Configuring and Managing Kubernetes Security

This course will teach you the fundamentals needed to configure and manage security in Kubernetes clusters.
Course info
Level
Intermediate
Updated
Aug 21, 2020
Duration
2h 13m
Table of contents
Course Overview
Kubernetes Security Fundamentals
Managing Certificates and kubeconfig Files
Managing Role Based Access Controls
Description
Course info
Level
Intermediate
Updated
Aug 21, 2020
Duration
2h 13m
Description

In this course, Configuring and Managing Kubernetes Security, you’ll learn the foundations needed for securing access to your Kubernetes Cluster. First, you’ll explore Kubernetes security fundamentals, learning how authentication and authorization work to control access to the Kubernetes API. Then, you’ll learn how certificates are used in Kubernetes and how to create and manage certificates in your cluster. Next, you’ll learn how to create and manage kubeconfig files for accessing clusters and then configure cluster access for a new user. Finally, you’ll learn how to control access to the Kubernetes API with role based access controls. When you’re finished with this course you will have the skills needed to operate and manage security in Kubernetes clusters.

About the author
About the author

Anthony is the Founder and President of Centino Systems as well as a Pluralsight Author and a Microsoft Data Platform MVP, Linux Expert, and Corporate Problem Solver. Anthony designs solutions, deploys the technology, and provides expertise on business system performance, architecture, and security. Anthony has a Bachelors and Masters in Computer Science with research publications in high performance/low latency data access algorithms and spatial database systems.

More from the author
More courses by Anthony Nocentino
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hi, everyone. My name is Anthony Constantino, Enterprise architect and founder of Cynthia Assistant. Welcome to my course. Configuring and managing carbonated security. Are you a systems administrator that needs to maintain the security of co grannies? Custer's? If so, then this is the course for you. In this course, you will learn the foundations needed for securing access to your crew brands. Coster Diving into how authentication and authorization are used to secure access to your server, Mexico learned how certificates air used inside of kerber Netease and how to create and manage certificates in your cluster. You'll then learn how to create and manage Cute Convict Dallas for accident cluster and bring that all together to add a new user to your cluster and access their cluster with that user. And then finally, you'll learn how to control access to the Kurban is 80 I with role based access controls enabling you to create and implement fine grade access controls for securing your A P I server. By the end of this course, you'll have what it takes to you can figure it management corretta security. Before beginning to scores, you should be familiar with the core foundations of Kerber Netease like what a cluster is and how to interact with a coster at the command line and also understand application contracts like deployments. You will also need to understand core public infrastructure topics, such as what a certificate authority is and what certificates are. I hope you'll join me on this journey to learn how to configure and manage security in your courageous cluster in the course, configure in a managing caretti security here plural site.