mp4 65.4 MB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/005. 2.4 Your Cluster Up and Running.mp4 64.8 MB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.mp4 64.4 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.mp4 63.1 MB
  • Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/004. 13.3 Upgrade Components and Test.mp4 60.6 MB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/004. 2.3 Cloud Installation.mp4 60.0 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.mp4 57.2 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/003. 20.2 Sandboxed Pods.mp4 56.4 MB
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/003. 16.2 Using Seccomp.mp4 56.1 MB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/006. 10.5 Verify Access Control Policies.mp4 54.8 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/002. 18.1 Understanding Pod Security.mp4 54.5 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.mp4 54.4 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.mp4 54.3 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/004. 7.3 Node Metadata Protection.mp4 54.3 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.mp4 52.8 MB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/004. 10.3 API Server Configuration.mp4 51.8 MB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.mp4 51.1 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/003. 18.2 Configure Security Contexts.mp4 50.0 MB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.mp4 49.1 MB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/004. 22.3 Require Signed Images.mp4 48.5 MB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.mp4 48.2 MB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.mp4 47.0 MB
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/005. 16.4 Testing Kernel Security.mp4 46.3 MB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.mp4 45.9 MB
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/002. 14.1 Host Hardening.mp4 45.3 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.mp4 45.2 MB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.mp4 44.7 MB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/003. 10.2 Kubernetes Access Control.mp4 44.6 MB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.mp4 43.3 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.mp4 43.1 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/005. 18.4 OPA Gatekeeper.mp4 42.2 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/003. 8.2 Dashboard Installation.mp4 42.2 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/003. 4.2 Pod Communication Policies.mp4 41.2 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/005. 19.4 Encrypting Secrets at Rest.mp4 40.1 MB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.mp4 40.0 MB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/004. 1.3 Practice Strategy.mp4 39.4 MB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/002. 1.1 CKS Certification Requirements.mp4 39.2 MB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).mp4 38.4 MB
  • Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/002. 24.1 Understanding Container Images.mp4 38.3 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.mp4 37.9 MB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.mp4 37.4 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/005. 7.4 Implement Kubelet Authentication.mp4 37.2 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/005. 6.4 Testing Ingress Access.mp4 36.8 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/004. 21.3 Deploying and Verifying mTLS with Cilium.mp4 36.2 MB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/002. 22.1 Software Supply Chain Risks.mp4 36.0 MB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/004. 11.3 Applying Roles to a User.mp4 35.5 MB
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/004. 14.3 Log System Activities.mp4 35.4 MB
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/005. 14.4 Limit Access.mp4 35.4 MB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/002. 3.1 Cloud Native Security.mp4 35.3 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/002. 4.1 Network Security Overview.mp4 34.6 MB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/003. 17.2 Host Based IAM.mp4 34.6 MB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/006. 11.5 Verifying Role Rules.mp4 34.6 MB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/006. 22.5 Policy Enforcement Validating Admission Policy.mp4 34.1 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.mp4 33.7 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/005. 20.4 Using Kata Containers.mp4 33.1 MB
  • Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/003. 24.2 Use Image Creation Good Practices.mp4 32.5 MB
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/003. 14.2 Remove Unneeded Services.mp4 32.3 MB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/002. 2.1 Lab Environment and Architecture.mp4 32.1 MB
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/003. 15.2 Finding Open Ports.mp4 32.0 MB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.mp4 31.6 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/004. 5.3 Checking Compliance with Kube-bench.mp4 30.4 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/003. 7.2 Network Policies.mp4 30.2 MB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/002. 11.1 Understanding Kubernetes RBAC.mp4 29.6 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/006. 7.5 Test Kubelet and Node Metadata Security.mp4 28.9 MB
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/004. 16.3 Using AppArmor.mp4 28.8 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.mp4 28.7 MB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/005. 1.4 Creating a Study Timeline and Expectations.mp4 28.6 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.mp4 28.4 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/004. 6.3 Ingress Security Options.mp4 28.0 MB
