Filename Size ~Get Your Files Here !/1 - Course Introduction/1 - Course Overview and Objectives (Reading Material).html 1.2 KB ~Get Your Files Here !/1 - Course Introduction/1 - Disclaimer for the Lecture.html 1.5 KB ~Get Your Files Here !/1 - Course Introduction/1 -Course Overview and Objectives (Video Material).mp4 32.3 MB ~Get Your Files Here !/1 - Course Introduction/2 - Quick Read Before Taking This Lecture (Note).html 3.2 KB ~Get Your Files Here !/1 - Course Introduction/2 - Version (Note).html 761 B ~Get Your Files Here !/2 - Overview of Cloud Native Security/1 - The 4Cs of Cloud-Native Security (Note).html 1.5 KB ~Get Your Files Here !/2 - Overview of Cloud Native Security/1 -The 4Cs of Cloud-Native Security (Video).mp4 39.5 MB ~Get Your Files Here !/2 - Overview of Cloud Native Security/2 - Cloud Native Security Phases(Note) v0.0.2.html 2.7 KB ~Get Your Files Here !/2 - Overview of Cloud Native Security/2 -Cloud Native Security Phases(Video).mp4 45.1 MB ~Get Your Files Here !/2 - Overview of Cloud Native Security/3 - Cloud Provider (Note) v0.0.2.html 3.4 KB ~Get Your Files Here !/2 - Overview of Cloud Native Security/3 -Cloud Provider (Video).mp4 40.3 MB ~Get Your Files Here !/2 - Overview of Cloud Native Security/4 - Artifact Repository And Image Security (Note) v.0.0.2.html 3.2 KB ~Get Your Files Here !/2 - Overview of Cloud Native Security/4 -Artifact Repository And Image Security (Video).mp4 60.1 MB ~Get Your Files Here !/2 - Overview of Cloud Native Security/5 - Controls And Frameworks (Note).html 2.9 KB ~Get Your Files Here !/2 - Overview of Cloud Native Security/5 -Controls And Frameworks (Video).mp4 57.5 MB ~Get Your Files Here !/2 - Overview of Cloud Native Security/6 - Isolation Techniques (Note).html 4.6 KB ~Get Your Files Here !/2 - Overview of Cloud Native Security/6 -Isolation Techniques (Video).mp4 38.6 MB ~Get Your Files Here !/2 - Overview of Cloud Native Security/7 - Workload and Application Code Security (Note) v.0.0.2.html 4 KB ~Get Your Files Here !/2 - Overview of Cloud Native Security/7 -Workload and Application Code Security (Video).mp4 37.2 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/1 - API Server Security (Note).html 3.2 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/1 -API Server Security (Video).mp4 40 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/10 - Storage (Note).html 4.2 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/10 -Storage (Video).mp4 39.1 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/2 - Controller Manager (Note) v.0.0.2.html 2 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/2 -Controller Manager (Video).mp4 30.3 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/3 - Scheduler (Note) v.0.0.2.html 3.4 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/3 -Scheduler (Video).mp4 62.1 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/4 - Kubelet (Note) v.0.0.2.html 5.5 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/4 -Kubelet (Video).mp4 66.6 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/5 - KubeProxy (Note) v.0.0.2.html 3.8 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/5 -KubeProxy (Video).mp4 35.6 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/6 - Pod (Reading).html 3.6 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/6 -Pod (Video).mp4 37.3 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/7 - Container (Note).html 1.6 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/7 -Container (Video).mp4 19.7 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/8 - Client Security (Note).html 2.8 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/8 -Client Security (Video).mp4 45.9 MB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/9 - Etcd (Note) v.0.0.2.html 3 KB ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/9 -Etcd (Video).mp4 24.7 MB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/1 - Pod Security Standards (Note).html 2 KB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/1 -Pod Security Standards (Video).mp4 33.2 MB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/2 - Pod Security Admissions (Note).html 2.4 KB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/2 -Pod Security Admissions (Video).mp4 26.2 MB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/3 - Audit Logging and Monitoring (Note).html 3.1 KB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/3 -Audit Logging and Monitoring (Video).mp4 40.6 MB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/4 - Authentication in Kubernetes Clusters (Note).html 3.2 KB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/4 -Authentication in Kubernetes