TorBT - Torrents and Magnet Links Search Engine
Certified Kubernetes Security Specialist (CKS)
- Date: 2025-03-11
- Size: 4.4 GB
- Files: 334
File Name
Size
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/004. 4.3 Segmentation.mp4
99 MB
Introduction/001. Certified Kubernetes Security Specialist (CKS) Introduction.mp4
24 MB
Module 1 Preparing for the CKS Exam/001. Module Introduction.en.srt
2.0 kB
Module 1 Preparing for the CKS Exam/001. Module Introduction.mp4
12 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/001. Learning objectives.en.srt
967 B
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/001. Learning objectives.mp4
6.1 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/002. 1.1 CKS Certification Requirements.en.srt
17 kB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/002. 1.1 CKS Certification Requirements.mp4
37 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/003. 1.2 Resources and Study Tools.en.srt
10 kB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/003. 1.2 Resources and Study Tools.mp4
25 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/004. 1.3 Practice Strategy.en.srt
16 kB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/004. 1.3 Practice Strategy.mp4
38 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/005. 1.4 Creating a Study Timeline and Expectations.en.srt
12 kB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/005. 1.4 Creating a Study Timeline and Expectations.mp4
27 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/001. Learning objectives.en.srt
1.1 kB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/001. Learning objectives.mp4
6.3 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/002. 2.1 Lab Environment and Architecture.en.srt
15 kB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/002. 2.1 Lab Environment and Architecture.mp4
31 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/003. 2.2 Local Installation.en.srt
7.3 kB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/003. 2.2 Local Installation.mp4
23 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/004. 2.3 Cloud Installation.en.srt
18 kB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/004. 2.3 Cloud Installation.mp4
57 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/005. 2.4 Your Cluster Up and Running.en.srt
24 kB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/005. 2.4 Your Cluster Up and Running.mp4
62 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/001. Learning objectives.en.srt
1.3 kB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/001. Learning objectives.mp4
8.2 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/002. 3.1 Cloud Native Security.en.srt
15 kB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/002. 3.1 Cloud Native Security.mp4
34 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/003. 3.2 Kubernetes Architecture.en.srt
15 kB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/003. 3.2 Kubernetes Architecture.mp4
24 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/004. 3.3 Kubernetes PKI Architecture.en.srt
7.7 kB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/004. 3.3 Kubernetes PKI Architecture.mp4
17 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/005. 3.4 Threat Modeling K8s.en.srt
8.5 kB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/005. 3.4 Threat Modeling K8s.mp4
17 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/006. 3.5 Real World K8s Hacks.en.srt
10 kB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/006. 3.5 Real World K8s Hacks.mp4
26 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/007. 3.6 OWASP Kubernetes Top 10.en.srt
9.9 kB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/007. 3.6 OWASP Kubernetes Top 10.mp4
17 MB
Module 2 Kubernetes Cluster Setup/001. Module Introduction.en.srt
825 B
Module 2 Kubernetes Cluster Setup/001. Module Introduction.mp4
5.3 MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/001. Learning objectives.en.srt
1.2 kB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/001. Learning objectives.mp4
7.0 MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/002. 4.1 Network Security Overview.en.srt
16 kB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/002. 4.1 Network Security Overview.mp4
33 MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/003. 4.2 Pod Communication Policies.en.srt
18 kB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/003. 4.2 Pod Communication Policies.mp4
39 MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/004. 4.3 Segmentation.en.srt
35 kB
Introduction/001. Certified Kubernetes Security Specialist (CKS) Introduction.en.srt
4.1 kB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/001. Learning objectives.en.srt
1.3 kB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/001. Learning objectives.mp4
8.5 MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/002. 5.1 CIS Benchmarks for Kubernetes.en.srt
3.6 kB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/002. 5.1 CIS Benchmarks for Kubernetes.mp4
10 MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/003. 5.2 Install Kube-bench.en.srt
5.5 kB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/003. 5.2 Install Kube-bench.mp4
14 MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/004. 5.3 Checking Compliance with Kube-bench.en.srt
5.8 kB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/004. 5.3 Checking Compliance with Kube-bench.mp4
29 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/001. Learning objectives.en.srt
1.4 kB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/001. Learning objectives.mp4
9.0 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/002. 6.1 Understanding Ingress.en.srt
4.7 kB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/002. 6.1 Understanding Ingress.mp4
9.2 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/003. 6.2 Creating Ingress Objects.en.srt