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/002. 16.1 Understanding Kernel Threats.mp4 27.9 MB
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/005. 15.4 Test Host Firewall.mp4 27.7 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.mp4 27.7 MB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/006. 3.5 Real World K8s Hacks.mp4 27.1 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/004. 20.3 Using gVisor.mp4 26.6 MB
  • Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/004. 24.3 Reduce Image Attack Surface.mp4 26.5 MB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/003. 1.2 Resources and Study Tools.mp4 26.2 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/002. 7.1 Understanding Kubelet.mp4 26.1 MB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/004. 12.3 Disable Default Settings.mp4 26.1 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.mp4 26.1 MB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/002. 10.1 Kubernetes API Fundamentals.mp4 26.0 MB
  • Introduction/001. Certified Kubernetes Security Specialist (CKS) Introduction.mp4 25.5 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/004. 9.3 Verify Binary Checksum.mp4 25.5 MB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/003. 3.2 Kubernetes Architecture.mp4 25.0 MB
  • Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.mp4 24.9 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.mp4 24.4 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/004. 18.3 Pod Security Admission.mp4 24.3 MB
  • Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.mp4 23.8 MB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/003. 2.2 Local Installation.mp4 23.8 MB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/005. 17.4 Controlling File Access and User Logging.mp4 23.3 MB
  • Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.mp4 23.2 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/004. 8.3 Role Based Access Control (RBAC).mp4 22.8 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/003. 6.2 Creating Ingress Objects.mp4 22.7 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/002. 9.1 Understanding Platform Binary Integrity.mp4 22.4 MB
  • Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/003. 13.2 Plan Upgrade Process.mp4 21.7 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/002. 21.1 Introduction to Cilium and mTLS.mp4 21.5 MB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/004. 17.3 Restricting User Privileges.mp4 21.4 MB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/002. 17.1 Principle of Least Privilege.mp4 21.2 MB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/003. 22.2 Protect Image Registry Access.mp4 20.7 MB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/005. 11.4 Configuring and Binding Cluster Roles.mp4 20.6 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/002. 20.1 Containing Containers.mp4 20.4 MB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/003. 12.2 Creating a Service Account.mp4 19.1 MB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.mp4 18.4 MB
  • Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/002. 13.1 Kubernetes Update Process.mp4 18.4 MB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/005. 3.4 Threat Modeling K8s.mp4 18.2 MB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/007. 3.6 OWASP Kubernetes Top 10.mp4 17.9 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/002. 8.1 K8s Dashboard Architecture.mp4 17.9 MB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/004. 3.3 Kubernetes PKI Architecture.mp4 17.8 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/003. 19.2 Creating and Using a Secret.mp4 17.7 MB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/005. 12.4 Verify Service Account Permissions.mp4 17.6 MB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/003. 11.2 Creating a User Account.mp4 17.5 MB
  • Summary/001. Certified Kubernetes Security Specialist (CKS) Summary.mp4 16.0 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.mp4 15.9 MB
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/004. 15.3 Host Firewall Configuration.mp4 15.7 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/003. 5.2 Install Kube-bench.mp4 15.0 MB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/006. 17.5 Understanding Cloud RBAC.mp4 14.7 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/002. 19.1 Understanding Kubernetes Secrets.mp4 14.6 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.mp4 13.3 MB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/002. 12.1 Understanding Service Accounts.mp4 13.2 MB
  • Module 1 Preparing for the CKS Exam/001. Module Introduction.mp4 12.8 MB
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/002. 15.1 Understanding External Access to Kubernetes.mp4 12.3 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/001. Learning objectives.mp4 11.5 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/003. 9.2 Download the Latest Kubernetes Release.mp4 11.1 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/002. 5.1 CIS Benchmarks for Kubernetes.mp4 10.9 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/001. Learning objectives.mp4 10.5 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/002. 6.1 Understanding Ingress.mp4 9.6 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/001. Learning objectives.mp4 9.4 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/004. 19.3 Using Secrets in Pods.mp4 9.2 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/001. Learning objectives.mp4 9.0 MB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/001. Learning objectives.mp4 8.6 MB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.mp4 8.6 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/001. Learning objectives.mp4 8.5 MB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.mp4 7.7 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/001. Learning objectives.mp4 7.5 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/001. Learning objectives.mp4 7.3 MB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.mp4 7.2 MB
