Course Outline

Introduction

  • Linux Foundation
  • Training from the Linux Foundation
  • Certifications offered by the Linux Foundation
  • Digital Badges for Certification
  • Laboratory Exercises, Solutions, and Resources
  • E-Learning Course: LFS260
  • Distribution Details
  • Laboratory Sessions

Cloud Security Overview

  • Multiple Projects for Government
  • Definition of Security
  • Risk Assessment
  • Preventive Measures
  • Detection Mechanisms
  • Incident Response
  • Classes of Attackers
  • Types of Attacks
  • Attack Surfaces
  • Hardware and Firmware Security Considerations
  • Security Agencies and Standards
  • Managing External Access
  • Laboratory Sessions

Preparing to Install

  • Image Supply Chain Security
  • Runtime Sandbox Configuration
  • Verifying Platform Binaries
  • Minimizing Access to the Graphical User Interface
  • Policy-Based Control Implementation
  • Laboratory Sessions

Installing the Cluster

  • Updating Kubernetes for Government
  • Tools to Enhance Kernel Security
  • Examples of Kernel Hardening
  • Mitigating Kernel Vulnerabilities
  • Laboratory Sessions

Securing the kube-apiserver

  • Restricting Access to the API
  • Enabling Kube-apiserver Auditing
  • Configuring Role-Based Access Control (RBAC)
  • Pod Security Policies
  • Minimizing Identity and Access Management (IAM) Roles
  • Protecting the etcd Database
  • CIS Benchmark Compliance
  • Using Service Accounts for Secure Authentication
  • Laboratory Sessions

Networking

  • Firewall Basics
  • Network Plugins for Government
  • iptables Configuration
  • Mitigating Brute Force Login Attempts
  • Netfilter Rule Management
  • Netfilter Implementation
  • nft Concepts and Usage
  • Ingress Object Configuration
  • Pod-to-Pod Encryption for Secure Communication
  • Restricting Cluster-Level Access
  • Laboratory Sessions

Workload Considerations

  • Minimizing the Base Image Size
  • Static Analysis of Workloads for Security
  • Runtime Analysis of Workloads for Anomalies
  • Ensuring Container Immutability
  • Mandatory Access Control Implementation
  • SELinux Configuration
  • AppArmor Usage
  • Generating AppArmor Profiles
  • Laboratory Sessions

Issue Detection

  • Understanding Phases of an Attack
  • Preparation for Security Incidents
  • Understanding Attack Progression
  • Incident Handling During an Event
  • Post-Incident Handling and Analysis
  • Intrusion Detection Systems (IDS)
  • Threat Detection Techniques
  • Behavioral Analytics for Security
  • Laboratory Sessions

Domain Reviews

  • Preparing for the Certified Kubernetes Security (CKS) Exam

Requirements

Participants should possess Linux administration skills, including proficiency with the command line. They must be able to edit files using a command-line text editor and have a foundational understanding of security principles.

Audience

This course is designed for individuals who hold a CKA certification and are interested in or responsible for cloud security, particularly for government applications.

Experience Level: Intermediate

 28 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories