搜索
Kubernetes CKS 2021 Complete Course + Simulator
磁力链接/BT种子名称
Kubernetes CKS 2021 Complete Course + Simulator
磁力链接/BT种子简介
种子哈希:
2d3a658d896569b680c013d4c40256c753d3adb6
文件大小:
5.49G
已经下载:
129
次
下载速度:
极快
收录时间:
2022-01-10
最近下载:
2024-07-26
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:2D3A658D896569B680C013D4C40256C753D3ADB6
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
校园
老公肏我大鸡巴肏我”对话超淫荡花臂大神征服调教最嫩母狗
撸管舞
最新女王调教
厕所打飞机
暑假作业系列
揉捏 大奶
漂亮小少妇
豊満熟
2005.7
喜欢健身的女人
顶级ntr
black uhuru showcase
史上尺度最大的
下海 小荷
征服女神
open matte
花花狮子
抽搐妹
012624-001
淫荡洞穴
filth mkv pl
未解決事件
mezzanotte a istanbul
凌云系列
小恩
点点玩
唐忆鲁
pumpingmuscle
ipzz-378
文件列表
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 Practice - Encrypt ETCD.mp4
233.5 MB
26 Runtime Security - Auditing/146 Practice - Create advanced Audit Policy.mp4
170.8 MB
26 Runtime Security - Auditing/147 Practice - Investigate API access history.mp4
164.0 MB
11 Cluster Hardening - RBAC/051 Practice - CertificateSigningRequests.mp4
163.6 MB
24 Runtime Security - Behavioral Analytics at host and container level/136 Practice - Change Falco Rule.mp4
149.2 MB
07 Cluster Setup - Secure Ingress/033 Practice - Secure an Ingress.mp4
135.8 MB
02 Create your course K8s cluster/008 Practice - Create Kubeadm Cluster in GCP.mp4
125.3 MB
17 Microservice Vulnerabilities - OS Level Security Domains/095 Practice - Create and enable PodSecurityPolicy.mp4
121.0 MB
23 Supply Chain Security - Secure Supply Chain/127 Practice - ImagePolicyWebhook.mp4
120.6 MB
19 Open Policy Agent (OPA)/104 Practice - Enforce Namespace Labels.mp4
116.3 MB
27 System Hardening - Kernel Hardening Tools/156 Practice - Seccomp for Kubernetes Nginx.mp4
108.2 MB
13 Cluster Hardening - Restrict API Access/062 Practice - External Apiserver Access.mp4
106.2 MB
19 Open Policy Agent (OPA)/103 Practice - Deny All Policy.mp4
106.0 MB
24 Runtime Security - Behavioral Analytics at host and container level/131 Practice - Strace and _proc on ETCD.mp4
104.0 MB
26 Runtime Security - Auditing/144 Practice - Enable Audit Logging in Apiserver.mp4
100.8 MB
05 Cluster Setup - Network Policies/023 Practice - Backend to Database traffic.mp4
98.4 MB
23 Supply Chain Security - Secure Supply Chain/125 Practice - Whitelist Registries with OPA.mp4
87.2 MB
20 Supply Chain Security - Image Footprint/109 Practice - Reduce Image Footprint with Multi-Stage.mp4
82.9 MB
13 Cluster Hardening - Restrict API Access/061 Practice - Manual API Request.mp4
81.8 MB
07 Cluster Setup - Secure Ingress/032 Practice - Create an Ingress.mp4
79.9 MB
28 System Hardening - Reduce Attack Surface/162 Practice - Investigate Linux Users.mp4
79.6 MB
02 Create your course K8s cluster/007 Practice - Configure _gcloud_ command.mp4
78.8 MB
24 Runtime Security - Behavioral Analytics at host and container level/134 Practice - Use Falco to find malicious processes.mp4
78.3 MB
20 Supply Chain Security - Image Footprint/110 Practice - Secure and harden Images.mp4
70.6 MB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 Practice - Pod uses custom ServiceAccount.mp4
70.6 MB
27 System Hardening - Kernel Hardening Tools/152 Practice - AppArmor for Docker Nginx.mp4
64.9 MB
18 Microservice Vulnerabilities - mTLS/098 Practice - Create sidecar proxy.mp4
64.8 MB
14 Cluster Hardening - Upgrade Kubernetes/068 Practice - Upgrade master node.mp4
63.0 MB
26 Runtime Security - Auditing/145 Practice - Create Secret and check Audit Logs.mp4
62.6 MB
