Featured resource
Tech Upskilling Playbook 2025
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Learn more
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Core Tech

Monitoring, Logging and Runtime Security for CKS

Struggling to secure Kubernetes clusters? This course gives you the skills you'll need to monitor, log, and secure runtimes, detect threats and ensure container immutability for robust Kubernetes security.

David Clinton - Pluralsight course - Monitoring, Logging and Runtime Security for CKS
by David Clinton

What you'll learn

Up your Kubernetes security game with monitoring, logging, and runtime security skills tailored to the Certified Kubernetes Security Specialist (CKS) certification objectives. You’ll learn how to perform behavioral analytics to identify malicious activities and detect threats across physical infrastructure, applications, networks, data, users, and workloads; investigate attack phases, identify bad actors, and implement measures to ensure container immutability at runtime, preventing unauthorized changes; and track activities, and enhance cluster security through proactive monitoring and analysis. By the end of this course, you’ll be equipped to secure Kubernetes clusters by detecting and responding to threats, ensuring container immutability, and effectively using audit logs to monitor and protect your environment, preparing you for the CKS certification.

Table of contents

About the author

David Clinton - Pluralsight course - Monitoring, Logging and Runtime Security for CKS
David Clinton

David taught high school for twenty years, worked as a Linux system administrator for five years, and has been writing since he could hold a crayon between his fingers. His childhood bedroom wall has since been repainted.

More Courses by David