Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will teach you the concepts for securing the Kubernetes underlying infrastructure.
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. In this course, Kubernetes Security: System Hardening, you’ll learn to secure the underlying Kubernetes infrastructure. First, you’ll explore how to limit the host access and use IAM roles and policies to control what users can do in the Kubernetes nodes. Next, you’ll discover best practices to have in mind while choosing and installing the packages and services in your operating system. Finally, you’ll learn how to secure the network traffic and restrict the kernel usage to make the systems more secure. When you’re finished with this course, you’ll have the skills and knowledge of security needed to perform the hardening of the systems where your Kubernetes cluster runs.
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. In this course, Kubernetes Security: System Hardening, you’ll learn to secure the underlying Kubernetes infrastructure. First, you’ll explore how to limit the host access and use IAM roles and policies to control what users can do in the Kubernetes nodes. Next, you’ll discover best practices to have in mind while choosing and installing the packages and services in your operating system. Finally, you’ll learn how to secure the network traffic and restrict the kernel usage to make the systems more secure. When you’re finished with this course, you’ll have the skills and knowledge of security needed to perform the hardening of the systems where your Kubernetes cluster runs.