  • Module 5 Minimize Microservice Vulnerabilities/001. Module Introduction.mp4 7.1 MB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/001. Learning objectives.mp4 7.0 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.mp4 7.0 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.mp4 6.8 MB
  • Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/001. Learning objectives.mp4 6.6 MB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/001. Learning objectives.mp4 6.6 MB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/001. Learning objectives.mp4 6.5 MB
  • Module 8 Exam Practice Scenarios/001. Module Introduction.mp4 6.5 MB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/001. Learning objectives.mp4 6.4 MB
  • Module 4 System Hardening/001. Module Introduction.mp4 6.3 MB
  • Module 6 Software Supply Chain Security/001. Module Introduction.mp4 6.3 MB
  • Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.mp4 6.3 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/001. Learning objectives.mp4 6.1 MB
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/001. Learning objectives.mp4 6.0 MB
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/001. Learning objectives.mp4 5.8 MB
  • Module 3 Cluster Hardening/001. Module Introduction.mp4 5.7 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/001. Learning objectives.mp4 5.7 MB
  • Module 2 Kubernetes Cluster Setup/001. Module Introduction.mp4 5.6 MB
  • Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.mp4 5.5 MB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/001. Learning objectives.mp4 5.3 MB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/001. Learning objectives.mp4 5.2 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.mp4 5.2 MB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/001. Learning objectives.mp4 4.9 MB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.mp4 4.9 MB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/001. Learning objectives.mp4 4.7 MB
  • Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/001. Learning objectives.mp4 4.5 MB
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/001. Learning objectives.mp4 4.4 MB
  • Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/004. 4.3 Segmentation.en.srt 35.5 kB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/005. 22.4 Policy Enforcement Image Policy Webhook.en.srt 33.9 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.en.srt 31.2 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/003. 18.2 Configure Security Contexts.en.srt 28.0 kB
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/003. 16.2 Using Seccomp.en.srt 28.0 kB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.en.srt 27.0 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/003. 21.2 Using Cilium for Pod-to-Pod Encryption.en.srt 26.9 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/002. 18.1 Understanding Pod Security.en.srt 26.0 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/003. 20.2 Sandboxed Pods.en.srt 25.7 kB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/005. 2.4 Your Cluster Up and Running.en.srt 24.5 kB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.en.srt 24.4 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.en.srt 23.2 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.en.srt 23.2 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/005. 18.4 OPA Gatekeeper.en.srt 22.9 kB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/004. 22.3 Require Signed Images.en.srt 22.5 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/004. 7.3 Node Metadata Protection.en.srt 21.5 kB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.en.srt 21.5 kB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/006. 10.5 Verify Access Control Policies.en.srt 21.0 kB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/005. 10.4 API Server Hardening.en.srt 20.6 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.en.srt 20.5 kB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.en.srt 20.4 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.en.srt 20.2 kB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.en.srt 20.1 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.en.srt 19.3 kB
  • Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/004. 13.3 Upgrade Components and Test.en.srt 19.3 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/005. 19.4 Encrypting Secrets at Rest.en.srt 18.9 kB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.en.srt 18.7 kB
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/005. 16.4 Testing Kernel Security.en.srt 18.6 kB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/004. 2.3 Cloud Installation.en.srt 18.5 kB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).en.srt 18.5 kB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.en.srt 18.4 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/003. 4.2 Pod Communication Policies.en.srt 18.4 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.en.srt 18.0 kB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.en.srt 17.9 kB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/004. 10.3 API Server Configuration.en.srt 17.7 kB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/003. 10.2 Kubernetes Access Control.en.srt 17.7 kB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.en.srt 17.6 kB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.en.srt 17.5 kB
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/002. 14.1 Host Hardening.en.srt 17.4 kB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/002. 1.1 CKS Certification Requirements.en.srt 17.2 kB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.en.srt 16.9 kB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/004. 1.3 Practice Strategy.en.srt 16.8 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/002. 4.1 Network Security Overview.en.srt 16.6 kB
