Search the Community
Showing results for tags 'kubernetes'.
-
Kubernetes for the Absolute Beginners - Hands-On by Mumshad Mannambeth 01 Introduction 02 Kubernetes Overview 03 Kubernetes Concepts 04 YAML Introduction 05 Kubernetes Concepts - Pods, ReplicaSets, Deployments 06 Networking in Kubernetes 07 Services 08 Microservices Architecture 09 Kubernetes on Cloud 10 Conclusion 11 Appendix - Setup Multi Node cluster using Kubeadm [Hidden Content]
-
CBT Nuggets Certified Kubernetes Administrator (CKA) [Hidden Content] Enjoy
- 45 replies
-
- 387
-
-
-
-
-
- [offer]
- CBT Nuggets
-
(and 1 more)
Tagged with:
-
[OFFER] Udemy - Google Kubernetes Engine Security on GCP
neweswmaitij posted a topic in OTHER SHARES
Free Download [OFFER] Udemy - Google Kubernetes Engine Security on GCP Published: 4/2025 Created by: Shikhar Verma☆100K+ Students Globally MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Intermediate | Genre: eLearning | Language: English | Duration: 67 Lectures ( 3h 2m ) | Size: 942 MB A comprehensive guide to securing Google Kubernetes Engine (GKE) using RBAC, network policies, and best practices. What you'll learn Set Up a K8s Cluster using GKE on Google Cloud Platform - GCP Learn and Apply RBAC to Secure Kubernetes API Access Hands-On RBAC: Secure Kubernetes Access with Practical Labs Configure SSL/TLS Certificates for Kubernetes Client Authentication Deploy Minikube Kubernetes Cluster on Google Cloud Explore RBAC Components Like Roles and RoleBindings to Manage Cluster Access Expand RBAC Permissions to enable users to manage Pods within a specific namespace. List and Manage Kubernetes Contexts Access and Work with a Minikube Kubernetes Cluster as a designated user with controlled privileges. Design and Implement Network Policies to regulate Pod-to-Pod communication securely. Enforce Pod-to-Pod Communication Restrictions using Network Policies in a hands-on lab session. Configure Selective Network Policies to allow controlled communication between specific Pods. Secure an Nginx Server on a Kubernetes cluster using HTTPS (TLS encryption) for enhanced security. VM Remote Access: Using MobaXterm or PuTTY for Secure Connections Requirements Basic Understanding of Kubernetes Fundamental Knowledge of Linux Commands Experience with Kubernetes CLI (kubectl) Some Exposure to Cloud Platforms like Google Cloud Platform Description Understanding Kubernetes: Cluster Components and ArchitectureIntroductionThe Kubernetes Cluster ArchitectureLearn Architecture Through ExamplesGetting Started with KubernetesControl Plane Components in Kubernetes (Master Node)Kubernetes Scheduler: A Key Control Plane ComponentKubernetes Controller ManagerSet Up a K8s Cluster on Google Kubernetes Engine (GKE)Lab 1: Practical Kubernetes Cluster SetupLab 2: Practical Kubernetes Cluster SetupLab 3: Practical Kubernetes Cluster SetupLab 4: Practical Kubernetes Cluster SetupRBAC Policies for Securing Kubernetes ClusterIntroductionKey components of RBACHow RBAC works?How Role and RoleBinding Work TogetherKubernetes Roles: Defining Permissions and AccessPermissions Granted by Kubernetes RolesCreate a roleBind the Role to a User or Service AccountSet Up a Minikube Kubernetes Cluster on Google CloudProject OverviewLaunch VM for Minikube ClusterActivate Cloud Shell and Connect to VMMinikube Kubernetes Cluster Setup - Practical Lab 1Minikube Kubernetes Cluster Setup - Practical Lab 2Minikube Kubernetes Cluster Setup - Practical Lab 3Start Minikube and Deploy Nginx PodClient Authentication using SSL/TLS CertificateSet Up New Namespace & Launch PodOverview of Client Certificate GenerationGenerate a Private KeyGenerate a Certificate Signing Request (CSR)Sign a CSR with Minikube's CA to Generate a User CertificateSet and Verify Client Credentials in Kubernetes ConfigRBAC: Role and RoleBindingCreate a RoleCreate RoleBinding to Assign Role to UserTest RBAC PermissionsAccess the K8s Minikube Cluster as a UserList and Manage Kubernetes