03 Foundation - Kubernetes Secure Architecture/013 Practice - Find various K8s certificates.mp4
62.3 MB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 Practice - Install and use gVisor.mp4
59.8 MB
10 Cluster Setup - Verify Platform Binaries/045 Practice - Verify apiserver binary running in our cluster.mp4
59.4 MB
09 Cluster Setup - CIS Benchmarks/040 Practice - CIS in Action.mp4
58.6 MB
22 Supply Chain Security - Image Vulnerability Scanning/121 Practice - Use Trivy to scan images.mp4
57.7 MB
24 Runtime Security - Behavioral Analytics at host and container level/133 Practice - Falco and Installation.mp4
57.3 MB
05 Cluster Setup - Network Policies/022 Practice - Frontend to Backend traffic.mp4
56.1 MB
28 System Hardening - Reduce Attack Surface/160 Practice - Install and investigate Services.mp4
55.7 MB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/072 Practice - Create Simple Secret Scenario.mp4
50.7 MB
11 Cluster Hardening - RBAC/049 Practice - ClusterRole and ClusterRoleBinding.mp4
49.9 MB
24 Runtime Security - Behavioral Analytics at host and container level/130 Practice - Strace.mp4
49.8 MB
17 Microservice Vulnerabilities - OS Level Security Domains/087 Intro and Security Contexts.mp4
46.4 MB
09 Cluster Setup - CIS Benchmarks/041 Practice - kube-bench.mp4
46.2 MB
27 System Hardening - Kernel Hardening Tools/153 Practice - AppArmor for Kubernetes Nginx.mp4
45.9 MB
08 Cluster Setup - Node Metadata Protection/037 Practice_ Protect Node Metadata via NetworkPolicy.mp4
45.7 MB
19 Open Policy Agent (OPA)/105 Practice - Enforce Deployment replica count.mp4
44.5 MB
06 Cluster Setup - GUI Elements/028 Practice - Outside Insecure Access.mp4
43.6 MB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 Practice - Hack Secrets in ETCD.mp4
43.3 MB
25 Runtime Security - Immutability of containers at runtime/141 Practice - SecurityContext renders container immutable.mp4
43.1 MB
21 Supply Chain Security - Static Analysis/117 Practice - OPA Confest for Dockerfile.mp4
42.7 MB
21 Supply Chain Security - Static Analysis/114 Practice - Kubesec.mp4
42.3 MB
23 Supply Chain Security - Secure Supply Chain/124 Practice - Image Digest.mp4
41.0 MB
04 Foundation - Containers under the hood/015 Intro.mp4
40.3 MB
26 Runtime Security - Auditing/143 Introduction.mp4
39.2 MB
10 Cluster Setup - Verify Platform Binaries/044 Practice - Download and verify K8s release.mp4
38.7 MB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 Practice - Disable ServiceAccount mounting.mp4
35.3 MB
19 Open Policy Agent (OPA)/102 Practice - Install OPA.mp4
35.1 MB
05 Cluster Setup - Network Policies/021 Practice - Default Deny.mp4
35.0 MB
03 Foundation - Kubernetes Secure Architecture/012 Intro.mp4
33.6 MB
13 Cluster Hardening - Restrict API Access/060 Practice - Insecure Access.mp4
33.5 MB
27 System Hardening - Kernel Hardening Tools/151 Practice - AppArmor for curl.mp4
33.4 MB
17 Microservice Vulnerabilities - OS Level Security Domains/088 Practice - Set Container User and Group.mp4
32.7 MB
11 Cluster Hardening - RBAC/048 Practice - Role and Rolebinding.mp4
31.4 MB
25 Runtime Security - Immutability of containers at runtime/140 Practice - StartupProbe changes container.mp4
29.6 MB
19 Open Policy Agent (OPA)/106 Practice - The Rego Playground and more examples.mp4
29.6 MB
01 Introduction/004 K8s Security Best Practices.mp4
29.2 MB
11 Cluster Hardening - RBAC/047 Intro.mp4
28.7 MB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/073 Practice - Hack Secrets in Docker.mp4
