+44 (0)1737 821590
Securing Kubernetes and containers  |    A 2 day   hands on   training course

Securing Kubernetes training course description

This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security.

What will you learn
  • Harden Kubernetes systems and clusters.
  • Harden containers.
  • Configure and use Kubernetes audit logs.
Securing Kubernetes training course details

Securing Kubernetes training course contents

This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise

Module 1: User and authorization management
  • Users and service accounts in Kubernetes
  • Authenticating users
  • Managing authorizations with RBAC
Module 2: Supply chain security
  • Vulnerabilit checking for images
  • Image validation in Kubernetes
  • Reducing image footprint
  • Secure image registries
Module 3: Validating cluster setup and penetration testing
  • Use CIS benchmark to review the security configuration of Kubernetes components.
  • Modify the cluster components’ configuration to match the CIS Benchmark.
  • Penetration testing Kubernetes for known vulnerabilities.
Module 4: System hardening
  • Use kernel hardening tools
  • Setup appropriate OS level security domains
  • Container runtime sandboxes
  • Limit network access
Module 5: Monitoring and logging
  • Configure Kubernetes audit logs
  • Configure Audit Policies
  • Monitor applications behaviour with Falco

Learning path


This is a new course.
Below are overall customer ratings

M. S. - London Internet Exchange

"Great hands on and chance to apply what I already knew in Python."

M. S. - LINX

"Great course, learned a lot, and do it again if technology changed."

Training approach

This structured course uses Instructor Led Training to provide the best possible learning experience. Small class sizes ensure students benefit from our engaging and interactive style of teaching with delegates encouraged to ask questions throughout the course. Quizzes follow each major section allowing checking of learning. Hands on sessions are used throughout to allow delegates to consolidate their new skills.