TorBT - Torrents and Magnet Links Search Engine
    
    Certified Kubernetes Security Specialist (CKS) Course
- Date: 2024-12-01
 - Size: 2.1 GB
 - Files: 83
 
File Name
                Size
            Chapter 22  Behavioral Analytics at Host and Container Level/007. Change Falco Rules.mp4
                106 MB
            Chapter 2  Create Kubernetes Cluster/001. Create Kubernetes Cluster and Look at Some Errors.mp4
                83 MB
            Chapter 3  Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/001. Introduction to NetworkPolicy.mp4
                4.0 MB
            Chapter 3  Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/002. Create Default Deny NetworkPolicy.mp4
                19 MB
            Chapter 3  Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/003. Create Egress and Ingress Rules.mp4
                23 MB
            Chapter 3  Cluster Setup – Use Network Security Policies to Restrict Cluster Level Access/004. Create Another Network Policy for Different Name Space.mp4
                45 MB
            Chapter 4  Cluster Setup – Minimize Use of and Access to GUI Elements/001. Install Kubernetes Dashboard.mp4
                6.5 MB
            Chapter 4  Cluster Setup – Minimize Use of and Access to GUI Elements/002. Insecure Access from Outside.mp4
                17 MB
            Chapter 4  Cluster Setup – Minimize Use of and Access to GUI Elements/003. RBAC for Kubernetes Dashboard.mp4
                18 MB
            Chapter 5  Cluster Setup – Properly Set Up Ingress Objects with Security Control/001. Create an Ingress.mp4
                37 MB
            Chapter 5  Cluster Setup – Properly Set Up Ingress Objects with Security Control/002. Secure an Ingress.mp4
                37 MB
            Chapter 6  Protect Node Metadata and Endpoints/001. Accessing Node Metadata.mp4
                10 MB
            Chapter 6  Protect Node Metadata and Endpoints/002. Protect Node Metadata Through NetworkPolicy.mp4
                8.5 MB
            Chapter 7  Use CIS Benchmark to Review the Security Configuration of Kubernetes Components/001. kube-bench.mp4
                55 MB
            Chapter 8  Verify Platform Binaries before Deploying/001. How to Delete the Custom Network.mp4
                9.3 MB
            Chapter 8  Verify Platform Binaries before Deploying/002. Verify apiserver Binary Running in Our Cluster.mp4
                25 MB
            Chapter 9  Cluster Hardening - RBAC/001. RBAC - Role and Rolebinding.mp4
                23 MB
            Chapter 9  Cluster Hardening - RBAC/002. Role and Rolebinding for a User.mp4
                22 MB
            Chapter 9  Cluster Hardening - RBAC/003. ClusterRole and ClusterRoleBinding.mp4
                12 MB
            Chapter 9  Cluster Hardening - RBAC/004. Accounts and Users.mp4
                5.6 MB
            Chapter 9  Cluster Hardening - RBAC/005. CertificateSigningRequests.mp4
                70 MB
            Chapter 10  Exercise Caution in Using Service Accounts/001. Introduction.mp4
                1.7 MB
            Chapter 10  Exercise Caution in Using Service Accounts/002. Pod Uses Custom ServiceAccount.mp4
                55 MB
            Chapter 10  Exercise Caution in Using Service Accounts/003. Disable ServiceAccount Mounting.mp4
                26 MB
            Chapter 10  Exercise Caution in Using Service Accounts/004. Limit ServiceAccounts Permissions Using RBAC to Edit Resources.mp4
                13 MB
            Chapter 11  Cluster Hardening – Restrict API Access/001. EnableDisable Anonymous Access.mp4
                26 MB
            Chapter 11  Cluster Hardening – Restrict API Access/002. Let's Perform a Manual API Request.mp4
                74 MB
            Chapter 11  Cluster Hardening – Restrict API Access/003. External APIserver Access.mp4
                67 MB
            Chapter 11  Cluster Hardening – Restrict API Access/004. NodeRestriction AdmissionController.mp4
                6.7 MB
            Chapter 12  Cluster Hardening – Upgrade Kubernetes/001. Verify NodeRestriction.mp4
                22 MB
            Chapter 12  Cluster Hardening – Upgrade Kubernetes/002. Introduction.mp4
                16 MB
            Chapter 12  Cluster Hardening – Upgrade Kubernetes/003. Create a Cluster with the Old Version.mp4
                30 MB
            Chapter 12  Cluster Hardening – Upgrade Kubernetes/004. Upgrade Master and Worker Node.mp4
                59 MB
            Chapter 13  Microservice Vulnerabilities – Manage Kubernetes Secrets/001. Create Secret.mp4
                22 MB
            Chapter 13  Microservice Vulnerabilities – Manage Kubernetes Secrets/002. Hack Secrets in Docker.mp4
                18 MB
            Chapter 13  Microservice Vulnerabilities – Manage Kubernetes Secrets/003. Hack Secrets in ETCD.mp4
                26 MB
            Chapter 13  Microservice Vulnerabilities – Manage Kubernetes Secrets/004. ETCD Encryption.mp4
                57 MB
            Chapter 13  Microservice Vulnerabilities – Manage Kubernetes Secrets/005. ETCD Encryption -2.mp4
                34 MB
            Chapter 14  Use Container Runtime Sandboxes in a Multi-Tenant Environment/001. Calling Linux Kernel from Inside a Container.mp4
                3.9 MB