28.5 MB
14 Cluster Hardening - Upgrade Kubernetes/069 Practice - Upgrade worker node.mp4
28.2 MB
28 System Hardening - Reduce Attack Surface/159 Practice - Systemctl and Services.mp4
27.3 MB
24 Runtime Security - Behavioral Analytics at host and container level/132 Practice - _proc and env variables.mp4
27.2 MB
24 Runtime Security - Behavioral Analytics at host and container level/135 Practice - Investigate Falco rules.mp4
27.1 MB
20 Supply Chain Security - Image Footprint/111 Recap.mp4
26.4 MB
21 Supply Chain Security - Static Analysis/116 Practice - OPA Confest for K8s YAML.mp4
26.3 MB
05 Cluster Setup - Network Policies/020 Introduction 2.mp4
25.5 MB
14 Cluster Hardening - Upgrade Kubernetes/066 Introduction.mp4
24.2 MB
18 Microservice Vulnerabilities - mTLS/097 Intro.mp4
22.7 MB
28 System Hardening - Reduce Attack Surface/161 Practice - Disable application listening on port.mp4
22.6 MB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/079 Practice - Container calls Linux Kernel.mp4
22.5 MB
13 Cluster Hardening - Restrict API Access/064 Practice - Verify NodeRestriction.mp4
22.0 MB
06 Cluster Setup - GUI Elements/026 Introduction.mp4
21.8 MB
21 Supply Chain Security - Static Analysis/112 Introduction.mp4
21.5 MB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 Recap.mp4
21.4 MB
22 Supply Chain Security - Image Vulnerability Scanning/119 Introduction.mp4
21.0 MB
24 Runtime Security - Behavioral Analytics at host and container level/129 Introduction.mp4
20.4 MB
06 Cluster Setup - GUI Elements/030 Recap.mp4
20.3 MB
01 Introduction/001 Welcome.mp4
19.8 MB
19 Open Policy Agent (OPA)/101 Introduction.mp4
19.7 MB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/078 Introduction.mp4
19.4 MB
13 Cluster Hardening - Restrict API Access/058 Introduction.mp4
19.4 MB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/084 Practice - Create and use RuntimeClasses.mp4
19.3 MB
06 Cluster Setup - GUI Elements/029 Practice - RBAC for the Dashboard.mp4
19.3 MB
13 Cluster Hardening - Restrict API Access/059 Practice - Anonymous Access.mp4
19.1 MB
14 Cluster Hardening - Upgrade Kubernetes/067 Practice - Create outdated cluster.mp4
19.0 MB
28 System Hardening - Reduce Attack Surface/158 Introduction.mp4
18.9 MB
23 Supply Chain Security - Secure Supply Chain/123 Introduction.mp4
18.0 MB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/081 Practice - Crictl.mp4
17.9 MB
05 Cluster Setup - Network Policies/019 Introduction 1.mp4
16.9 MB
20 Supply Chain Security - Image Footprint/108 Introduction.mp4
16.4 MB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/075 ETCD Encryption.mp4
16.3 MB
05 Cluster Setup - Network Policies/024 Recap.mp4
14.8 MB
17 Microservice Vulnerabilities - OS Level Security Domains/091 Practice - Create Privileged Containers.mp4
14.7 MB
02 Create your course K8s cluster/006 Practice - Create GCP Account.mp4
14.3 MB
27 System Hardening - Kernel Hardening Tools/155 Practice - Seccomp for Docker Nginx.mp4
13.9 MB
09 Cluster Setup - CIS Benchmarks/042 Recap.mp4
13.7 MB
04 Foundation - Containers under the hood/016 Practice - The PID Namespace.mp4
13.3 MB
25 Runtime Security - Immutability of containers at runtime/139 Ways to enforce immutability.mp4
12.8 MB
27 System Hardening - Kernel Hardening Tools/157 Recap.mp4
12.5 MB
06 Cluster Setup - GUI Elements/027 Practice - Install Dashboard.mp4
12.5 MB