11 kB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/003. 6.2 Creating Ingress Objects.mp4
22 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/004. 6.3 Ingress Security Options.en.srt
13 kB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/004. 6.3 Ingress Security Options.mp4
27 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/005. 6.4 Testing Ingress Access.en.srt
12 kB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/005. 6.4 Testing Ingress Access.mp4
35 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/001. Learning objectives.en.srt
2.0 kB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/001. Learning objectives.mp4
11 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/002. 7.1 Understanding Kubelet.en.srt
12 kB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/002. 7.1 Understanding Kubelet.mp4
25 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/003. 7.2 Network Policies.en.srt
14 kB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/003. 7.2 Network Policies.mp4
29 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/004. 7.3 Node Metadata Protection.en.srt
21 kB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/004. 7.3 Node Metadata Protection.mp4
52 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/005. 7.4 Implement Kubelet Authentication.en.srt
15 kB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/005. 7.4 Implement Kubelet Authentication.mp4
36 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/006. 7.5 Test Kubelet and Node Metadata Security.en.srt
13 kB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/006. 7.5 Test Kubelet and Node Metadata Security.mp4
28 MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/001. Learning objectives.en.srt
1.4 kB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/001. Learning objectives.mp4
8.1 MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/002. 8.1 K8s Dashboard Architecture.en.srt
8.3 kB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/002. 8.1 K8s Dashboard Architecture.mp4
17 MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/003. 8.2 Dashboard Installation.en.srt
15 kB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/003. 8.2 Dashboard Installation.mp4
40 MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/004. 8.3 Role Based Access Control (RBAC).en.srt
11 kB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/004. 8.3 Role Based Access Control (RBAC).mp4
22 MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/001. Learning objectives.en.srt
1.8 kB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/001. Learning objectives.mp4
10 MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/002. 9.1 Understanding Platform Binary Integrity.en.srt
8.4 kB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/002. 9.1 Understanding Platform Binary Integrity.mp4
21 MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/003. 9.2 Download the Latest Kubernetes Release.en.srt
3.5 kB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/003. 9.2 Download the Latest Kubernetes Release.mp4
11 MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/004. 9.3 Verify Binary Checksum.en.srt
10 kB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/004. 9.3 Verify Binary Checksum.mp4
24 MB
Module 3 Cluster Hardening/001. Module Introduction.en.srt
802 B
Module 3 Cluster Hardening/001. Module Introduction.mp4
5.5 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/001. Learning objectives.en.srt
634 B
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/001. Learning objectives.mp4
4.5 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/002. 10.1 Kubernetes API Fundamentals.en.srt
10 kB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/002. 10.1 Kubernetes API Fundamentals.mp4
25 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/003. 10.2 Kubernetes Access Control.en.srt
17 kB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/003. 10.2 Kubernetes Access Control.mp4
42 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/004. 10.3 API Server Configuration.en.srt
17 kB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/004. 10.3 API Server Configuration.mp4
49 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/005. 10.4 API Server Hardening.en.srt
20 kB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/005. 10.4 API Server Hardening.mp4
62 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/006. 10.5 Verify Access Control Policies.en.srt
20 kB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/006. 10.5 Verify Access Control Policies.mp4
52 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/001. Learning objectives.en.srt
1.0 kB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/001. Learning objectives.mp4
6.2 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/002. 11.1 Understanding Kubernetes RBAC.en.srt
13 kB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/002. 11.1 Understanding Kubernetes RBAC.mp4
28 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/003. 11.2 Creating a User Account.en.srt
9.0 kB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/003. 11.2 Creating a User Account.mp4
17 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/004. 11.3 Applying Roles to a User.en.srt
16 kB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/004. 11.3 Applying Roles to a User.mp4
34 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/005. 11.4 Configuring and Binding Cluster Roles.en.srt
8.1 kB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/005. 11.4 Configuring and Binding Cluster Roles.mp4
20 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/006. 11.5 Verifying Role Rules.en.srt
14 kB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/006. 11.5 Verifying Role Rules.mp4
33 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/001. Learning objectives.en.srt
