Certified Kubernetes Security Specialist (CKS) Cert Prep
With Chris Jackson and Pearson
Liked by 104 users
Duration: 19h 37m
Skill level: Intermediate
Released: 4/3/2025
Course details
The Certified Kubernetes Security Specialist (CKS) certification was created by the Linux Foundation and the Cloud Native Computing Foundation (CNCF) as part of an ongoing effort to help develop the Kubernetes ecosystem. In this course, instructor Chris Jackson covers the core concepts and technical skills you need to tackle the official exam. Explore the six domains of the CKS exam, including cluster setup, cluster hardening, system hardening, minimizing microservice vulnerabilities, supply chain security, and monitoring, logging, and runtime security. Along the way, be sure to test your new skills in the practice exam scenarios at the end of the course.
Skills you’ll gain
Earn a sharable certificate
Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
Learning
LinkedIn Learning
Certificate of Completion
-
Showcase on your LinkedIn profile under “Licenses and Certificate” section
-
Download or print out as PDF to share with others
-
Share as image online to demonstrate your skill
Meet the instructors
Learner reviews
4.9 out of 5
The overall rating is calculated using the average of submitted ratings. Ratings and reviews can only be submitted when non-anonymous learners complete at least 40% of the course. This helps us avoid fake reviews and spam.
-
5 star 86% -
4 star 14% -
3 star 0% -
2 star 0% -
1 star 0%
Contents
-
-
(Locked)
Module 3: Cluster hardening introduction37s
-
(Locked)
Learning objectives33s
-
(Locked)
Kubernetes API fundamentals6m 31s
-
(Locked)
Kubernetes access control10m 44s
-
(Locked)
API server configuration11m 38s
-
(Locked)
API server hardening13m 6s
-
(Locked)
Verify access control policies13m 37s
-
(Locked)
-
-
(Locked)
Module 6: Software supply chain security introduction40s
-
(Locked)
Learning objectives35s
-
(Locked)
Software supply chain risks9m 25s
-
(Locked)
Protect image registry access5m 36s
-
(Locked)
Require signed images14m 22s
-
(Locked)
Policy enforcement: Image policy webhook21m 28s
-
(Locked)
Policy enforcement: Validating admission policy8m 55s
-
(Locked)
-
-
(Locked)
Learning objectives47s
-
(Locked)
Understanding syscall behavioral analysis12m 28s
-
(Locked)
Using Falco for threat detection7m 14s
-
(Locked)
Falco host installation14m
-
(Locked)
Falco Kubernetes installation13m 51s
-
(Locked)
Falco configuration and rules7m 42s
-
(Locked)
Falco custom rules in action19m 17s
-
(Locked)
-
-
(Locked)
Module 8: Exam practice scenarios introduction42s
-
(Locked)
Learning objectives52s
-
(Locked)
Securing Kubernetes API access12m 37s
-
(Locked)
Implementing pod security standards (PSS)11m 43s
-
(Locked)
Enforcing network policies for pod communication12m 27s
-
(Locked)
Restricting image registries11m 7s
-
(Locked)
Configuring secret encryption12m 32s
-
(Locked)
What’s included
- Learn on the go Access on tablet and phone