In this course, Configuring and Managing Kubernetes Security, you’ll learn the foundations needed for securing access to your Kubernetes Cluster. First, you’ll explore Kubernetes security fundamentals, learning how authentication and authorization work to control access to the Kubernetes API. Then, you’ll learn how certificates are used in Kubernetes and how to create and manage certificates in your cluster. Next, you’ll learn how to create and manage kubeconfig files for accessing clusters and then configure cluster access for a new user. Finally, you’ll learn how to control access to the Kubernetes API with role based access controls. When you’re finished with this course you will have the skills needed to operate and manage security in Kubernetes clusters.
Anthony is the Founder and President of Centino Systems as well as a Pluralsight Author and a Microsoft Data Platform MVP, Linux Expert, and Corporate Problem Solver. Anthony designs solutions, deploys the technology, and provides expertise on business system performance, architecture, and security. Anthony has a Bachelors and Masters in Computer Science with research publications in high performance/low latency data access algorithms and spatial database systems.
Course Overview Hi, everyone. My name is Anthony Nocentino, enterprise architect and founder of Centino Systems. Welcome to my course, Configuring and Managing Kubernetes Security. Are you a systems administrator that needs to maintain the security of Kubernetes clusters? If so, then this is the course for you. In this course, you will learn the foundations needed for securing access to your Kubernetes cluster, diving into how authentication and authorization are used to secure access to your API server. Next, you'll learn how certificates are used inside of Kubernetes and how to create and manage certificates in your cluster. You'll then learn how to create and manage kubeconfig files for accessing your cluster and bring that all together to add a new user to your cluster and access your cluster with that new user. And then finally, you'll learn how to control access to the Kubernetes API with role‑based access controls, enabling you to create and implement fine‑grained access controls for securing your API server. By the end of this course, you'll have what it takes to configure and manage Kubernetes security. Before beginning this course, you should be familiar with the core foundations of Kubernetes, like what a cluster is and how to interact with a cluster at the command line and also understand application constructs like deployments. You will also need to understand core public key infrastructure topics, such as what a certificate authority is and what certificates are. I hope you'll join me on this journey to learn how to configure and manage security in your Kubernetes cluster in the course Configuring and Managing Kubernetes Security here, at Pluralsight.