1.2 kB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/001. Learning objectives.mp4
6.7 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/002. 12.1 Understanding Service Accounts.en.srt
5.7 kB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/002. 12.1 Understanding Service Accounts.mp4
13 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/003. 12.2 Creating a Service Account.en.srt
9.3 kB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/003. 12.2 Creating a Service Account.mp4
18 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/004. 12.3 Disable Default Settings.en.srt
13 kB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/004. 12.3 Disable Default Settings.mp4
25 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/005. 12.4 Verify Service Account Permissions.en.srt
7.1 kB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/005. 12.4 Verify Service Account Permissions.mp4
17 MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/001. Learning objectives.en.srt
1.0 kB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/001. Learning objectives.mp4
6.3 MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/002. 13.1 Kubernetes Update Process.en.srt
7.8 kB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/002. 13.1 Kubernetes Update Process.mp4
18 MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/003. 13.2 Plan Upgrade Process.en.srt
9.7 kB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/003. 13.2 Plan Upgrade Process.mp4
21 MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/004. 13.3 Upgrade Components and Test.en.srt
19 kB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/004. 13.3 Upgrade Components and Test.mp4
58 MB
Module 4 System Hardening/001. Module Introduction.en.srt
934 B
Module 4 System Hardening/001. Module Introduction.mp4
6.0 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/001. Learning objectives.en.srt
688 B
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/001. Learning objectives.mp4
4.2 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/002. 14.1 Host Hardening.en.srt
17 kB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/002. 14.1 Host Hardening.mp4
43 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/003. 14.2 Remove Unneeded Services.en.srt
13 kB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/003. 14.2 Remove Unneeded Services.mp4
31 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/004. 14.3 Log System Activities.en.srt
16 kB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/004. 14.3 Log System Activities.mp4
34 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/005. 14.4 Limit Access.en.srt
13 kB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/005. 14.4 Limit Access.mp4
34 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/001. Learning objectives.en.srt
950 B
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/001. Learning objectives.mp4
5.7 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/002. 15.1 Understanding External Access to Kubernetes.en.srt
5.7 kB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/002. 15.1 Understanding External Access to Kubernetes.mp4
12 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/003. 15.2 Finding Open Ports.en.srt
10 kB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/003. 15.2 Finding Open Ports.mp4
30 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/004. 15.3 Host Firewall Configuration.en.srt
8.8 kB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/004. 15.3 Host Firewall Configuration.mp4
15 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/005. 15.4 Test Host Firewall.en.srt
8.2 kB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/005. 15.4 Test Host Firewall.mp4
26 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/001. Learning objectives.en.srt
948 B
Module 4 System Hardening/Lesson 16 Kernel Hardening/001. Learning objectives.mp4
5.5 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/002. 16.1 Understanding Kernel Threats.en.srt
11 kB
Module 4 System Hardening/Lesson 16 Kernel Hardening/002. 16.1 Understanding Kernel Threats.mp4
27 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/003. 16.2 Using Seccomp.en.srt
27 kB
Module 4 System Hardening/Lesson 16 Kernel Hardening/003. 16.2 Using Seccomp.mp4
54 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/004. 16.3 Using AppArmor.en.srt
14 kB
Module 4 System Hardening/Lesson 16 Kernel Hardening/004. 16.3 Using AppArmor.mp4
28 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/005. 16.4 Testing Kernel Security.en.srt
18 kB
Module 4 System Hardening/Lesson 16 Kernel Hardening/005. 16.4 Testing Kernel Security.mp4
44 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/001. Learning objectives.en.srt
816 B
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/001. Learning objectives.mp4
5.1 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/002. 17.1 Principle of Least Privilege.en.srt
8.6 kB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/002. 17.1 Principle of Least Privilege.mp4
20 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/003. 17.2 Host Based IAM.en.srt
14 kB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/003. 17.2 Host Based IAM.mp4
33 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/004. 17.3 Restricting User Privileges.en.srt
14 kB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/004. 17.3 Restricting User Privileges.mp4
20 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/005. 17.4 Controlling File Access and User Logging.en.srt
12 kB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/005. 17.4 Controlling File Access and User Logging.mp4
22 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/006. 17.5 Understanding Cloud RBAC.en.srt
5.8 kB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/006. 17.5 Understanding Cloud RBAC.mp4
14 MB