ContextsSet Up a New Context for a UserVerify RBAC Permissions with New ContextModify and Test RBAC Role PermissionsSet Up and Verify Network Policies for PodsIntroduction to Kubernetes Network PoliciesWhy Restrict Pod-To-Pod Communication?Understanding K8s Network Policies and CNI PluginsExample Use Case ScenariosLab: Restrict Pod Communication Using Network PoliciesStart Minikube with Cilium CNICreate Two Pods with LabelsVerify Pod Connectivity Using CurlCreate Ingress Network Policy to Restrict Pod AccessCheck if Pod-to-Pod Access is BlockedRestrict Ingress/Egress Traffic with Network PolicyVM Remote Access: Using MobaXterm or PuTTY for Secure ConnectionsDeploy a Virtual MachineAdd User and Setup SSH AuthenticationCreate SSH Key PairConvert Private Key to .ppk FormatVM Access TroubleshootingDeploy Minikube on Virtual MachineInitialize Minikube ClusterSecure Deployment and Access of Nginx on KubernetesOverview of Securing Nginx with HTTPSDeploy and Expose a Nginx Pod to External TrafficAccess Nginx Web Server Through HTTPSet Up Nginx on Host Machine for Accessing Nginx PodAccess Nginx Web Server via Web Browser (HTTP Only)Implement HTTPS for Nginx in a K8s Cluster Using TLS CertificatesDeploy and Expose a Nginx Pod to External TrafficGenerate a self-signed TLS CertificateStore the TLS Certificate as a SecretCheck Minikube's Ingress Controller StatusCreate Ingress Resource for HTTPSLast Lecture Who this course is for DevOps Engineers - Looking to implement secure access controls and network policies in Kubernetes environments. Cloud Engineers and Architects IT Professionals & Enthusiasts - Anyone interested in learning Kubernetes security best practices. Homepage: [hide] -
Free Download [OFFER] Udemy - DevSecOps Supercourse - Kubernetes/SCA/SAST/DAST/Vault/Falco Published: 4/2025 Created by: Gourav Shah MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Expert | Genre: eLearning | Language: English + subtitle | Duration: 147 Lectures ( 9h 37m ) | Size: 4 GB Build Complete DevSecOps Pipeline with Container Based Delivery, CI/CD on Kubernetes with all Open Source Tools What you'll learn Understand the core principles of DevSecOps and how they integrate into modern software delivery pipelines. Set up a complete learning environment using Google Cloud Platform, Kubernetes (GKE), and essential DevOps tools. Build a secure CI/CD pipeline using Jenkins, Helm, Docker, and Kubernetes. Implement Software Composition Analysis (SCA) using OWASP Dependency-Check, Pyraider, and Dependency-Track to identify and manage third-party risks. Apply Static Application Security Testing (SAST) using tools like slscan and integrate them into your CI/CD pipeline. Conduct Dynamic Application Security Testing (DAST) using OWASP ZAP during deployment stages to catch runtime vulnerabilities. Harden container images using Dockle, Trivy, and multi-stage Dockerfiles to reduce the attack surface. Manage sensitive credentials and enforce secure secrets injection using HashiCorp Vault with Kubernetes. Enforce system-level compliance and infrastructure hardening using InSpec and Ansible as Compliance-as-Code tools. Secure Kubernetes workloads by implementing security contexts, Pod security policies, resource limits, and runtime scanning tools like Falco. Build and deploy AI/ML and containerized applications securely using GitOps practices with ArgoCD. Automate runtime anomaly detection and remediation using Falco and Argo Workflows. Understand the Software Bill of Materials (SBOM) and integrate SBOM generation into your pipeline. Design an end-to-end secure DevOps pipeline for real-world applications, from code to production, with continuous security monitoring. Requirements Familiarity with DevOps concepts and basic CI/CD workflows is recommended. Prior experience with Docker and Kubernetes is helpful but not mandatory. Access to a GCP account or any cloud environment for hands-on labs. No deep security knowledge required - everything is explained step by step. Description Are you building or deploying applications on Kubernetes? Whether you're a DevOps Engineer, Platform Engineer, or AI/ML Engineer, security can no longer be an afterthought.This hands-on DevSecOps Bootcamp will help you build secure, production-ready CI/CD pipelines using open-source tools and industry best practices. Learn how to integrate security across the software development lifecycle and ensure your applications are secure by design.We will walk you through step-by-step labs that combine Jenkins, Kubernetes, ArgoCD, Vault, Trivy, Falco, OWASP ZAP, and other essential tools used in modern DevSecOps workflows.This course is ideal for teams building cloud-native applications, AI/ML models, or any containerized workload that needs to be deployed securely at scale.What you will learn:Core DevSecOps principles and the secure software delivery lifecycleHow to build a CI/CD pipeline with Jenkins on KubernetesSoftware Composition Analysis (SCA) using OWASP Dependency-Check, Pyraider, and Dependency-TrackStatic and Dynamic Application Security Testing (SAST & DAST) using slscan and OWASP ZAPSecuring container images using Trivy, Dockle, and multi-stage DockerfilesEnforcing compliance as code using InSpec and AnsibleSecrets management using HashiCorp Vault and Kubernetes RBACRuntime security monitoring using Falco with automated response pipelinesSecure deployment workflows with GitOps using ArgoCD and KubernetesTools and Technologies You Will Use:Jenkins, Helm, Kubernetes (GKE), ArgoCDTrivy, Dockle, OWASP ZAP, slscan, PyraiderVault, InSpec, Ansible, Falco, Argo WorkflowsDocker, Kubernetes RBAC, GitHub, GitOpsWho Should Take This Course:DevOps and Cloud Engineers who want to add security to their toolbeltAI/ML Engineers deploying models and services on KubernetesPlatform Engineers managing modern microservices at scaleSecurity Engineers transitioning to DevSecOps practicesDevelopers building containerized applications for productionThis is not a theoretical course. You will be working on real-world labs and projects that simulate what modern engineering teams do to secure their software pipelines in production environments.Whether you're deploying a machine learning model, a microservice, or a SaaS product - this course will help you ensure that your deployments are secure, scalable, and compliant. Who this course is for DevOps, Cloud, and Platform Engineers looking to build secure delivery pipelines. AI/ML Engineers deploying models and services on Kubernetes or in production environments. Developers who want to integrate security into their DevOps workflows. Security professionals and SREs transitioning into DevSecOps roles. Anyone responsible for deploying, securing, and maintaining modern applications at scale. Homepage: [Hidden Content] [hide]
-
Free Download [OFFER] Kubernetes Threat and Attack Detection by Chris Jackson Released 4/2025 By Chris Jackson MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 2h 46m | Size: 705 MB Develop practical skills in detecting, monitoring, and responding to threats and attacks in Kubernetes environments. Kubernetes Threat and Attack Detection is an essential video course for Kubernetes practitioners aiming to proactively protect their clusters against security threats. Led by expert instructor Chris Jackson, this course guides you through robust strategies for detecting, analyzing, and responding to malicious activities and potential security breaches. Throughout the lessons, you will explore critical topics such as enforcing container immutability, leveraging Kubernetes audit logs for real-time monitoring, and employing advanced threat detection tools like Falco. You'll also learn how to use the MITRE ATT&CK framework to effectively investigate and identify signs of compromise. Each lesson provides hands-on demonstrations and actionable insights, equipping you with the practical skills necessary