Use Code TRYNOW15 for a One-Time, Extra 15% OFF at KodeKloud
Kubernetes
Cloud
Security
Certification

Kubernetes and Cloud Native Security Associate (KCSA)

Master Kubernetes security and achieve KCSA certification with confidence.
Mumshad Mannambeth
Founder & CEO, KodeKloud
Nimesha Jinarajadasa
Lead DevOps & Cloud Engineer
DevOps Pre-Requisite Course
Play Button
Fill this form to get a notification when course is released.
book
8
Lessons
book
Challenges
Article icon
86
Topics

What you’ll learn

Our students work at..

Description

In the rapidly evolving world of IT infrastructure, ensuring the security of your Kubernetes clusters and cloud-native applications is critical. The Kubernetes and Cloud Security Associate (KCSA) course is designed to equip you with comprehensive skills and knowledge to protect your cloud-native environments against potential threats. Whether you are an IT professional, security engineer, or systems architect, this course will provide you with the tools necessary to secure your Kubernetes deployments effectively.

Course Topics:

Overview of Cloud Native Security This section provides a broad introduction to cloud-native security, focusing on the principles and techniques needed to secure cloud environments. You will learn about the foundational 4Cs of Cloud Native Security (Code, Container, Cluster, Cloud), how cloud provider security works, and strategies for maintaining security at each level of your cloud-native stack.

Kubernetes Cluster Component Security This section delves into the security of individual Kubernetes components. You'll explore how to secure critical elements like the API server, etcd, and the kubelet, ensuring robust protection against potential threats. The focus is on securing communication within the cluster and implementing best practices to protect the cluster's core components.

Kubernetes Security Fundamentals Here, you will gain an in-depth understanding of essential Kubernetes security mechanisms. This section covers pod security standards, effective secrets management, and network policies, providing a solid foundation for securing Kubernetes deployments. You'll learn how to authenticate users, authorize actions, and audit activities within your cluster.

Kubernetes Threat Model Understanding the potential threats to Kubernetes environments is crucial. This section teaches you to identify and mitigate various attack vectors, including denial of service attacks, malicious code execution, and network threats. You'll learn strategies to protect against these threats and manage the security of compromised containers.

Platform Security This section focuses on securing the broader platform supporting your Kubernetes clusters. Topics include supply chain security, ensuring the security of image repositories, enhancing observability, and implementing service meshes for improved security. You will also learn about securing connectivity and managing Kubernetes Public Key Infrastructure (PKI).

Compliance and Security Frameworks Learn how to align your Kubernetes security practices with industry standards and compliance frameworks. This section covers key frameworks like NIST, CIS, GDPR, and PCI DSS, ensuring your deployments meet regulatory requirements. Additionally, you'll explore threat modeling frameworks such as STRIDE, DREAD, and PASTA, learning how to apply these models to identify and mitigate potential threats. Continuous security assessment tools and practices will also be covered to maintain compliance and security standards.

Upon completion of this course, participants will possess a robust understanding of how to secure their Kubernetes environments effectively, implement security best practices, and ensure compliance with industry standards. They will be well-prepared to tackle the unique security challenges presented by cloud-native architectures.

Read More

What our students say

About the instructor

Mumshad Mannambeth, Founder and CEO of KodeKloud, is renowned for revolutionizing online learning in DevOps, Cloud Computing, and Automation. 

Mumshad has also worked for Dell EMC, he held various roles including Solutions Architect/Developer and Storage Operations Specialist, where he specialized in storage automation and cloud deployment solutions. His contributions in application modernization and cloud migration are notable.

Mumshad has led teams in APAC, focusing on DevOps and Cloud Automation. His expertise in designing and deploying applications on Microsoft Azure and developing CI/CD pipelines has been pivotal in his professional journey.

He's widely recognized as a Knowledge Sharing Author and has been honored with Excellence@EMC awards in multiple categories.

Mumshad Mannambeth's blend of technical expertise and educational innovation has made him a popular figure in the tech community, and his work at KodeKloud continues to impact and upskill engineers globally.

About the instructor

With over seven years of Industry experience, Nimesha is a Lead DevOps and Cloud Engineer who is passionate about technology's potential to solve complex problems quickly. He is dedicated to learning new technologies and aims to create more opportunities for the modern world.

No items found.

Introduction

lock
lock
2
Topics
Lesson Content

Module Content

Course Introduction 03:54
Join Our Community

Overview of Cloud Native Security

lock
lock
8
Topics
Lesson Content

Module Content

The Attack 08:03
The 4Cs of Cloud Native Security 02:32
Cloud Provider Security 07:05
Infrastructure Security 04:40
Kubernetes Isolation Techniques 04:20
Artifact Repository and Image Security 05:05
Workload and Application Code Security 05:10
Quiz - Overview of Cloud Native Security

Kubernetes Cluster Component Security

lock
lock
14
Topics
Lesson Content

Module Content

API Server 01:47
Securing Controller Manager & Scheduler 04:03
Securing the Kubelet 14:47
Labs - Kubelet Security
Securing Container Runtime 06:54
Securing Kube Proxy 04:38
Pod Security 08:53
Securing Etcd 04:57
Securing Container Networking 03:37
Client Security - kubectl proxy port forward 06:48
Client Security - kubeconfig 08:31
Labs - Kubectl Proxy & Port Forward
Labs - KubeConfig
Storage 04:36

Kubernetes Security Fundamentals

lock
lock
24
Topics
Lesson Content

Module Content

Pod Security Standards & Pod Security Admissions 04:57
Note - Understanding Pod Security Policy
Lab - Pod Security Admission
Authentication 05:33
NOTE - Setting up basic authentication
Authorization 07:30
RBAC 04:28
Lab - RBAC
Solution - RBAC 13:28
Secrets 05:38
Lab - Manage Kubernetes secrets
Isolation and Segmentation - Namespace 08:22
Lab - Namespaces
Solution - Namespace 06:04
Isolation and Segmentation - Resource Quotas & Limits 14:51
Lab - Isolation and Segmentation - Resource Quotas & Limits
Solution - Resource Quotas & Limits 05:22
Isolation and Segmentation - Security Context 01:51
Lab - Isolation and Segmentation - Security Context
Solution - Security Context 05:12
Audit Logging 10:17
Lab - Use Audit Logs to Monitor access
Network Policies 11:35
Lab - Network policies

Kubernetes Threat Model

lock
lock
9
Topics
Lesson Content

Module Content

Kubernetes Trust Boundaries and Data Flow 06:00
Persistence 09:37
Denial of Service 07:51
Malicious Code Execution 05:14
Compromised Applications in Containers 02:50
Attacker on the Network 05:06
Access to Sensitive Data 03:49
Privilege Escalation 03:05
Quiz: Kubernetes Threat Model

Platform Security

lock
lock
23
Topics
Lesson Content

Module Content

Supply Chain Security - Minimize base image footprint 07:05
Supply Chain Security - Scan images for known vulnerabilities 08:33
Image Repository Security 04:43
Lab - Image Repo Security
Observability - Overview 04:47
Observability - Falco Overview and Installation 02:53
Observability - Using Falco to Detect Threats 08:39
Lab - Use Falco to detect threats
Service Mesh - Monolithics vs Microservices 10:33
Service Mesh 01:37
Service Mesh - Istio 01:39
Service Mesh - Security in Istio 01:01
Service Mesh - Istio Security Architecture 01:12
Lab: Istio Security Architecture
K8s PKI - Certificate Creation 10:48
K8s PKI - View Certificate Details 04:26
Lab - View Certs
Connectivity - TLS Introduction 01:28
Connectivity - TLS Basics 19:22
Connectivity - TLS in Kubernetes 07:48
Connectivity - Mutual TLS 04:16
Admission Controllers 08:06
Lab - Admission Controllers

Compliance and Security Frameworks

lock
lock
5
Topics
Lesson Content

Module Content

Compliance Frameworks 07:23
Threat Modelling Frameworks 06:26
Supply Chain Compliance 08:01
Automation and Tooling
Quiz: Compliance and Security Frameworks

Mock Exams

lock
lock
1
Topics
Lesson Content

Module Content

Mock Exam 1
Play Button
Fill this form to get a notification when course is released.
This course comes with hands-on cloud labs
book
8
Modules
book
Lessons
Article icon
86
Lessons
check mark
Course Certificate
Videos icon
06.48
Hours of Video
laptop
Hours of Labs
Story Format
Videos icon
Videos
Case Studies
ondemand_video icon
Demo
laptop
Labs
laptop
Cloud Labs
checklist
Mock exams
Quizzes
slack icon
Slack channel support
people icon
Community support
language icon
English
Closed Captions