Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course

Implementing Monitoring, Logging, and Runtime Security in Kubernetes

Detect and prevent threats in Kubernetes. This course will teach you how to implement API audit logging, deploy runtime security controls, and enforce container immutability to protect your production workloads from exploitation.

Intermediate
52m

Created by Elton Stoneman

Last Updated Mar 06, 2026

Course Thumbnail
  • Course

Implementing Monitoring, Logging, and Runtime Security in Kubernetes

Detect and prevent threats in Kubernetes. This course will teach you how to implement API audit logging, deploy runtime security controls, and enforce container immutability to protect your production workloads from exploitation.

Intermediate
52m

Created by Elton Stoneman

Last Updated Mar 06, 2026

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Core Tech
What you'll learn

A red team exercise can expose gaps in your Kubernetes security posture that would be invisible until a real attack occurs. In this course, Implementing Monitoring, Logging, and Runtime Security in Kubernetes, you'll learn to build the detection, response, and prevention capabilities that complete your defense-in-depth strategy. First, you'll explore implementing API audit logging with OpenTelemetry integration, creating pattern-based alerting rules to detect suspicious activity. Next, you'll discover how to deploy kernel-level runtime security using Falco to detect container escapes, unauthorized shell access, and suspicious system calls in real-time. Finally, you'll learn how to enforce container immutability through Pod Security Admission and Kyverno policies for image verification and security profile automation. When you're finished with this course, you'll have the skills and knowledge to detect threats as they happen and prevent attacks from succeeding even when other defenses fail.

Implementing Monitoring, Logging, and Runtime Security in Kubernetes
Intermediate
52m
Table of contents

About the author
Elton Stoneman - Pluralsight course - Implementing Monitoring, Logging, and Runtime Security in Kubernetes
Elton Stoneman
40 courses 4.5 author rating 5987 ratings

Elton is an independent consultant specializing in systems integration with the Microsoft stack. He is a Microsoft MVP, blogger, and practicing Technical Architect.

2025 Forrester Wave™ names Pluralsight as a Leader among tech skills dev platforms

See how our offering and strategy stack up.

forrester wave report