-
Course
- Core Tech
Monitoring, Logging and Runtime Security for CKS
Struggling to secure Kubernetes clusters? This course gives you the skills you'll need to monitor, log, and secure runtimes, detect threats and ensure container immutability for robust Kubernetes security.
What you'll learn
Up your Kubernetes security game with monitoring, logging, and runtime security skills tailored to the Certified Kubernetes Security Specialist (CKS) certification objectives. You’ll learn how to perform behavioral analytics to identify malicious activities and detect threats across physical infrastructure, applications, networks, data, users, and workloads; investigate attack phases, identify bad actors, and implement measures to ensure container immutability at runtime, preventing unauthorized changes; and track activities, and enhance cluster security through proactive monitoring and analysis. By the end of this course, you’ll be equipped to secure Kubernetes clusters by detecting and responding to threats, ensuring container immutability, and effectively using audit logs to monitor and protect your environment, preparing you for the CKS certification.
Table of contents
About the author
David taught high school for twenty years, worked as a Linux system administrator for five years, and has been writing since he could hold a crayon between his fingers. His childhood bedroom wall has since been repainted.
More Courses by David