LEADER 00000cgm a22006017i 4500 003 OCoLC 005 20240129213017.0 006 m o c 007 vz czazuu 007 cr cnannnuuuuu 008 220607s2022 xx 368 o vleng d 020 9781803237114|q(electronic video) 020 1803237112|q(electronic video) 029 1 AU@|b000072085971 035 (OCoLC)1325677484 037 9781803237114|bO'Reilly Media 040 ORMDA|beng|erda|epn|cORMDA|dOCLCF|dOCLCO 049 INap 082 04 005.3 082 04 005.3|223/eng/20220607 099 Streaming Video O’Reilly for Public Libraries 245 00 Certified Kubernetes security specialist (CKS) course. |h[O'Reilly electronic resource] 250 [First edition]. 264 1 [Place of publication not identified] :|bPackt Publishing, |c[2022] 300 1 online resource (1 video file (6 hr., 8 min.)) :|bsound, color. 306 060800 336 two-dimensional moving image|btdi|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 344 digital|2rdatr 347 video file|2rdaft 380 Instructional films|2lcgft 500 "Updated in May 2022." 511 0 Himanshu Sharma, instructor. 520 Become a certified Kubernetes security specialist by taking up this complete hands-on course About This Video Deep technical insight into Kubernetes Learn to use kubesec to perform static analysis using Docker image Learn how to use Falco to find malicious processes In Detail This Kubernetes Security Specialist course provides foundational knowledge using concepts and hands-on demonstrations of the Kubernetes Cluster. In this course, we will be focusing more on the practical side, so make sure you have a running Kubernetes cluster. This course is focused on security. It deals with all aspects of security within the context of a Kubernetes environment. That means securing not only the Kubernetes cluster itself but also the applications running within the cluster. You will learn how to secure many different components of Kubernetes applications and environments. We are going to cover every topic such as cluster setup, creating an ingress, and securing an ingress. You will also learn cluster hardening, which includes RBAC, role, and role binding for a user. Further, you will learn system hardening, kernel hardening, minimizing microservice vulnerabilities, supply chain security, monitoring, logging, and runtime security. By the end of this Kubernetes course, you will gain in-depth knowledge about Kubernetes and be a Kubernetes security specialist. Audience This Docker course is designed for Kubernetes administrators, security specialists, and for those who want to master Certified Kubernetes Security Specialist. You should already have some Kubernetes Administrator knowledge before attending this course. 588 0 Online resource; title from title details screen (O'Reilly, viewed June 7, 2022). 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Application software|xDevelopment|xComputer programs |xCertification|vStudy guides. 650 0 Computer security|xCertification|vStudy guides. 655 7 Instructional films|2fast 655 7 Internet videos|2fast 655 7 Nonfiction films|2fast 655 7 Study guides|2fast 655 7 Instructional films.|2lcgft 655 7 Nonfiction films.|2lcgft 655 7 Internet videos.|2lcgft 655 7 Films de formation.|2rvmgf 655 7 Films autres que de fiction.|2rvmgf 655 7 Vidéos sur Internet.|2rvmgf 700 1 Sharma, Himanshu,|einstructor. 710 2 Packt Publishing,|epublisher. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/videos/~/9781803237114/?ar|zAvailable for O'Reilly for Public Libraries 994 92|bJFN