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/004. 14.3 Log System Activities.en.srt 16.5 kB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/002. 22.1 Software Supply Chain Risks.en.srt 16.3 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/004. 21.3 Deploying and Verifying mTLS with Cilium.en.srt 16.0 kB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/004. 11.3 Applying Roles to a User.en.srt 16.0 kB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/002. 2.1 Lab Environment and Architecture.en.srt 15.7 kB
  • Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/002. 24.1 Understanding Container Images.en.srt 15.3 kB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/002. 3.1 Cloud Native Security.en.srt 15.3 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/003. 8.2 Dashboard Installation.en.srt 15.2 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/005. 7.4 Implement Kubelet Authentication.en.srt 15.1 kB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/003. 3.2 Kubernetes Architecture.en.srt 15.0 kB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/004. 17.3 Restricting User Privileges.en.srt 14.9 kB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/006. 22.5 Policy Enforcement Validating Admission Policy.en.srt 14.7 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/005. 20.4 Using Kata Containers.en.srt 14.7 kB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/006. 11.5 Verifying Role Rules.en.srt 14.5 kB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/003. 17.2 Host Based IAM.en.srt 14.1 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/003. 7.2 Network Policies.en.srt 14.0 kB
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/004. 16.3 Using AppArmor.en.srt 13.9 kB
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/005. 14.4 Limit Access.en.srt 13.5 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/004. 6.3 Ingress Security Options.en.srt 13.4 kB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/004. 12.3 Disable Default Settings.en.srt 13.4 kB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/002. 11.1 Understanding Kubernetes RBAC.en.srt 13.3 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.en.srt 13.2 kB
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/003. 14.2 Remove Unneeded Services.en.srt 13.2 kB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.en.srt 13.2 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/004. 20.3 Using gVisor.en.srt 13.2 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/006. 7.5 Test Kubelet and Node Metadata Security.en.srt 13.0 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.en.srt 12.9 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.en.srt 12.9 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.en.srt 12.8 kB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/005. 1.4 Creating a Study Timeline and Expectations.en.srt 12.4 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/004. 18.3 Pod Security Admission.en.srt 12.4 kB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/005. 17.4 Controlling File Access and User Logging.en.srt 12.4 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.en.srt 12.3 kB
  • Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/003. 24.2 Use Image Creation Good Practices.en.srt 11.9 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/005. 6.4 Testing Ingress Access.en.srt 11.8 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/002. 7.1 Understanding Kubelet.en.srt 11.7 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/004. 8.3 Role Based Access Control (RBAC).en.srt 11.2 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.en.srt 11.2 kB
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/002. 16.1 Understanding Kernel Threats.en.srt 11.0 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/003. 6.2 Creating Ingress Objects.en.srt 10.9 kB
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/003. 15.2 Finding Open Ports.en.srt 10.8 kB
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/002. 10.1 Kubernetes API Fundamentals.en.srt 10.7 kB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/006. 3.5 Real World K8s Hacks.en.srt 10.5 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/004. 9.3 Verify Binary Checksum.en.srt 10.4 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.en.srt 10.3 kB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/003. 1.2 Resources and Study Tools.en.srt 10.3 kB
  • Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.en.srt 10.2 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/002. 21.1 Introduction to Cilium and mTLS.en.srt 10.1 kB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/007. 3.6 OWASP Kubernetes Top 10.en.srt 10.1 kB
  • Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/004. 24.3 Reduce Image Attack Surface.en.srt 10.0 kB
  • Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/003. 13.2 Plan Upgrade Process.en.srt 9.9 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/003. 19.2 Creating and Using a Secret.en.srt 9.9 kB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/003. 12.2 Creating a Service Account.en.srt 9.5 kB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/003. 11.2 Creating a User Account.en.srt 9.2 kB
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/003. 22.2 Protect Image Registry Access.en.srt 9.1 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/002. 20.1 Containing Containers.en.srt 9.0 kB
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/004. 15.3 Host Firewall Configuration.en.srt 9.0 kB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/002. 17.1 Principle of Least Privilege.en.srt 8.8 kB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/005. 3.4 Threat Modeling K8s.en.srt 8.7 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/002. 9.1 Understanding Platform Binary Integrity.en.srt 8.6 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/002. 8.1 K8s Dashboard Architecture.en.srt 8.5 kB
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/005. 15.4 Test Host Firewall.en.srt 8.4 kB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/005. 11.4 Configuring and Binding Cluster Roles.en.srt 8.3 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.en.srt 8.2 kB
  • Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/002. 13.1 Kubernetes Update Process.en.srt 8.0 kB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/004. 3.3 Kubernetes PKI Architecture.en.srt 7.9 kB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.en.srt 7.8 kB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/003. 2.2 Local Installation.en.srt 7.5 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.en.srt 7.5 kB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/005. 12.4 Verify Service Account Permissions.en.srt 7.3 kB
  • Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.en.srt 7.1 kB
  • Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.en.srt 7.0 kB
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/006. 17.5 Understanding Cloud RBAC.en.srt 5.9 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/004. 5.3 Checking Compliance with Kube-bench.en.srt 5.9 kB
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/002. 15.1 Understanding External Access to Kubernetes.en.srt 5.8 kB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/002. 12.1 Understanding Service Accounts.en.srt 5.8 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/003. 5.2 Install Kube-bench.en.srt 5.7 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/002. 19.1 Understanding Kubernetes Secrets.en.srt 5.5 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/004. 19.3 Using Secrets in Pods.en.srt 5.3 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.en.srt 5.0 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/002. 6.1 Understanding Ingress.en.srt 4.9 kB
  • Introduction/001. Certified Kubernetes Security Specialist (CKS) Introduction.en.srt 4.2 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/002. 5.1 CIS Benchmarks for Kubernetes.en.srt 3.7 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/003. 9.2 Download the Latest Kubernetes Release.en.srt 3.6 kB
  • Summary/001. Certified Kubernetes Security Specialist (CKS) Summary.en.srt 2.6 kB
  • Module 1 Preparing for the CKS Exam/001. Module Introduction.en.srt 2.0 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/001. Learning objectives.en.srt 2.0 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/001. Learning objectives.en.srt 1.8 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/001. Learning objectives.en.srt 1.4 kB
  • Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.en.srt 1.4 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/001. Learning objectives.en.srt 1.4 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/001. Learning objectives.en.srt 1.4 kB
  • Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/001. Learning objectives.en.srt 1.3 kB
  • Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.en.srt 1.3 kB
  • Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/001. Learning objectives.en.srt 1.3 kB
  • Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/001. Learning objectives.en.srt 1.2 kB
  • Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.en.srt 1.2 kB
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/001. Learning objectives.en.srt 1.2 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.en.srt 1.1 kB
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.en.srt 1.1 kB
  • Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/001. Learning objectives.en.srt 1.1 kB
  • Module 8 Exam Practice Scenarios/001. Module Introduction.en.srt 1.1 kB
  • Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/001. Learning objectives.en.srt 1.0 kB
  • Module 5 Minimize Microservice Vulnerabilities/001. Module Introduction.en.srt 1.0 kB
  • Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/001. Learning objectives.en.srt 1.0 kB
  • Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/001. Learning objectives.en.srt 967 Bytes
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/001. Learning objectives.en.srt 965 Bytes
  • Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.en.srt 965 Bytes
  • Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.en.srt 963 Bytes
  • Module 6 Software Supply Chain Security/001. Module Introduction.en.srt 953 Bytes
  • Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/001. Learning objectives.en.srt 950 Bytes
  • Module 4 System Hardening/Lesson 16 Kernel Hardening/001. Learning objectives.en.srt 948 Bytes
  • Module 4 System Hardening/001. Module Introduction.en.srt 934 Bytes
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/001. Learning objectives.en.srt 843 Bytes
  • Module 2 Kubernetes Cluster Setup/001. Module Introduction.en.srt 825 Bytes
  • Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/001. Learning objectives.en.srt 823 Bytes
  • Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/001. Learning objectives.en.srt 816 Bytes
  • Module 3 Cluster Hardening/001. Module Introduction.en.srt 802 Bytes
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.en.srt 770 Bytes
  • Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/001. Learning objectives.en.srt 720 Bytes
  • Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.en.srt 699 Bytes
  • Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/001. Learning objectives.en.srt 688 Bytes
  • Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/001. Learning objectives.en.srt 634 Bytes
  • Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/001. Learning objectives.en.srt 625 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!