CKA Crash Course Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Introduction
- What is the CIS Benchmark?
- Overview of CIS Benchmark
- What is kube-bench?
- Install kube-bench
- Check CIS Benchmark using kube-bench
- kube-bench Output Explained
- 🎯 Scenario 01: Check & Fix Anonymous Auth with kube-bench
- 🎯 Scenario 02: Check Kubelet Service File permission
- 🎯 Scenario 03: Fix etcd Authorization Issue
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Introduction
- What is SecurityContext?
- Why Should We Use SecurityContext?
- How Kubernetes Handles User IDs from Container Images
- How SecurityContext Works at Pod and Container Level
- Important SecurityContext Option to Understand
- 🎯Scenario 01: Secure a Pod
- 🎯 Scenario 02: Pod and Container Level Security Context
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Introduction
- Cilium Setup on Kubernetes
- Basic Structure of the Cilium Network Policy
- Layer 4 Network Policy
- Entities
- Mutual Authentication
- 🎯Scenario 01: Create a Cilium Layer 4 Network Policy
- 🎯Scenario 02: Allow Application Pod to Access Node Monitoring Agent
- 🎯Scenario 03: Enforce mTLS with Cilium Network Policy
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Introduction
- Working With Secrets
- Injecting Secrets into Pods
- Secret Imperative Commands
- 🎯 Scenario 01: Create a Secret
- 🎯 Scenario 02: Configure a Secret Into a Pod
- 🎯 Scenario 03: Configuring Nginx with TLS Secret in Kubernetes
- 🎁 Bonus: Managing Secrets In Real World Setup
- 📚 Quiz Time
- Base64 encoding
- Secret Types
Available in
days
days
after you enroll
- Introduction
- Ingress
- 🎁 Bonus: Ingress Controller: Internal Workflow
- 🎁 Ingress FAQs
- Setup Ingress Controller
- Create Ingress Objects
- Ingress Demo Application Architecture
- Deploy Demo Application
- Ingress Object
- Multiple Ingress Controllers
- Ingress TLS
- Create Ingress TLS
- 🎯 Scenario 01: Expose Web Application Via Ingress
- 🎯 Scenario 02: Troubleshoot Application Ingress
- 🎯 Scenario 03: Implement Path Based Routing
- 🎯 Scenario 04: Implement TLS For Ingress
- 📚 Quiz Time
- Real World Example
Available in
days
days
after you enroll
- Introduction
- Kubernetes Network Policy
- Network Policy Object
- Deploy Demo Application
- Implement Network Policies for Secure Communication Between Services
- Deny all Ingress and Egress Traffic
- 🎯 Scenario 01: Secure Namespace Communication with Network Policies
- 🎯 Scenario 02: Implement Secure Egress with IP CIDR-Based Restrictions
- 🎯 Scenario 03: Secure Database Access with NetworkPolicy
- Default Deny Network Policies
- Common Pitfalls and Key Concepts
- 📚 Quiz Time
Available in
days
days
after you enroll
- Introduction
- The Default Service Account
- Creating Service Account
- Service Account Hardening
- Disable Service Account Tokens at Pod/Deployment Level
- Projectd Volumes to Mount Service Account Tokens
- 🎯 Scenario: Use External Service Account
- 🎯Scenario: Disabling Service Account Tokens on Existing SA
- 🎯Scenario: Disabling Service Account Token on a Deployment
- 🎯Scenario: Using Projected Volume for the Service Account Token Mounting
- 📚 Quiz Time
Featured Courses
Check your inbox to confirm your subscription