07 Cluster Setup - Secure Ingress/031 Introduction.mp4
12.3 MB
11 Cluster Hardening - RBAC/050 Accounts and Users.mp4
12.3 MB
17 Microservice Vulnerabilities - OS Level Security Domains/096 Recap.mp4
11.9 MB
08 Cluster Setup - Node Metadata Protection/036 Practice_ Access Node Metadata.mp4
11.5 MB
24 Runtime Security - Behavioral Analytics at host and container level/137 Recap.mp4
11.4 MB
27 System Hardening - Kernel Hardening Tools/154 Seccomp.mp4
11.0 MB
25 Runtime Security - Immutability of containers at runtime/138 Introduction.mp4
10.9 MB
02 Create your course K8s cluster/005 Cluster Specification.mp4
10.8 MB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/071 Introduction.mp4
10.5 MB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/080 Open Container Initiative OCI.mp4
10.0 MB
08 Cluster Setup - Node Metadata Protection/035 Introduction.mp4
9.9 MB
27 System Hardening - Kernel Hardening Tools/149 Introduction.mp4
9.7 MB
31 Rating and feedback/167 Rating and feedback.mp4
9.3 MB
21 Supply Chain Security - Static Analysis/113 Kubesec.mp4
9.2 MB
17 Microservice Vulnerabilities - OS Level Security Domains/089 Practice - Force Container Non-Root.mp4
8.8 MB
30 CKS Simulator/165 Introduction.mp4
8.8 MB
02 Create your course K8s cluster/010 Notice_ Always stop your instances.mp4
8.6 MB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/056 Practice - Limit ServiceAccounts using RBAC.mp4
8.1 MB
09 Cluster Setup - CIS Benchmarks/039 Introduction.mp4
7.8 MB
27 System Hardening - Kernel Hardening Tools/150 AppArmor.mp4
7.8 MB
14 Cluster Hardening - Upgrade Kubernetes/070 Recap.mp4
7.7 MB
22 Supply Chain Security - Image Vulnerability Scanning/122 Recap.mp4
6.7 MB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/082 Sandbox Runtime Katacontainers.mp4
6.3 MB
26 Runtime Security - Auditing/148 Recap.mp4
6.1 MB
17 Microservice Vulnerabilities - OS Level Security Domains/094 PodSecurityPolicies.mp4
6.1 MB
17 Microservice Vulnerabilities - OS Level Security Domains/093 Practice - Disable PriviledgeEscalation.mp4
6.1 MB
13 Cluster Hardening - Restrict API Access/063 NodeRestriction AdmissionController.mp4
5.9 MB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/083 Sandbox Runtime gVisor.mp4
5.7 MB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/053 Intro.mp4
5.6 MB
02 Create your course K8s cluster/011 Recap.mp4
5.4 MB
13 Cluster Hardening - Restrict API Access/065 Recap.mp4
5.1 MB
11 Cluster Hardening - RBAC/052 Recap.mp4
5.1 MB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/057 Recap.mp4
5.1 MB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 Recap.mp4
5.0 MB
21 Supply Chain Security - Static Analysis/118 Recap.mp4
4.8 MB
23 Supply Chain Security - Secure Supply Chain/126 ImagePolicyWebhook.mp4
4.7 MB
19 Open Policy Agent (OPA)/107 Recap.mp4
4.6 MB
03 Foundation - Kubernetes Secure Architecture/014 Recap.mp4
4.6 MB
18 Microservice Vulnerabilities - mTLS/099 Recap.mp4
4.6 MB
06 Cluster Setup - GUI Elements/025 Feedback.mp4
4.3 MB
28 System Hardening - Reduce Attack Surface/163 Recap.mp4
4.3 MB
17 Microservice Vulnerabilities - OS Level Security Domains/090 Privileged Containers.mp4
4.3 MB
10 Cluster Setup - Verify Platform Binaries/043 Introduction.mp4
3.7 MB
21 Supply Chain Security - Static Analysis/115 OPA Confest.mp4
3.7 MB
23 Supply Chain Security - Secure Supply Chain/128 Recap.mp4
3.7 MB
05 Cluster Setup - Network Policies/018 Cluster Reset.mp4
3.6 MB
