Certified Kubernetes Security Specialist (CKS)

4.5/5

Enroll for the 4-day Certified Kubernetes Security Specialist Training course from Koenig Solutions. This course will help you gain knowledge and skills, and expertise in a broad range of best practices for securing container-based applications and container-side orchestrations during build, deployment, and runtime.

Training Options

Classroom Training

Online Instructor Led

Onsite Training

Course Information

Module 1: Cluster Setup

  • Verify Platform Binaries before Deploying

Module 2: Cluster Hardening

  • Restrict Access to Kubernetes API
  • Use Role Based Access Controls to Minimize Exposure
  • Exercise Caution in Using Service Accounts e.g. Disable Defaults, Minimize Permissions on Newly Created Ones
  • Update Kubernetes Frequently

Module 3: System Hardening

  • Minimize Host OS Foorprint (Reduce Attack Surface)
  • Minimize IAM Roles
  • Minimize External Access to the Network
  • Appropriately Use Kernel Hardening Tools Such as AppArmor, Seccomp

Module 4: Minimize Micro Service Vulnerabilities 

  • Setup Appropriate OS Level Security Domains e.g. Using PSP, OPA, Security Contexts
  • Manage Kubernetes Secrets
  • Use Kubernetes Runtime Sandboxes in Multi-Tenant Environments (e.g. Gvisor, Kata Containers)
  • Implement Pod to Pod encryption by use of MTLS

Module 5: Supply Chain Security 

  • Minimize Base Image Footprint
  • Secure your Supply Chain: Whitelist allowed Registries, Sign and Validate Images
  • Use Static Analysis of User Workloads (e.g. Kubernetes Resources, Docker Files) Scan Images for
  • Known Vulnerabilities

Module 6: Monitoring Logging and Runtime Security 

  • Perform Behavioral Analytics of Syscall Process and File Activities at the Host and Container Level to Detect Malicious
  • Activities
  • Detect Threats within Physical Infrastructure, Apps, Networks, Data, Users and Workloads
  • Detect All Phases of Attack Regardless Where It Occurs and How It Works
  • Perform Deep Analytical Investigation and Identification of Bad Actors within Environment Ensure
  • Immutability of Containers at Runtime
  • Use Audit Logs to Monitor Access

Audience Profile

The course is intended for cloud-native professionals to demonstrate security skills to current and potential employers.

100% Business Fulfilment

Request more Information

    Corporate Training Options

    Online Instructor Led

    Live, Online Training by top Instructors and practitioners across the globe.

    Onsite
    Training

    Conduct training at the work location you desired.

    Classroom Training

    The Venue will be ideally located and easy to access with covid-19 SOP's.

    Overseas Training

    Travel to any desired location for your training.

    What People say?

    Mohammed Aljbreen Operation Specialist, SAMA

    The Clarity of the Content was very good. The explanation of the trainer with in-depth knowledge in a proper flow really impressed me to give 5 star rating.

    Arindam Chakraborty Systems Specialist, King Abdullah University of Sciences & Technology

    The Instructor was really impressive. Clear cut explanation of every topic he covered with real time scenarios.

    Sher Afzal Khan Cloud Engineer, Cloud 9 Networks

    The Trainer and the Course Material, both are good. Good flow of explanation with simple examples. The complete training was focused on current industry challenges.

    Jawed Ahmad Siddiqui Sr. System Administrator, Saudi Ceramics

    The Trainer’s presentation was impressed me to continue the course till end. Never feel bore till the entire sessions. She studied our mindset and follows.

      Not sure,
      which course to choose?

      Our Clients across the Globe!

      Our Corporate Clients