Module 5 Minimize Microservice Vulnerabilities/001. Module Introduction.en.srt
1.0 kB
Module 5 Minimize Microservice Vulnerabilities/001. Module Introduction.mp4
6.8 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/001. Learning objectives.en.srt
1.1 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/001. Learning objectives.mp4
7.2 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/002. 18.1 Understanding Pod Security.en.srt
25 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/002. 18.1 Understanding Pod Security.mp4
52 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/003. 18.2 Configure Security Contexts.en.srt
27 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/003. 18.2 Configure Security Contexts.mp4
48 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/004. 18.3 Pod Security Admission.en.srt
12 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/004. 18.3 Pod Security Admission.mp4
23 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/005. 18.4 OPA Gatekeeper.en.srt
22 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/005. 18.4 OPA Gatekeeper.mp4
40 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/001. Learning objectives.en.srt
965 B
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/001. Learning objectives.mp4
5.8 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/002. 19.1 Understanding Kubernetes Secrets.en.srt
5.4 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/002. 19.1 Understanding Kubernetes Secrets.mp4
14 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/003. 19.2 Creating and Using a Secret.en.srt
9.6 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/003. 19.2 Creating and Using a Secret.mp4
17 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/004. 19.3 Using Secrets in Pods.en.srt
5.2 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/004. 19.3 Using Secrets in Pods.mp4
8.8 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/005. 19.4 Encrypting Secrets at Rest.en.srt
18 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/005. 19.4 Encrypting Secrets at Rest.mp4
38 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/001. Learning objectives.en.srt
843 B
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/001. Learning objectives.mp4
5.0 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/002. 20.1 Containing Containers.en.srt
8.8 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/002. 20.1 Containing Containers.mp4
20 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/003. 20.2 Sandboxed Pods.en.srt
25 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/003. 20.2 Sandboxed Pods.mp4
54 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/004. 20.3 Using gVisor.en.srt
13 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/004. 20.3 Using gVisor.mp4
25 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/005. 20.4 Using Kata Containers.en.srt
14 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/005. 20.4 Using Kata Containers.mp4
32 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/001. Learning objectives.en.srt
823 B
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/001. Learning objectives.mp4
5.4 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/002. 21.1 Introduction to Cilium and mTLS.en.srt
9.9 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/002. 21.1 Introduction to Cilium and mTLS.mp4
20 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/003. 21.2 Using Cilium for Pod-to-Pod Encryption.en.srt
26 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/003. 21.2 Using Cilium for Pod-to-Pod Encryption.mp4
65 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/004. 21.3 Deploying and Verifying mTLS with Cilium.en.srt
16 kB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/004. 21.3 Deploying and Verifying mTLS with Cilium.mp4
35 MB
Module 6 Software Supply Chain Security/001. Module Introduction.en.srt
953 B
Module 6 Software Supply Chain Security/001. Module Introduction.mp4
6.0 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/001. Learning objectives.en.srt
720 B
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/001. Learning objectives.mp4
4.7 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/002. 22.1 Software Supply Chain Risks.en.srt
16 kB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/002. 22.1 Software Supply Chain Risks.mp4
34 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/003. 22.2 Protect Image Registry Access.en.srt
8.9 kB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/003. 22.2 Protect Image Registry Access.mp4
20 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/004. 22.3 Require Signed Images.en.srt
22 kB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/004. 22.3 Require Signed Images.mp4
46 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/005. 22.4 Policy Enforcement Image Policy Webhook.en.srt
33 kB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/005. 22.4 Policy Enforcement Image Policy Webhook.mp4
78 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/006. 22.5 Policy Enforcement Validating Admission Policy.en.srt
14 kB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/006. 22.5 Policy Enforcement Validating Admission Policy.mp4
32 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.en.srt
963 B
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.mp4
5.3 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.en.srt
9.9 kB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.mp4
22 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.en.srt
6.9 kB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.mp4
23 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.en.srt
6.9 kB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.mp4
24 MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/001. Learning objectives.en.srt
625 B
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/001. Learning objectives.mp4
