Get from Zero to Practitioner Level of Kubernetes Security in Cloud
Learning Kubernetes Security in AWS Cloud (Amazon EKS Security) with Lab & Projects for both Engineers and Architects
Do you want to level up your Kubernetes Security skills in AWS Cloud?
Most organizations use Kubernetes in Cloud or Managed Kubernetes to build, deploy and release modern applications (including the AI based applications).
If transitioning to Cloud Security or level up your confidence in Kubernetes Security in AWS Cloud is your goal then this is the course will provide you that.
The Kubernetes Security in Cloud for Cloud Security Engineers and Architects can be understood in 5 Levels.
Each level builds on the other to help you get from a stage of minimum knowledge of Kubernetes to securing Kubernetes hosted products, applications and softwares in Cloud production environments.
Note all levels have practical labs with walkthrough and access to community so you can connect with others in your “Level ‘X’ Group”, where ‘X’ is the level you are currently working to excel in.
In this training course(s), you will be learn
Level 1 - Kubernetes Building Blocks
Level 2 - Cloud Security Building Blocks
Level 3 - Kubernetes in Cloud Building Blocks
Level 4 - Defining & Building Cloud Securing Patterns for Amazon EKS
What’s included at Each Level
Access to the Selected Level community
Access to ChaGPT App to understand topics
Access to the Course Material (Pre-Recorded - 2024 version)
What’s not included:
Coverage of open source tools that are thousands in number
AWS Accounts - the students should create their own AWS labs. (This is to ensure real world experience and not the simulation of a perfect lab. The students are encouraged to ask questions in the “community“ to help resolve any issues as they would in a real job with the help of other experts.)
FAQ
Didn’t find your answer?
Please fill out the support form for any questions to be answered.
-
Why Containers and Kubernetes are important for Cloud Experts?
Fundamentals of Containers
Fundamentals of Kubernetes
3 Deployment Types for Kubernetes, you MUST know
Architecture - Components of Kubernetes (relevant for Kubernetes Security)
Security Components of Kubernetes Architecture
Security Best Practices for Kubernetes (OWASP Top 10)
Sec Architecture & Engineering Project Lab - Build your first AWS Cloud Security Lab
-
Everything in Level 1
Security Fundamentals of Amazon Cloud Management
Identity & Access Management in AWS
Network Security in AWS
Compute Security in AWS
Data Security in AWS
Storage Security in AWS
Logging and Monitoring Security in AWS
Sec Architecture Project Lab - Walk though of Threat Model & Solution Design Architecture for a “Hello World“ application in Amazon EC2 in a private AWS network
Sec Engineering Project Lab - Walk through of Threat Model & Deploying your first “Hello World“ application on an Amazon EC2 in a private AWS network & how to connect to the Amazon EC2
-
Everything in Level 2
Fundamentals of Amazon EKS
Difference between Amazon EKS & Amazon ECS
Deployment Types of Amazon EKS, you MUST know
AWS Architecture - Common Components of Amazon EKS
AWS Infrastructure and Application - Common Components of Amazon EKS
AWS Security Services - Common Security Components of Amazon EKS
Security gaps between a Self Hosted Kubernetes & Amazon EKS
Amazon EKS Security Cloud Best Practices
Sec Architecture Project Lab - Walk though of Threat Model & Solution Design Architecture for a “Hello World“ application in Amazon EKS
Sec Engineering Project Lab - Walk through of Threat Model & Deploying your first Amazon EKS Cluster with 1 Node with a Hello World Application
-
Everything in Level 3
Online vs Reality version of Kubernetes Architecture
Security Architecture Components Examples for Amazon EKS - Amazon Services, Container Security, Endpoint Security, IAM, Kubernetes Security, Supply Chain Security, DevSecOps etc
Security Engineering Components Examples for Amazon EKS - Amazon Services, Secret Management, IAM, Deployment Environment Management, CI/CD, GitOps etc
Sec Architecture & Engineer Project 1 - Threat Model & Deploying “Hello World“ application into Amazon EKS (EC2) using AWS Services
Sec Architecture & Engineer Project 2 - Deploying “Hello World“ application into Amazon EKS (Fargate) using AWS Services
Sec Architecture & Engineer Project 3 - Deploying AWS Security Services for security of “Shopping website“ into Amazon EKS (EC2)
Sec Architecture & Engineer Project 4 - Deploying AWS Security Services for security of “Shopping website“ into Amazon EKS Fargate
Sec Architecture & Engineer Project 5 - Deploying AWS Security Services for security of application into Amazon EKS
-
At this level, you are expected to know and complete projects in Level 1-4.
Please fill out your details here to schedule a call for the Advanced LIVE Training in Amazon EKS Security.
Key Takeaways
A thorough understanding of the attack surface cloud-based organizations face
A full methodology for compromising cloud environments
Instruction on how to utilize open-source tools during cloud assessments
Who Should Take This Course
Cloud Security Engineers
Cloud Engineers & Architects
Cloud security architects
Cloud Native engineer/architect (kubernetes)
Cloud Certification Holders (e.g AWS Associate or Professional Certificates)
General security practitioners
Level 1 & above Finishers of the “Zero to Practitioner in AWS Security” Course
NOTE - The course will not teach you security of all CNCF 3rd open source tools used in Kubernetes Deployments, only the most common services and tools that are used across a broad set of Kubernetes deployment in production environments.
Audience Skill Level
Any student with understanding of IT Fundamentals and preferably working in Technical IT role. This course somewhat doubles as a general AWS & kubernetes “crash course”.
Student Requirements
A credit card (You will be signing up for cloud service accounts such as AWS. These services require a credit card for signing up.)
Check that Amazon AWS e services are available in your country. (Note that if you cannot sign up for these services you will not be able to participate in the labs)
Internet access
System Requirements
Stable Internet access
Modern Internet Browser (Google Chrome, Firefox, Safari etc)