Kubernetes Security Essentials (LFS260) + CKS Exam Bundle

Kód kurzu: LFS260B

Táto časť nie je lokalizovaná

This course exposes you to knowledge and skills needed to maintain security in dynamic, multi-project environments. This course addresses security concerns for cloud production environments and covers topics related to the security container supply chain, discussing topics from before a cluster has been configured through deployment, and ongoing, as well as agile use, including where to find ongoing security and vulnerability information. The course includes hands-on labs to build and secure a Kubernetes cluster, as well as monitor and log security events.

Obtaining a CKS demonstrates a candidate possesses the requisite abilities to secure container-based applications and Kubernetes platforms during build, deployment and runtime, and is qualified to perform these tasks in a professional setting.

Odborní
certifikovaní lektori

Mezinárodne
uznávané certifikácie

Široká ponuka technických
a soft skills kurzov

Skvelý zákaznicky
servis

Prispôsobenie kurzov
presne na mieru

Termíny kurzov

Počiatočný dátum: Na vyžiadanie

Forma: Self-Paced

Dĺžka kurzu: 365 dní

Jazyk: en

Cena bez DPH: 565 EUR

Registrovať

Počiatočný
dátum
Miesto
konania
Forma Dĺžka
kurzu
Jazyk Cena bez DPH
Na vyžiadanie Self-Paced 365 dní en 565 EUR Registrovať
G Garantovaný kurz

Nenašli ste vhodný termín?

Napíšte nám o vypísanie alternatívneho termínu na mieru.

Kontakt

Cieľová skupina

Táto časť nie je lokalizovaná

A Certified Kubernetes Security Specialist (CKS) is an accomplished Kubernetes practitioner (must be CKA certified) who has demonstrated competence on a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment and runtime.

Štruktúra kurzu

Táto časť nie je lokalizovaná

Chapter 1. Course Introduction
Chapter 2. Cloud Security Overview
Chapter 3. Preparing to Install
Chapter 4. Installing the Cluster
Chapter 5. Securing the kube-apiserver
Chapter 6. Networking
Chapter 7. Workload Considerations
Chapter 8. Issue Detection
Chapter 9. Domain Review