Kubernetes

Become equipped with all the necessary skills for running a Kubernetes cluster securely. Training covers the best practices for the entire stack, from pods to namespaces, teaching you how to guard, isolate, and harden every component.

9 modules | 1 hr 41 min | Green Belt Level
Take a Peak into More Kubernetes

Example of Kubernetes Concepts

  • High-level architecture of Kubernetes
  • Attack surface
  • Various security threats that exist against Kubernetes
  • Examine Network Security Policy
  • Examine Pod Security Policy
  • Learn how authorization works within Kubernetes
  • Security best practices

What's Included?

We created this Green Belt path for developers coding in Kubernetes. Each of our lessons are short and conclude with a brief ten question assessment. The learning module length is purposeful – they are perfect for filling gaps in a developer’s day while code is deploying.

Secure Development Core Lesson Modules
Intro to Secure Development
Intro to Secure Coding
Secure Coding Best Practices: Part 1
Secure Coding Best Practices: Part 2
Language Typing
Securing the Development Environment
Protecting your Code Repository
Producing a Clean, Maintainable, & Secure Code Culture
Secure the Release
Designing a Secure App or Product
Thinking Like A Penetration Tester
Secure Design Principles in Action: Part 1
Secure Design Principles in Action: Part 2
Kubernetes
Green Belt Path
Introduction to Kubernetes Security
Kubernetes: Attack Surface
Kubernetes: Threat Landscape
Kubernetes: Network Policy
Kubernetes: Pod Security Policy
Kubernetes: Best Practices, Part One
Kubernetes: Best Practices, Part Two
Kubernetes: Best Practices, Part Three​
Kubernetes: Role Based Access Control (RBAC)

Experience how we turn developers into security champions.

Start Your FREE Trial Today!