Navigate your cloud native world with training that matures your DevOps practices
Learn how to put the latest open source technology into practice with hands-on training, delivered by industry experts, aligned to your desired business outcomes
Our securing Kubernetes course is designed to provide a comprehensive introduction to the processes and practices around securing Kubernetes including application and image security, logging, network policy/segmentation, Kubernetes control plane security and auditing, and RBAC configuration.
This intensive two-day hands-on course is designed to provide working platform operators and other technology professionals with a comprehensive introduction to the processes and practices around securing Kubernetes. Attendees will leave with a clear understanding of Kubernetes and container-based security concerns. Day one focuses on foundational security concerns including securing cloud native applications, container isolation, image security, and network policy/segmentation. On day two students will gain hands-on experience with Kubernetes authentication, control plane security, etcd security as well as RBAC configuration and management. The class concludes with a look at keylogging and metrics monitoring as well as Kubernetes security auditing features. Upon completion of the course, attendees will have the skills and information necessary to effectively secure a production-grade Kubernetes cluster.
Who should attend?
Site/Service Reliability Engineers (SRE), Information Technology (IT) Staff, Platform Operators, Technical Managers, DevOps Personnel
Live instructor-led training (ILT); lecture, hands-on labs, student exercises, and demos
Available for instructor-led (ILT) in-person/on-site training or virtual instructor-led (VILT) delivery. Additional open enrollment options (below) are available for this course.
What attendees will learn
This course is designed to provide operators with a comprehensive overview of Kubernetes security. Learning modules include:
- Cloud native application security
- Securing the Kubernetes Control Plane
- Kubernetes Authentication, Authorization, and Role-Based Access Control (RBAC)
- Kubernetes Attack Vectors
- Kubernetes Observability: logging, metrics, auditing, audit policies
Suggested prerequisites for Kubernetes Day 2 Operations include RX-M's Docker Foundation, Kubernetes Foundation and/or equivalent knowledge of containers, images, container orchestration, and Kubernetes. Each attendee must provide their own laptop with the ability to run a 64-bit virtual machine. Unconstrained internet access is also required to complete the student hands-on lab exercises.
Contact us to request more information about enrolling in the Securing Kubernetes course or to inquire about booking a custom in-house course for your team.
Other Kubernetes Open Enrollments from RX-M
RX-M's Cloud Native & DevOps enablement philosophy
Bring a neutral perspective
We bring a market neutral perspective to every engagement, taking no stake in any of the competing cloud native platforms, components or solutions so we can offer unbiased insights to our clients
Practice what we teach
We are a multi-cloud company consisting of prominent open source contributors with large-scale software engineering experience, actively contributing to the evolution of next-gen software architectures, application management, and platforms
Be solution focused
RX-M has the unique ability to deliver purpose-built, solution-based training in the form of custom curriculum that aligns with each of our client's specific desired outcomes so your team has the skills needed to accelerate the business