19 Open Policy Agent (OPA)/100 Cluster Reset.mp4
3.6 MB
25 Runtime Security - Immutability of containers at runtime/142 Recap.mp4
3.4 MB
04 Foundation - Containers under the hood/017 Recap.mp4
3.2 MB
02 Create your course K8s cluster/009 Practice - Firewall rules for NodePorts.mp4
3.0 MB
08 Cluster Setup - Node Metadata Protection/038 Recap.mp4
2.9 MB
17 Microservice Vulnerabilities - OS Level Security Domains/092 PrivilegeEscalation.mp4
2.9 MB
22 Supply Chain Security - Image Vulnerability Scanning/120 Clair and Trivy.mp4
2.8 MB
07 Cluster Setup - Secure Ingress/034 Recap.mp4
2.5 MB
01 Introduction/002 Best Video Quality.mp4
2.2 MB
10 Cluster Setup - Verify Platform Binaries/046 Recap.mp4
2.2 MB
09 Cluster Setup - CIS Benchmarks/040 CIS-Kubernetes-Benchmark-v1.6.0.pdf
1.1 MB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 Practice - Encrypt ETCD.en.srt
22.6 kB
26 Runtime Security - Auditing/143 Introduction.en.srt
15.5 kB
03 Foundation - Kubernetes Secure Architecture/012 Intro.en.srt
15.4 kB
01 Introduction/004 K8s Security Best Practices.en.srt
14.2 kB
26 Runtime Security - Auditing/147 Practice - Investigate API access history.en.srt
14.0 kB
19 Open Policy Agent (OPA)/103 Practice - Deny All Policy.en.srt
13.5 kB
04 Foundation - Containers under the hood/015 Intro.en.srt
13.5 kB
11 Cluster Hardening - RBAC/047 Intro.en.srt
12.4 kB
23 Supply Chain Security - Secure Supply Chain/127 Practice - ImagePolicyWebhook.en.srt
12.2 kB
19 Open Policy Agent (OPA)/104 Practice - Enforce Namespace Labels.en.srt
12.2 kB
11 Cluster Hardening - RBAC/051 Practice - CertificateSigningRequests.en.srt
12.0 kB
20 Supply Chain Security - Image Footprint/110 Practice - Secure and harden Images.en.srt
11.5 kB
24 Runtime Security - Behavioral Analytics at host and container level/136 Practice - Change Falco Rule.en.srt
11.1 kB
18 Microservice Vulnerabilities - mTLS/097 Intro.en.srt
11.0 kB
17 Microservice Vulnerabilities - OS Level Security Domains/095 Practice - Create and enable PodSecurityPolicy.en.srt
10.9 kB
02 Create your course K8s cluster/008 Practice - Create Kubeadm Cluster in GCP.en.srt
10.8 kB
26 Runtime Security - Auditing/146 Practice - Create advanced Audit Policy.en.srt
10.8 kB
21 Supply Chain Security - Static Analysis/112 Introduction.en.srt
10.0 kB
22 Supply Chain Security - Image Vulnerability Scanning/119 Introduction.en.srt
10.0 kB
24 Runtime Security - Behavioral Analytics at host and container level/131 Practice - Strace and _proc on ETCD.en.srt
9.9 kB
07 Cluster Setup - Secure Ingress/033 Practice - Secure an Ingress.en.srt
9.9 kB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/078 Introduction.en.srt
9.4 kB
27 System Hardening - Kernel Hardening Tools/156 Practice - Seccomp for Kubernetes Nginx.en.srt
9.1 kB
14 Cluster Hardening - Upgrade Kubernetes/066 Introduction.en.srt
8.9 kB
07 Cluster Setup - Secure Ingress/032 Practice - Create an Ingress.en.srt
8.7 kB
20 Supply Chain Security - Image Footprint/109 Practice - Reduce Image Footprint with Multi-Stage.en.srt
8.5 kB
03 Foundation - Kubernetes Secure Architecture/013 Practice - Find various K8s certificates.en.srt
8.3 kB
09 Cluster Setup - CIS Benchmarks/040 Practice - CIS in Action.en.srt
8.1 kB
27 System Hardening - Kernel Hardening Tools/151 Practice - AppArmor for curl.en.srt
8.1 kB
13 Cluster Hardening - Restrict API Access/062 Practice - External Apiserver Access.en.srt
7.9 kB
05 Cluster Setup - Network Policies/023 Practice - Backend to Database traffic.en.srt
7.8 kB
19 Open Policy Agent (OPA)/101 Introduction.en.srt
7.7 kB
27 System Hardening - Kernel Hardening Tools/152 Practice - AppArmor for Docker Nginx.en.srt
7.5 kB
05 Cluster Setup - Network Policies/022 Practice - Frontend to Backend traffic.en.srt
7.5 kB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/075 ETCD Encryption.en.srt
7.4 kB
25 Runtime Security - Immutability of containers at runtime/139 Ways to enforce immutability.en.srt
7.1 kB
24 Runtime Security - Behavioral Analytics at host and container level/134 Practice - Use Falco to find malicious processes.en.srt
7.1 kB
28 System Hardening - Reduce Attack Surface/158 Introduction.en.srt
7.0 kB
27 System Hardening - Kernel Hardening Tools/153 Practice - AppArmor for Kubernetes Nginx.en.srt
7.0 kB
26 Runtime Security - Auditing/144 Practice - Enable Audit Logging in Apiserver.en.srt
6.9 kB
18 Microservice Vulnerabilities - mTLS/098 Practice - Create sidecar proxy.en.srt
6.8 kB
23 Supply Chain Security - Secure Supply Chain/125 Practice - Whitelist Registries with OPA.en.srt
6.7 kB
20 Supply Chain Security - Image Footprint/108 Introduction.en.srt
6.6 kB
05 Cluster Setup - Network Policies/020 Introduction 2.en.srt
6.5 kB
24 Runtime Security - Behavioral Analytics at host and container level/135 Practice - Investigate Falco rules.en.srt
6.5 kB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/072 Practice - Create Simple Secret Scenario.en.srt
6.3 kB
28 System Hardening - Reduce Attack Surface/162 Practice - Investigate Linux Users.en.srt
6.3 kB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 Recap.en.srt
6.2 kB
13 Cluster Hardening - Restrict API Access/058 Introduction.en.srt
6.2 kB
24 Runtime Security - Behavioral Analytics at host and container level/132 Practice - _proc and env variables.en.srt
6.0 kB
28 System Hardening - Reduce Attack Surface/160 Practice - Install and investigate Services.en.srt
5.9 kB
24 Runtime Security - Behavioral Analytics at host and container level/130 Practice - Strace.en.srt
5.9 kB
19 Open Policy Agent (OPA)/106 Practice - The Rego Playground and more examples.en.srt
5.8 kB
11 Cluster Hardening - RBAC/050 Accounts and Users.en.srt
5.8 kB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 Practice - Pod uses custom ServiceAccount.en.srt
5.8 kB
06 Cluster Setup - GUI Elements/026 Introduction.en.srt
5.7 kB
10 Cluster Setup - Verify Platform Binaries/045 Practice - Verify apiserver binary running in our cluster.en.srt
5.7 kB
25 Runtime Security - Immutability of containers at runtime/141 Practice - SecurityContext renders container immutable.en.srt
5.6 kB
05 Cluster Setup - Network Policies/019 Introduction 1.en.srt
5.6 kB
11 Cluster Hardening - RBAC/048 Practice - Role and Rolebinding.en.srt
5.5 kB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/071 Introduction.en.srt
5.5 kB
02 Create your course K8s cluster/007 Practice - Configure _gcloud_ command.en.srt
5.4 kB
24 Runtime Security - Behavioral Analytics at host and container level/133 Practice - Falco and Installation.en.srt
5.3 kB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 Practice - Install and use gVisor.en.srt
5.3 kB
02 Create your course K8s cluster/006 Practice - Create GCP Account.en.srt
5.1 kB
21 Supply Chain Security - Static Analysis/116 Practice - OPA Confest for K8s YAML.en.srt
5.1 kB
21 Supply Chain Security - Static Analysis/114 Practice - Kubesec.en.srt