for maintaining secure, resilient Kubernetes infrastructures. This course equips you with advanced techniques to confidently tackle real-world Kubernetes security challenges, enhancing your threat detection and security management capabilities. About the Instructor Chris Jackson; CCIEx2 (RS; SEC) No.6256; is a Distinguished Architect at Cisco. He is also the author of Network Security Auditing (CiscoPress; 2010); CCNA Cloud CLDADM 210-455 Official Cert Guide(CiscoPress; 2016); and Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide(CiscoPress; 2020). Chris is focused on DevSecOps, Cloud, and Security, and loves helping customers better leverage the business transformational aspects these technologies provide. He holds dual CCIEs in security and routing and switching, CISA, CISSP, ITIL v3, seven SANS certifications, and a bachelor's degree in business administration. Skill Level Intermediate Course requirement A working knowledge of Linux A working understanding of containers and their management Kubernetes experience and foundational knowledge (CKA equivalent knowledge level) [hide]
- 2 replies
-
- 9
-
-
-
- OFFER
- Kubernetes
-
(and 3 more)
Tagged with:
-
Free Download [OFFER] Kubernetes Security Basics By Chris Jackson Released 4/2025 By Chris Jackson MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 2h 58m | Size: 674 MB Gain practical skills to secure Kubernetes clusters and applications effectively through hands-on instruction and real-world insights. Kubernetes Security Basics equips you with essential knowledge and practical expertise to confidently secure Kubernetes environments. Led by Cisco Distinguished Solutions Engineer Chris Jackson, this course takes a hands-on approach to Kubernetes security, covering foundational concepts, securing clusters, implementing robust access controls, and verifying platform integrity. You'll begin by building your own Kubernetes lab environment, enabling real-world experimentation and learning. Throughout the lessons, you'll be introduced to critical security practices, including Kubernetes Security Foundation, understanding CIS Benchmarks for Kubernetes components, configuring Role-Based Access Control (RBAC), protecting service accounts, and verifying platform binaries prior to deployment. Each lesson is designed to reinforce skills through practical demonstrations and real-world scenarios, ensuring you're ready to apply best practices immediately. Ideal for Kubernetes practitioners seeking to enhance security skills or prepare for the Certified Kubernetes Security Specialist (CKS) exam, this course provides a solid foundation in managing security within Kubernetes infrastructures. About the Instructor Chris Jackson; CCIEx2 (RS; SEC) No.6256; is a Distinguished Architect at Cisco. He is also the author of Network Security Auditing (CiscoPress; 2010); CCNA Cloud CLDADM 210-455 Official Cert Guide(CiscoPress; 2016); and Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide(CiscoPress; 2020). Chris is focused on DevSecOps, Cloud, and Security, and loves helping customers better leverage the business transformational aspects these technologies provide. He holds dual CCIEs in security and routing and switching, CISA, CISSP, ITIL v3, seven SANS certifications, and a bachelor's degree in business administration. Skill Level Intermediate Course requirement A working knowledge of Linux A working understanding of containers and their management Kubernetes experience and foundational knowledge (CKA equivalent knowledge level) [hide]
-
- 10
-
-
-
- OFFER
- Kubernetes
-
(and 3 more)
Tagged with:
-
