-
Course
- Core Tech
Application Environment, Configuration, and Security for CKAD
Prepare for the CKAD environment, config, and security domain by using CRDs, managing authn/authz and admission control, working with ServiceAccounts, ConfigMaps, Secrets, and Limits, and securing apps with SecurityContexts and capabilities.
What you'll learn
Running containerized applications securely and predictably on Kubernetes requires a strong foundation in environment configuration and workload isolation. In this course, Application Environment, Configuration, and Security for CKAD, you’ll build the practical skills needed to manage application settings, enforce resource policies, and secure workloads in a Kubernetes environment. First, you’ll discover how to use custom resource definitions and operators to extend Kubernetes functionality. Then, you’ll dive into authentication, authorization, and admission control to understand how Kubernetes handles access and policy enforcement. Finally, you’ll secure your workloads using ServiceAccounts, and securityContext settings, aligning your Pods with best practices and Pod Security Admission policies. When you’re finished with this course, you’ll be prepared to confidently tackle application configuration and security tasks on the CKAD exam—and apply those skills to real-world Kubernetes clusters.
Table of contents
About the author
With a background at a cloud hosting company, I started learning Linux and DevOps from the bottom up as a technical writer set out to document configuration management systems. Falling in love with Linux, DevOps and tech as a whole, I eventually took my ability to explain technical concepts to wide audiences to the training area, creating courses on Red Hat, SaltStack, HashiCorp, LXD, Docker, and more.
More Courses by Elle