Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will teach you how to log and monitor security configurations in your Kubernetes clusters.
Kubernetes is an open-source system for automating deployment, scaling and management of containerized applications. In this course, Kubernetes Security: Implementing Monitoring, Logging, and Runtime Security, you’ll learn to log and monitor security incidents in your kubernetes clusters. First, you’ll explore how to identify threads at runtime using Falco. Next, you’ll discover the benefits of immutable architectures and containers. Finally, you’ll learn how to configure and use the audit logs to monitor the access to kubernetes. When you’re finished with this course, you’ll have the skills and knowledge of kubernetes needed to monitor and log security incidents at runtime.
Kubernetes is an open-source system for automating deployment, scaling and management of containerized applications. In this course, Kubernetes Security: Implementing Monitoring, Logging, and Runtime Security, you’ll learn to log and monitor security incidents in your kubernetes clusters. First, you’ll explore how to identify threads at runtime using Falco. Next, you’ll discover the benefits of immutable architectures and containers. Finally, you’ll learn how to configure and use the audit logs to monitor the access to kubernetes. When you’re finished with this course, you’ll have the skills and knowledge of kubernetes needed to monitor and log security incidents at runtime.