Released 4/2025 By Chris Jackson MP4 | Free Download Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 4h | Size: 934 MB Gain essential Kubernetes network and cluster security skills to harden your infrastructure against threats and attacks. Kubernetes Network and Cluster Hardening is a comprehensive video course designed to provide you with the essential skills needed to secure Kubernetes environments at the network and cluster level. Guided by expert instructor Chris Jackson; you'll gain practical knowledge of critical security measures; from setting up effective network policies and securing ingress traffic with TLS; to safeguarding node metadata and restricting API access. Throughout the course; you'll learn advanced methods for protecting Kubernetes dashboards, minimizing external access, and verifying platform binaries. Each lesson includes actionable techniques and demonstrations to ensure you can confidently apply best practices for real-world Kubernetes deployments. Whether enhancing your current Kubernetes security practices or want to eventually take on the Certified Kubernetes Security Specialist (CKS) certification; this course offers valuable insights for improving the resilience and reliability of your clusters. About the Instructor Chris Jackson; CCIEx2 (RS; SEC) No.6256; is a Distinguished Architect at Cisco. He is also the author of Network Security Auditing (CiscoPress; 2010); CCNA Cloud CLDADM 210-455 Official Cert Guide(CiscoPress; 2016); and Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide(CiscoPress; 2020). Chris is focused on DevSecOps, Cloud, and Security, and loves helping customers better leverage the business transformational aspects these technologies provide. He holds dual CCIEs in security and routing and switching, CISA, CISSP, ITIL v3, seven SANS certifications, and a bachelor's degree in business administration. Skill Level Intermediate Course requirement A working knowledge of Linux A working understanding of containers and their management Kubernetes experience and foundational knowledge (CKA equivalent knowledge level) [hide]
-
- 13
-
-
-
-
- OFFER
- Kubernetes
-
(and 3 more)
Tagged with:
-
hi guys I am sharing this course using torrent please take it and seed I am using this course since I got in a DevOps Position in my current job and it has helped a lot, highly recommended, in fact next week I am going to take AZ-400 and some months later AWS DevOps as well just copy and paste the link in uTorrent for example [Hidden Content] enjoy
- 112 replies
-
- 437
-
-
-
-
-
-
- DevOps
- kubernetes
-
(and 8 more)
Tagged with:
-
CBT Nuggets Certified Kubernetes Security Specialist (CKS) [Hidden Content] Enjoy
- 16 replies
-
- 127
-
-
-
-
-
- [offer]
- CBT Nuggets
-
(and 1 more)
Tagged with:
-
Enjoy guys Core Kubernetes, June 2022 Core Kubernetes-9781617297557.epub
-
This is an advanced Kubernetes course for devs, ops, or even architects, who have started working with Kubernetes. Course Description: [Hidden Content] Links to download [Hidden Content]
-
hi guys I am sharing this course Udemy Link - Course Description and links to download [Hidden Content] [Hidden Content] Real-World Kubernetes In Action Your Go-To Production Kubernetes Resource Hot & new Created by Michael Levan Last updated 8/2023
- 3 replies
-
- 50
-
-
-
-
- kubernetes
- udemy
-
(and 1 more)
Tagged with:
-
[REQ] Certified Kubernetes Administrator (CKA) dump
Bootylicious posted a topic in KUBERNETES SHARES
Does anybody have a dump for Certified Kubernetes Administrator (CKA) please share the latest and valid dump.- 6 replies
-
- [Req]
- kubernetes
-
(and 2 more)
Tagged with:
-
CBT Nuggets Google Kubernetes Training [Hidden Content] Enjoy
- 18 replies
-
- 145
-
-
-
-
-
-
- [offer]
- CBT Nuggets
-
(and 1 more)
Tagged with:
-
Hi does anyone have the updated link of this course. Can you please share.
-
- kubernetes
- devops
-
(and 1 more)
Tagged with:
-
Dears, Please, Can anyone support with Certified Kubernetes Application Developer (CKAD) exam dump or link for questions ? Thank you
- 1 reply
-
- CKAD
- kubernetes
-
(and 1 more)
Tagged with:
-
[Hidden Content]
-
Docker and Kubernetes The Big Picture [NigelPoulton] - PL [Hidden Content] ! Enjoy ore Kapetanαιoi !
- 5 replies
-
- 82
-
-
-
-
- containers
- docker
-
(and 2 more)
Tagged with: