Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Core Tech

Kubernetes Security: Cluster Setup

Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This course will teach you how to perform a secure set-up of the Kubernetes cluster.

Antonio Jesús Piedra - Pluralsight course - Kubernetes Security: Cluster Setup
Antonio Jesús Piedra
What you'll learn

Like any other technology, if Kubernetes is not implemented correctly, it can be vulnerable to security threats. In this course, Kubernetes Security: Cluster Setup, you’ll learn to how to perform a secure set-up for your Kubernetes cluster. First, you’ll explore how the API traffic flows between components and learn how to encrypt it and restrict the traffic calls. Next, you’ll discover best practices to have in mind while securing the kubelet component. Finally, you’ll learn how to review the cluster security using the kube-bench open source tool to make sure your cluster set-up is not vulnerable. When you’re finished with this course, you’ll have the skills and knowledge of Kubernetes and security best practices needed to bootstrap a secure Kubernetes cluster.

Table of contents

About the author
Antonio Jesús Piedra - Pluralsight course - Kubernetes Security: Cluster Setup
Antonio Jesús Piedra

Antonio is a DevOps Engineer who loves to experiment with cutting-edge technologies.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight