17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Microservices are secured via both code and infrastructure. This course will teach you how to secure microservices hosted within a Kubernetes environment.
What you'll learn
A vulnerability in microservice code can lead to the compromise of your entire Kubernetes cluster. In this course, Kubernetes Security: Minimizing Microservice Vulnerabilities, you’ll learn to minimize any microservice vulnerabilities that may exist. First, you’ll explore security policies that will secure your pods and containers. Next, you’ll discover how to store the secrets you need for microservices to function properly. Finally, you’ll learn how to use more secure container runtimes and to protect communications between microservices. When you’re finished with this course, you’ll have the skills and knowledge of Kubernetes security needed to minimize microservice vulnerabilities and protect your infrastructure from attack.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4
3.2 MB
~Get Your Files Here !/02. Using Security Policies to Secure Pods and Containers/02. Introducing the Scenario.mp4
4.8 MB
~Get Your Files Here !/02. Using Security Policies to Secure Pods and Containers/03. The Threat of Misconfigured Security Policies.mp4
6.4 MB
~Get Your Files Here !/02. Using Security Policies to Secure Pods and Containers/04. Using Pod Security Policies to Protect Your Cluster.mp4
6.1 MB
~Get Your Files Here !/02. Using Security Policies to Secure Pods and Containers/05. Demo-Creating a Pod Security Policy.mp4
12.6 MB
~Get Your Files Here !/02. Using Security Policies to Secure Pods and Containers/06. Securing Pods with SecurityContext Settings.mp4
12 MB
~Get Your Files Here !/02. Using Security Policies to Secure Pods and Containers/07. Using OPA to Enforce Security-relevant Policies.mp4
9.3 MB
~Get Your Files Here !/02. Using Security Policies to Secure Pods and Containers/08. Creating Constraints in OPA Gatekeeper.mp4
8.2 MB
~Get Your Files Here !/02. Using Security Policies to Secure Pods and Containers/09. Review and Apply Security Policies.mp4
11.7 MB
~Get Your Files Here !/03. Managing Secrets in Kubernetes/10. Module Overview.mp4
2.5 MB
~Get Your Files Here !/03. Managing Secrets in Kubernetes/11. How Secrets Work in Kubernetes.mp4
5.3 MB
~Get Your Files Here !/03. Managing Secrets in Kubernetes/12. Creating and Using Kubernetes Secrets.mp4
10.4 MB
~Get Your Files Here !/03. Managing Secrets in Kubernetes/13. Securing Kubernetes Secrets.mp4
11 MB
~Get Your Files Here !/03. Managing Secrets in Kubernetes/14. Review and Apply Kubernetes Secrets.mp4
8 MB
~Get Your Files Here !/04. Using Secure Container Runtimes/15. Module Overview.mp4
2.1 MB
~Get Your Files Here !/04. Using Secure Container Runtimes/16. Examining Container Runtimes.mp4
4.7 MB
~Get Your Files Here !/04. Using Secure Container Runtimes/17. Introducing gVisor and Kata Containers.mp4
8.2 MB
~Get Your Files Here !/04. Using Secure Container Runtimes/18. Running Pods with Secure Containers.mp4
13 MB
~Get Your Files Here !/04. Using Secure Container Runtimes/19. Review and Apply Secure Containers.mp4
3.5 MB
~Get Your Files Here !/05. Securing Pod-to-pod Communication/20. Module Overview.mp4
872.8 KB
~Get Your Files Here !/05. Securing Pod-to-pod Communication/21. The What and Why of mTLS.mp4
5.8 MB
~Get Your Files Here !/05. Securing Pod-to-pod Communication/22. Implementing mTLS.mp4
5.2 MB
~Get Your Files Here !/05. Securing Pod-to-pod Communication/23. Review and Apply mTLS.mp4
3.8 MB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Exercise Files/02/using-security-policies-to-secure-pods-and-containers-slides.pdf
4 MB
~Get Your Files Here !/Exercise Files/03/managing-secrets-in-kubernetes-slides.pdf
1.7 MB
~Get Your Files Here !/Exercise Files/04/using-secure-container-runtimes-slides.pdf
1 MB
~Get Your Files Here !/Exercise Files/05/demos/kube/02/eks.privileged.yml
1.7 KB
~Get Your Files Here !/Exercise Files/05/demos/kube/02/globo-psp.yml
527 B
~Get Your Files Here !/Exercise Files/05/demos/kube/02/globo-role-bind.yml
294 B
~Get Your Files Here !/Exercise Files/05/demos/kube/02/globo-role.yml
224 B
~Get Your Files Here !/Exercise Files/05/demos/kube/02/security-context-demo-no-context.yaml
363 B
~Get Your Files Here !/Exercise Files/05/demos/kube/02/security-context-demo.yaml
445 B
~Get Your Files Here !/Exercise Files/05/demos/kube/02/test-privileged-pod.yml
162 B
~Get Your Files Here !/Exercise Files/05/demos/kube/03/globoSecret.yaml
155 B
~Get Your Files Here !/Exercise Files/05/demos/kube/03/password.txt
11 B
~Get Your Files Here !/Exercise Files/05/demos/kube/03/powershell_base64.txt
80 B
~Get Your Files Here !/Exercise Files/05/demos/kube/03/secret-pod.yaml
294 B
~Get Your Files Here !/Exercise Files/05/demos/kube/03/username.txt
5 B
~Get Your Files Here !/Exercise Files/05/demos/kube/04/gvisor-pod.yaml
144 B
~Get Your Files Here !/Exercise Files/05/demos/kube/04/gvisor2.yaml
93 B
~Get Your Files Here !/Exercise Files/05/demos/kube/04/nginx-runc.yaml
113 B
~Get Your Files Here !/Exercise Files/05/demos/kube/05/mtls.yaml
211 B
~Get Your Files Here !/Exercise Files/05/demos/kube/README.txt
511 B
~Get Your Files Here !/Exercise Files/05/securing-pod-to-pod-communication-slides.pdf