4.3 MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/002. 24.1 Understanding Container Images.en.srt
15 kB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/002. 24.1 Understanding Container Images.mp4
36 MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/003. 24.2 Use Image Creation Good Practices.en.srt
12 kB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/003. 24.2 Use Image Creation Good Practices.mp4
31 MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/004. 24.3 Reduce Image Attack Surface.en.srt
9.8 kB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/004. 24.3 Reduce Image Attack Surface.mp4
25 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.en.srt
1.2 kB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.mp4
6.9 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.en.srt
7.6 kB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.mp4
18 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.en.srt
13 kB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.mp4
30 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.en.srt
16 kB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.mp4
49 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.en.srt
20 kB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.mp4
41 MB
Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.en.srt
965 B
Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.mp4
6.0 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.en.srt
1.1 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.mp4
6.7 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.en.srt
10 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.mp4
23 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.en.srt
8.0 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.mp4
25 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.en.srt
13 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.mp4
36 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.en.srt
770 B
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.mp4
5.0 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.en.srt
13 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.mp4
27 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.en.srt
20 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.mp4
50 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.en.srt
4.9 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.mp4
13 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.en.srt
12 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.mp4
32 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.en.srt
1.1 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.mp4
6.5 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.en.srt
20 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.mp4
52 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.en.srt
11 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.mp4
26 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.en.srt
23 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.mp4
60 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.en.srt
23 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.mp4
43 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.en.srt
12 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.mp4
27 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.en.srt
30 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.mp4
90 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.en.srt
699 B
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.mp4
4.7 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.en.srt
19 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.mp4
55 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.en.srt
7.3 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.mp4
15 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.en.srt
18 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.mp4
52 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.en.srt
13 kB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.mp4
41 MB
Module 8 Exam Practice Scenarios/001. Module Introduction.en.srt
1.0 kB
Module 8 Exam Practice Scenarios/001. Module Introduction.mp4
6.2 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.en.srt
1.2 kB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.mp4
7.4 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.en.srt
20 kB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.mp4
44 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).en.srt
18 kB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).mp4
37 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.en.srt
18 kB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.mp4
45 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.en.srt
17 kB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.mp4
36 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.en.srt
18 kB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.mp4
46 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.en.srt
1.4 kB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.mp4
8.2 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.en.srt
17 kB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.mp4
38 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.en.srt
26 kB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.mp4
61 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.en.srt
18 kB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.mp4
47 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.en.srt
21 kB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.mp4
43 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.en.srt
24 kB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.mp4
68 MB
Summary/001. Certified Kubernetes Security Specialist (CKS) Summary.en.srt
2.5 kB
Summary/001. Certified Kubernetes Security Specialist (CKS) Summary.mp4
15 MB