In this course, Configuring and Managing Kubernetes Security, you’ll learn the foundations needed for securing access to your Kubernetes Cluster. First, you’ll explore Kubernetes security fundamentals, learning how authentication and authorization work to control access to the Kubernetes API. Then, you’ll learn how certificates are used in Kubernetes and how to create and manage certificates in your cluster. Next, you’ll learn how to create and manage kubeconfig files for accessing clusters and then configure cluster access for a new user. Finally, you’ll learn how to control access to the Kubernetes API with role based access controls. When you’re finished with this course you will have the skills needed to operate and manage security in Kubernetes clusters.
Anthony is the Founder and President of Centino Systems as well as a Pluralsight Author and a Microsoft Data Platform MVP, Linux Expert, and Corporate Problem Solver. Anthony designs solutions, deploys the technology, and provides expertise on business system performance, architecture, and security. Anthony has a Bachelors and Masters in Computer Science with research publications in high performance/low latency data access algorithms and spatial database systems.
Course Overview [Autogenerated] Hi, everyone. My name is Anthony Constantino, Enterprise architect and founder of Cynthia Assistant. Welcome to my course. Configuring and managing carbonated security. Are you a systems administrator that needs to maintain the security of co grannies? Custer's? If so, then this is the course for you. In this course, you will learn the foundations needed for securing access to your crew brands. Coster Diving into how authentication and authorization are used to secure access to your server, Mexico learned how certificates air used inside of kerber Netease and how to create and manage certificates in your cluster. You'll then learn how to create and manage Cute Convict Dallas for accident cluster and bring that all together to add a new user to your cluster and access their cluster with that user. And then finally, you'll learn how to control access to the Kurban is 80 I with role based access controls enabling you to create and implement fine grade access controls for securing your A P I server. By the end of this course, you'll have what it takes to you can figure it management corretta security. Before beginning to scores, you should be familiar with the core foundations of Kerber Netease like what a cluster is and how to interact with a coster at the command line and also understand application contracts like deployments. You will also need to understand core public infrastructure topics, such as what a certificate authority is and what certificates are. I hope you'll join me on this journey to learn how to configure and manage security in your courageous cluster in the course, configure in a managing caretti security here plural site.