Clusters (Video).mp4 42.6 MB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/5 - Authorization (Note).html 2.5 KB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/5 -Authorization (Video).mp4 37.6 MB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/6 - Isolation and Segmentation (Note).html 2.8 KB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/6 -Isolation and Segmentation (Video).mp4 31.9 MB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/7 - Network Policy (Note).html 2.3 KB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/7 -Network Policy (Video).mp4 20.5 MB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/8 - Secrets (Note).html 2.9 KB ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/8 -Secrets (Video).mp4 32.2 MB ~Get Your Files Here !/5 - Kubernetes Threat Model/1 - Accessing and Protecting Sensitive Data (Note).html 2.7 KB ~Get Your Files Here !/5 - Kubernetes Threat Model/1 -Accessing and Protecting Sensitive Data (Video).mp4 31.8 MB ~Get Your Files Here !/5 - Kubernetes Threat Model/2 - Kubernetes Trust Boundaries and Data Flow (Note).html 2.8 KB ~Get Your Files Here !/5 - Kubernetes Threat Model/2 -Kubernetes Trust Boundaries and Data Flow (Video).mp4 16.6 MB ~Get Your Files Here !/5 - Kubernetes Threat Model/3 - Attacker on the Network (Note).html 3.5 KB ~Get Your Files Here !/5 - Kubernetes Threat Model/3 -Attacker on the Network (Video).mp4 39.4 MB ~Get Your Files Here !/5 - Kubernetes Threat Model/4 - Persistence (Note).html 3.1 KB ~Get Your Files Here !/5 - Kubernetes Threat Model/4 -Persistence (Video).mp4 25.9 MB ~Get Your Files Here !/5 - Kubernetes Threat Model/5 - Denial of Service DoS Attacks (Note).html 2.2 KB ~Get Your Files Here !/5 - Kubernetes Threat Model/5 -Denial of Service DoS Attacks (Video).mp4 18 MB ~Get Your Files Here !/5 - Kubernetes Threat Model/6 - Privilege Escalation (Note).html 2.6 KB ~Get Your Files Here !/5 - Kubernetes Threat Model/6 -Privilege Escalation (Video).mp4 27 MB ~Get Your Files Here !/5 - Kubernetes Threat Model/7 - Malicious Code Execution in Containers (Note).html 1.7 KB ~Get Your Files Here !/5 - Kubernetes Threat Model/7 -Malicious Code Execution in Containers (Video).mp4 18.4 MB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/1 - Supply Chain Security in Kubernetes (Note).html 3.2 KB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/1 -Supply Chain Security in Kubernetes (Video).mp4 39.6 MB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/2 - Admission Control and Dynamic Security Policies (Note).html 2.3 KB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/2 -Admission Control and Dynamic Security Policies (Video).mp4 23.9 MB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/3 - Understanding PKI and Connectivity in Kubernetes (Note).html 2.5 KB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/3 -Understanding PKI and Connectivity in Kubernetes (Video).mp4 25.5 MB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/4 - Securing the Image Repository (Note).html 2.4 KB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/4 -Securing the Image Repository (Video).mp4 34.9 MB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/5 - Observability and Monitoring in Kubernetes (Note).html 3.4 KB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/5 -Observability and Monitoring in Kubernetes (Video).mp4 26.6 MB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/6 - Implementing Service Mesh Security(Note).html 2.5 KB ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/6 -Implementing Service Mesh Security(Video).mp4 29.7 MB ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/1 - Compliance Frameworks (Note).html 2.7 KB ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/1 -Compliance Frameworks (Video).mp4 30.1 MB ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/2 - Kubernetes Threat Modeling Frameworks - STRIDE (Note).html 2.9 KB ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/2 -Kubernetes Threat Modeling Frameworks - STRIDE (Video).mp4 29.5 MB ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/3 - Supply Chain Compliance in Kubernetes (Note).html 3.9 KB ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/3 -Supply Chain Compliance in Kubernetes (Video).mp4 29.2 MB ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/4 - Automation and Security Tooling for Kubernetes Compliance (Note).html 2.8 KB ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/4 -Automation and Security Tooling for Kubernetes Compliance (Video).mp4 32.3 MB ~Get Your Files Here !/8 - Section 7 Conclusion/1 -Thank you.mp4 3.5 MB ~Get Your Files Here !/Bonus Resources.txt 70 B