Navigate your cloud native world with training that matures your DevOps practices

Learn how to put the latest open source technology into practice with hands-on training, delivered by industry experts, aligned to your desired business outcomes


Securing Kubernetes

2 Days

Available On-Site

Available Virtually

Open Enrollments Available


Our securing Kubernetes course is designed to provide a comprehensive introduction to the processes and practices around securing Kubernetes including application and image security, logging, network policy/segmentation, Kubernetes control plane security and auditing, and RBAC configuration.

This intensive two-day hands-on course is designed to provide working platform operators and other technology professionals with a comprehensive introduction to the processes and practices around securing Kubernetes. Attendees will leave with a clear understanding of Kubernetes and container-based security concerns. Day one focuses on foundational security concerns including securing cloud native applications, container isolation, image security, and network policy/segmentation. On day two students will gain hands-on experience with Kubernetes authentication, control plane security, etcd security as well as RBAC configuration and management. The class concludes with a look at keylogging and metrics monitoring as well as Kubernetes security auditing features. Upon completion of the course, attendees will have the skills and information necessary to effectively secure a production-grade Kubernetes cluster.

Who should attend?

Site/Service Reliability Engineers (SRE), Information Technology (IT) Staff, Platform Operators, Technical Managers, DevOps Personnel


Live instructor-led training (ILT); lecture, hands-on labs, student exercises, and demos


Available for instructor-led (ILT) in-person/on-site training or virtual instructor-led (VILT) delivery. Additional open enrollment options (below) are available for this course.

What attendees will learn

This course is designed to provide operators with a comprehensive overview of Kubernetes security. Learning modules include:

  • Cloud native application security
  • Securing the Kubernetes Control Plane
  • Kubernetes Authentication, Authorization, and Role-Based Access Control (RBAC)
  • Kubernetes Attack Vectors
  • Kubernetes Observability: logging, metrics, auditing, audit policies


Suggested prerequisites for Kubernetes Day 2 Operations include RX-M's Docker Foundation, Kubernetes Foundation and/or equivalent knowledge of containers, images, container orchestration, and Kubernetes. Each attendee must provide their own laptop with the ability to run a 64-bit virtual machine. Unconstrained internet access is also required to complete the student hands-on lab exercises.

Contact us to request more information about enrolling in the Securing Kubernetes course or to inquire about booking a custom in-house course for your team.

The RX-M Approach

Bring a neutral perspective

We bring a market neutral perspective to every engagement, taking no stake in any of the competing cloud native platforms, components or solutions so we can offer unbiased insights to our clients

Practice what we teach

We are a multi-cloud company consisting of prominent open source contributors with large-scale software engineering experience, actively contributing to the evolution of next-gen software architectures, application management, and platforms

Be solution focused

RX-M has the unique ability to deliver purpose-built, solution-based training in the form of custom curriculum that aligns with each of our client's specific desired outcomes so your team has the skills needed to accelerate your business

Our team has been trusted to work alongside some of the world's leading companies