种子简介
种子名称:
Certified Kubernetes Security Specialist (CKS)
文件类型:
视频
文件数目:
167个文件
文件大小:
4.4 GB
收录时间:
2025-6-11 17:25
已经下载:
3次
资源热度:
10
最近下载:
2025-6-14 12:32
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:86af8909e9ac8cc9b75d3ab35945b320fa4f6015&dn=Certified Kubernetes Security Specialist (CKS)
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Certified Kubernetes Security Specialist (CKS).torrent
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/004. 4.3 Segmentation.mp499.21MB
Introduction/001. Certified Kubernetes Security Specialist (CKS) Introduction.mp424.33MB
Module 1 Preparing for the CKS Exam/001. Module Introduction.mp412.18MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/001. Learning objectives.mp46.07MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/002. 1.1 CKS Certification Requirements.mp437.37MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/003. 1.2 Resources and Study Tools.mp425.03MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/004. 1.3 Practice Strategy.mp437.55MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/005. 1.4 Creating a Study Timeline and Expectations.mp427.32MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/001. Learning objectives.mp46.3MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/002. 2.1 Lab Environment and Architecture.mp430.58MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/003. 2.2 Local Installation.mp422.65MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/004. 2.3 Cloud Installation.mp457.2MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/005. 2.4 Your Cluster Up and Running.mp461.81MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/001. Learning objectives.mp48.18MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/002. 3.1 Cloud Native Security.mp433.68MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/003. 3.2 Kubernetes Architecture.mp423.81MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/004. 3.3 Kubernetes PKI Architecture.mp417MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/005. 3.4 Threat Modeling K8s.mp417.35MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/006. 3.5 Real World K8s Hacks.mp425.88MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/007. 3.6 OWASP Kubernetes Top 10.mp417.09MB
Module 2 Kubernetes Cluster Setup/001. Module Introduction.mp45.34MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/001. Learning objectives.mp46.96MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/002. 4.1 Network Security Overview.mp433MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/003. 4.2 Pod Communication Policies.mp439.33MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/001. Learning objectives.mp48.54MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/002. 5.1 CIS Benchmarks for Kubernetes.mp410.35MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/003. 5.2 Install Kube-bench.mp414.33MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/004. 5.3 Checking Compliance with Kube-bench.mp429.02MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/001. Learning objectives.mp48.99MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/002. 6.1 Understanding Ingress.mp49.15MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/003. 6.2 Creating Ingress Objects.mp421.68MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/004. 6.3 Ingress Security Options.mp426.69MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/005. 6.4 Testing Ingress Access.mp435.06MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/001. Learning objectives.mp410.93MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/002. 7.1 Understanding Kubelet.mp424.92MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/003. 7.2 Network Policies.mp428.82MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/004. 7.3 Node Metadata Protection.mp451.81MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/005. 7.4 Implement Kubelet Authentication.mp435.52MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/006. 7.5 Test Kubelet and Node Metadata Security.mp427.58MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/001. Learning objectives.mp48.15MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/002. 8.1 K8s Dashboard Architecture.mp417.06MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/003. 8.2 Dashboard Installation.mp440.23MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/004. 8.3 Role Based Access Control (RBAC).mp421.72MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/001. Learning objectives.mp410.03MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/002. 9.1 Understanding Platform Binary Integrity.mp421.36MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/003. 9.2 Download the Latest Kubernetes Release.mp410.62MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/004. 9.3 Verify Binary Checksum.mp424.28MB
Module 3 Cluster Hardening/001. Module Introduction.mp45.45MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/001. Learning objectives.mp44.5MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/002. 10.1 Kubernetes API Fundamentals.mp424.84MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/003. 10.2 Kubernetes Access Control.mp442.51MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/004. 10.3 API Server Configuration.mp449.37MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/005. 10.4 API Server Hardening.mp462.41MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/006. 10.5 Verify Access Control Policies.mp452.3MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/001. Learning objectives.mp46.25MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/002. 11.1 Understanding Kubernetes RBAC.mp428.2MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/003. 11.2 Creating a User Account.mp416.69MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/004. 11.3 Applying Roles to a User.mp433.89MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/005. 11.4 Configuring and Binding Cluster Roles.mp419.65MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/006. 11.5 Verifying Role Rules.mp432.99MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/001. Learning objectives.mp46.72MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/002. 12.1 Understanding Service Accounts.mp412.6MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/003. 12.2 Creating a Service Account.mp418.26MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/004. 12.3 Disable Default Settings.mp424.92MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/005. 12.4 Verify Service Account Permissions.mp416.81MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/001. Learning objectives.mp46.34MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/002. 13.1 Kubernetes Update Process.mp417.51MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/003. 13.2 Plan Upgrade Process.mp420.65MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/004. 13.3 Upgrade Components and Test.mp457.76MB
