Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This comprehensive, hands-on program is designed to equip you with the practical skills and strategic knowledge needed to secure cloud-native applications, harden Kubernetes clusters, and confidently pass the CKS certification exam. Through real-world scenarios, interactive labs, and expert guidance, you’ll learn to implement robust security measures, mitigate risks, and ensure the integrity of your Kubernetes environments—preparing you to meet the demands of today’s rapidly evolving cloud infrastructure.
Syllabus
- Course 1: Certified Kubernetes Security Specialist (CKS): Unit 1
- Course 2: Certified Kubernetes Security Specialist (CKS): Unit 2
- Course 3: Certified Kubernetes Security Specialist (CKS): Unit 3
- Course 4: Certified Kubernetes Security Specialist (CKS): Unit 4
- Course 5: Certified Kubernetes Security Specialist (CKS): Unit 5
- Course 6: Certified Kubernetes Security Specialist (CKS): Unit 6
- Course 7: Certified Kubernetes Security Specialist (CKS): Unit 7
- Course 8: Certified Kubernetes Security Specialist (CKS): Unit 8
Courses
-
This course breaks down the CKS certification process, clarifying exam requirements and helping you create an effective study plan. You’ll set up and manage your own Kubernetes home lab, both locally and in the cloud, to practice real-world scenarios. Key topics include Kubernetes security fundamentals, cloud-native application protection, threat modeling, and an overview of Kubernetes architecture and public key infrastructure. You’ll also analyze real hacking incidents and top OWASP risks to learn how to spot and fix vulnerabilities. Whether you want certification or to strengthen your Kubernetes skills, this course gives you practical knowledge and strategies for today’s cloud-native environments.
-
This course covers network security policies, CIS benchmark implementation, and secure ingress with TLS. Learn how to set up, configure, and secure a Kubernetes cluster using industry best practices. You’ll practice node protection, binary verification, and Kubernetes Dashboard security, including role-based access control. Each lesson offers hands-on experience to help you secure your Kubernetes environments and prepare for the CKS exam. This course is ideal for those seeking certification or wanting to advance their cloud-native security skills.
-
This course focuses on securing Kubernetes clusters by restricting API access and using strong role-based access control (RBAC). You’ll learn to manage user and service accounts securely, harden the API server, and configure access policies. The course also covers keeping your Kubernetes environment updated, including how to plan and execute upgrades with minimal downtime using KubeAdmin. By the end, you’ll have the skills to improve your cluster’s security and meet CKS certification standards.
-
This course teaches you how to strengthen your cluster’s underlying systems by reducing the host operating system’s attack surface. You’ll learn host hardening, how to remove unnecessary services, and set up logging and access controls. You'll cover network security, host firewalls, and kernel hardening with tools like SecComp and AppArmor. You’ll also focus on identity and access management, applying least privilege and understanding RBAC risks. Each lesson provides practical strategies to make your Kubernetes environments more secure and prepare you for the CKS exam.
-
This course covers enforcing pod security, managing secrets, and using advanced container isolation tools like OPA Gatekeeper, GVisor, and Kata Containers. You’ll also learn to implement pod-to-pod encryption with Celium to secure service communication. By the end, you’ll know how to minimize vulnerabilities, control configurations, and protect your microservices—skills valuable for both the CKS exam and real-world security.
-
This course teaches you how to defend your Kubernetes environments against supply chain threats. You’ll secure image registries, enforce image signing, and set up access controls. Learn to use tools like KubeLinter and KubeSec for static analysis, reduce base image size, and scan for vulnerabilities with Trivy. Automate security policies using Trivy Operator and Kyverno. By course end, you’ll be able to secure your software supply chain and maintain a safe Kubernetes infrastructure.
-
This course covers how to maintain and improve Kubernetes security with continuous monitoring, logging, and runtime protection. You’ll enforce container immutability, manage audit logging, and use open-source tools for log storage. You'll detect threats in real time with Falco, using behavioral analysis and custom rules. The course also covers investigating and responding to security incidents using the MITRE ATT&CK framework. Each lesson gives you practical tools to secure your clusters and succeed in the CKS exam.
-
This course gives you the change to apply your knowledge in hands-on, exam-style scenarios that reflect real Kubernetes security challenges. You’ll practice securing API access, enforcing pod security, implementing network policies, and managing secret encryption. Advanced topics include container runtime security, real-time threat detection with Falco, network encryption, and secure ingress. These practice exams build your confidence and experience for the CKS exam and real-world Kubernetes security tasks.
Taught by
Pearson