Skip to content Skip to content
Vladimir Chavkov

Kubernetes Security Training

Master Kubernetes security with this comprehensive 4-day training. Learn to secure clusters, implement security policies, detect threats, and maintain secure Kubernetes environments while preparing for the CKS certification.

Duration4 days (32 hours)
LevelIntermediate
DeliveryIn-person, Live online, Hybrid
CertificationCertified Kubernetes Security Specialist (CKS)
  • Kubernetes security engineers
  • Security-focused DevOps engineers
  • Platform security specialists
  • Anyone preparing for CKS certification

After completing this training, you’ll be able to:

  • Implement cluster hardening techniques
  • Secure cluster components and etcd
  • Configure system hardening and minimal attack surface
  • Implement network policies and TLS
  • Secure containerized applications
  • Monitor, detect, and respond to security threats
  • Implement Pod Security Standards

Module 1: Kubernetes Security Fundamentals

  • Security architecture overview
  • Threat modeling
  • Security principles
  • Hands-on: Assess cluster security

Module 2: Cluster Hardening

  • API server security
  • Kubelet security
  • etcd encryption
  • Hands-on: Harden control plane

Module 3: Authentication and Authorization

  • Authentication methods
  • RBAC implementation
  • Admission controllers
  • Hands-on: Configure RBAC

Module 4: System Hardening

  • Host OS security
  • Kernel security modules (AppArmor, SELinux)
  • Seccomp profiles
  • Hands-on: Implement system hardening

Module 5: Network Security

  • Network policies
  • Service mesh security
  • TLS certificate management
  • Hands-on: Secure network traffic

Module 6: Ingress Security

  • Ingress TLS configuration
  • WAF integration
  • API gateway security
  • Hands-on: Secure ingress

Module 7: Pod Security

  • Pod Security Standards
  • Pod Security Admission
  • Security contexts
  • Hands-on: Implement pod security

Module 8: Container Security

  • Image scanning
  • Image signing and verification
  • Runtime security
  • Hands-on: Scan and verify images

Module 9: Secrets Management

  • Secret encryption at rest
  • External secret management (Vault)
  • Sealed Secrets
  • Hands-on: Secure secrets

Day 4: Monitoring, Detection, and Response

Section titled “Day 4: Monitoring, Detection, and Response”

Module 10: Security Monitoring

  • Audit logging
  • Security event monitoring
  • Anomaly detection
  • Hands-on: Configure audit logging

Module 11: Runtime Security

  • Falco for runtime threat detection
  • Container behavior monitoring
  • Incident response
  • Hands-on: Deploy Falco

Module 12: Vulnerability Management

  • Vulnerability scanning
  • Compliance scanning
  • Remediation workflows
  • Hands-on: Scan for vulnerabilities

Module 13: CKS Exam Preparation

  • Exam format and requirements
  • Practice scenarios
  • Security hardening checklist
  • CKA certification or equivalent knowledge
  • Kubernetes administration experience
  • Linux security fundamentals
  • Understanding of networking and security concepts
FormatDescription
In-PersonOn-site at your company’s location, hands-on with direct interaction
Live OnlineInteractive virtual sessions with screen sharing and real-time labs
HybridCombination of on-site and remote sessions, flexible scheduling

All formats include hands-on labs, course materials, security checklists, practice scenarios, and post-training support.