Module 4 System Hardening/001. Module Introduction.mp46MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/001. Learning objectives.mp44.16MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/002. 14.1 Host Hardening.mp443.2MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/003. 14.2 Remove Unneeded Services.mp430.79MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/004. 14.3 Log System Activities.mp433.77MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/005. 14.4 Limit Access.mp433.74MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/001. Learning objectives.mp45.69MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/002. 15.1 Understanding External Access to Kubernetes.mp411.74MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/003. 15.2 Finding Open Ports.mp430.5MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/004. 15.3 Host Firewall Configuration.mp414.99MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/005. 15.4 Test Host Firewall.mp426.42MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/001. Learning objectives.mp45.53MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/002. 16.1 Understanding Kernel Threats.mp426.63MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/003. 16.2 Using Seccomp.mp453.55MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/004. 16.3 Using AppArmor.mp427.49MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/005. 16.4 Testing Kernel Security.mp444.15MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/001. Learning objectives.mp45.06MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/002. 17.1 Principle of Least Privilege.mp420.23MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/003. 17.2 Host Based IAM.mp433MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/004. 17.3 Restricting User Privileges.mp420.37MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/005. 17.4 Controlling File Access and User Logging.mp422.19MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/006. 17.5 Understanding Cloud RBAC.mp413.97MB
Module 5 Minimize Microservice Vulnerabilities/001. Module Introduction.mp46.8MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/001. Learning objectives.mp47.16MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/002. 18.1 Understanding Pod Security.mp451.94MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/003. 18.2 Configure Security Contexts.mp447.7MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/004. 18.3 Pod Security Admission.mp423.17MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/005. 18.4 OPA Gatekeeper.mp440.24MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/001. Learning objectives.mp45.79MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/002. 19.1 Understanding Kubernetes Secrets.mp413.89MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/003. 19.2 Creating and Using a Secret.mp416.87MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/004. 19.3 Using Secrets in Pods.mp48.77MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/005. 19.4 Encrypting Secrets at Rest.mp438.29MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/001. Learning objectives.mp45.01MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/002. 20.1 Containing Containers.mp419.48MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/003. 20.2 Sandboxed Pods.mp453.83MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/004. 20.3 Using gVisor.mp425.35MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/005. 20.4 Using Kata Containers.mp431.53MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/001. Learning objectives.mp45.45MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/002. 21.1 Introduction to Cilium and mTLS.mp420.47MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/003. 21.2 Using Cilium for Pod-to-Pod Encryption.mp464.98MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/004. 21.3 Deploying and Verifying mTLS with Cilium.mp434.57MB
Module 6 Software Supply Chain Security/001. Module Introduction.mp45.99MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/001. Learning objectives.mp44.71MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/002. 22.1 Software Supply Chain Risks.mp434.3MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/003. 22.2 Protect Image Registry Access.mp419.75MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/004. 22.3 Require Signed Images.mp446.24MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/005. 22.4 Policy Enforcement Image Policy Webhook.mp478.29MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/006. 22.5 Policy Enforcement Validating Admission Policy.mp432.55MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.mp45.27MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.mp422.12MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.mp422.66MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.mp423.7MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/001. Learning objectives.mp44.32MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/002. 24.1 Understanding Container Images.mp436.51MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/003. 24.2 Use Image Creation Good Practices.mp431.04MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/004. 24.3 Reduce Image Attack Surface.mp425.3MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.mp46.89MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.mp417.52MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.mp430.13MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.mp448.7MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.mp441.29MB
Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.mp45.96MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.mp46.71MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.mp423.24MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.mp424.92MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.mp436.12MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.mp44.99MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.mp427.4MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.mp450.35MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.mp412.69MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.mp432.14MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.mp46.48MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.mp451.91MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.mp426.39MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.mp460.19MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.mp443.13MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.mp427.04MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.mp490.48MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.mp44.7MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.mp454.56MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.mp415.21MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.mp451.83MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.mp441.14MB
Module 8 Exam Practice Scenarios/001. Module Introduction.mp46.18MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.mp47.35MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.mp443.8MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).mp436.58MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.mp444.84MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.mp435.71MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.mp445.95MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.mp48.17MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.mp438.19MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.mp461.39MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.mp446.81MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.mp442.64MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.mp467.76MB
Summary/001. Certified Kubernetes Security Specialist (CKS) Summary.mp415.24MB