            Chapter 14  Use Container Runtime Sandboxes in a Multi-Tenant Environment/002. Open Container Initiative (OCI).mp4
                5.1 MB
            Chapter 14  Use Container Runtime Sandboxes in a Multi-Tenant Environment/003. Crictl.mp4
                5.8 MB
            Chapter 14  Use Container Runtime Sandboxes in a Multi-Tenant Environment/004. Create and Use RuntimeClasses.mp4
                18 MB
            Chapter 15  Microservices Vulnerabilities – OS Level Security Domains/001. Set Container User and Group (Security Context).mp4
                18 MB
            Chapter 15  Microservices Vulnerabilities – OS Level Security Domains/002. Force Container Non-Root.mp4
                6.5 MB
            Chapter 15  Microservices Vulnerabilities – OS Level Security Domains/003. Privileged Containers.mp4
                7.1 MB
            Chapter 15  Microservices Vulnerabilities – OS Level Security Domains/004. PrivilegeEscalation.mp4
                16 MB
            Chapter 15  Microservices Vulnerabilities – OS Level Security Domains/005. Create and Enable PodSecurityPolicy.mp4
                38 MB
            Chapter 16  Microservices Vulnerabilities – mTLS/001. Introduction.mp4
                7.3 MB
            Chapter 16  Microservices Vulnerabilities – mTLS/002. Create a Sidecar Proxy.mp4
                38 MB
            Chapter 17  Open Policy Agent (OPA)/001. Introduction OPA.mp4
                1.4 MB
            Chapter 17  Open Policy Agent (OPA)/002. Install OPA Gatekeeper.mp4
                27 MB
            Chapter 17  Open Policy Agent (OPA)/003. Deny All Policy.mp4
                36 MB
            Chapter 17  Open Policy Agent (OPA)/004. Enforce Namespace Labels.mp4
                3.4 MB
            Chapter 18  Supply Chain Security – Image Footprint/001. Reduce Image Footprint with Multi-Stage.mp4
                26 MB
            Chapter 18  Supply Chain Security – Image Footprint/002. Secure and Harden Images.mp4
                49 MB
            Chapter 19  Supply Chain Security – Static Analysis/001. Kubesec.mp4
                9.8 MB
            Chapter 19  Supply Chain Security – Static Analysis/002. Use kubesec to Perform Static Analysis Using Docker Image.mp4
                18 MB
            Chapter 19  Supply Chain Security – Static Analysis/003. OPA Conftest.mp4
                24 MB
            Chapter 19  Supply Chain Security – Static Analysis/004. OPA Conftest for Dockerfile.mp4
                16 MB
            Chapter 20  Supply Chain Security – Image Vulnerability Scanning/001. Use Trivy to Scan Images.mp4
                25 MB
            Chapter 21  Supply Chain Security – Secure Supply Chain/001. Image Digest.mp4
                44 MB
            Chapter 21  Supply Chain Security – Secure Supply Chain/002. Whitelist Registries with OPA.mp4
                29 MB
            Chapter 22  Behavioral Analytics at Host and Container Level/001. Strace.mp4
                38 MB
            Chapter 22  Behavioral Analytics at Host and Container Level/002. Strace and proc on ETCD.mp4
                65 MB
            Chapter 22  Behavioral Analytics at Host and Container Level/003. Access proc and env Variables from the Inside Pod.mp4
                32 MB
            Chapter 22  Behavioral Analytics at Host and Container Level/004. FALCO.mp4
                43 MB
            Chapter 22  Behavioral Analytics at Host and Container Level/005. Use Falco to Find Malicious Processes.mp4
                39 MB
            Chapter 22  Behavioral Analytics at Host and Container Level/006. Investigate Falco Rules.mp4
                22 MB
            Chapter 1  Become a Certified Kubernetes Security Specialist (CKS)/001. Certified Kubernetes Security Specialist (CKS).mp4
                3.6 MB
            Chapter 23  Runtime Security – Immutability of Containers at Runtime/001. Introduction.mp4
                7.3 MB
            Chapter 23  Runtime Security – Immutability of Containers at Runtime/002. StartupProbe.mp4
                18 MB
            Chapter 23  Runtime Security – Immutability of Containers at Runtime/003. SecurityContext Renders Container Immutable.mp4
                27 MB
            Chapter 24  Runtime Security - Auditing/001. Introduction.mp4
                7.0 MB
            Chapter 24  Runtime Security - Auditing/002. Audit Policy.mp4
                3.3 MB
            Chapter 24  Runtime Security - Auditing/003. Enable Audit Logging in Apiserver.mp4
                40 MB
            Chapter 24  Runtime Security - Auditing/004. Create a Secret and Check Audit Logs.mp4
                12 MB
            Chapter 25  System Hardening – Kernel Hardening/001. AppArmor.mp4
                1.5 MB
            Chapter 25  System Hardening – Kernel Hardening/002. AppArmor for Curl.mp4
                28 MB
            Chapter 25  System Hardening – Kernel Hardening/003. AppArmor for Docker Nginx.mp4
                12 MB
            Chapter 25  System Hardening – Kernel Hardening/004. AppArmor for Kubernetes Nginx.mp4
                19 MB
            Chapter 25  System Hardening – Kernel Hardening/005. Seccomp.mp4
                2.1 MB
            Chapter 25  System Hardening – Kernel Hardening/006. Seccomp for Docker Nginx.mp4
                14 MB
            Chapter 25  System Hardening – Kernel Hardening/007. Seccomp for Kubernetes Nginx.mp4
                23 MB