5.1 kB
07 Cluster Setup - Secure Ingress/031 Introduction.en.srt
5.0 kB
09 Cluster Setup - CIS Benchmarks/041 Practice - kube-bench.en.srt
5.0 kB
19 Open Policy Agent (OPA)/105 Practice - Enforce Deployment replica count.en.srt
4.9 kB
08 Cluster Setup - Node Metadata Protection/037 Practice_ Protect Node Metadata via NetworkPolicy.en.srt
4.9 kB
11 Cluster Hardening - RBAC/049 Practice - ClusterRole and ClusterRoleBinding.en.srt
4.9 kB
05 Cluster Setup - Network Policies/021 Practice - Default Deny.en.srt
4.9 kB
23 Supply Chain Security - Secure Supply Chain/123 Introduction.en.srt
4.8 kB
22 Supply Chain Security - Image Vulnerability Scanning/121 Practice - Use Trivy to scan images.en.srt
4.8 kB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 Practice - Hack Secrets in ETCD.en.srt
4.7 kB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/084 Practice - Create and use RuntimeClasses.en.srt
4.7 kB
21 Supply Chain Security - Static Analysis/117 Practice - OPA Confest for Dockerfile.en.srt
4.7 kB
25 Runtime Security - Immutability of containers at runtime/138 Introduction.en.srt
4.7 kB
23 Supply Chain Security - Secure Supply Chain/124 Practice - Image Digest.en.srt
4.7 kB
13 Cluster Hardening - Restrict API Access/064 Practice - Verify NodeRestriction.en.srt
4.6 kB
24 Runtime Security - Behavioral Analytics at host and container level/129 Introduction.en.srt
4.5 kB
27 System Hardening - Kernel Hardening Tools/154 Seccomp.en.srt
4.5 kB
04 Foundation - Containers under the hood/016 Practice - The PID Namespace.en.srt
4.5 kB
06 Cluster Setup - GUI Elements/029 Practice - RBAC for the Dashboard.en.srt
4.5 kB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/080 Open Container Initiative OCI.en.srt
4.3 kB
13 Cluster Hardening - Restrict API Access/061 Practice - Manual API Request.en.srt
4.3 kB
17 Microservice Vulnerabilities - OS Level Security Domains/088 Practice - Set Container User and Group.en.srt
4.3 kB
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/073 Practice - Hack Secrets in Docker.en.srt
4.3 kB
17 Microservice Vulnerabilities - OS Level Security Domains/087 Intro and Security Contexts.en.srt
4.3 kB
19 Open Policy Agent (OPA)/102 Practice - Install OPA.en.srt
4.3 kB
10 Cluster Setup - Verify Platform Binaries/044 Practice - Download and verify K8s release.en.srt
4.2 kB
26 Runtime Security - Auditing/145 Practice - Create Secret and check Audit Logs.en.srt
4.2 kB
25 Runtime Security - Immutability of containers at runtime/140 Practice - StartupProbe changes container.en.srt
4.0 kB
02 Create your course K8s cluster/005 Cluster Specification.en.srt
4.0 kB
13 Cluster Hardening - Restrict API Access/060 Practice - Insecure Access.en.srt
3.9 kB
08 Cluster Setup - Node Metadata Protection/035 Introduction.en.srt
3.9 kB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 Practice - Disable ServiceAccount mounting.en.srt
3.8 kB
01 Introduction/001 Welcome.en.srt
3.8 kB
13 Cluster Hardening - Restrict API Access/059 Practice - Anonymous Access.en.srt
3.8 kB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/079 Practice - Container calls Linux Kernel.en.srt
3.6 kB
27 System Hardening - Kernel Hardening Tools/149 Introduction.en.srt
3.6 kB
09 Cluster Setup - CIS Benchmarks/039 Introduction.en.srt
3.6 kB
27 System Hardening - Kernel Hardening Tools/150 AppArmor.en.srt
3.5 kB
17 Microservice Vulnerabilities - OS Level Security Domains/091 Practice - Create Privileged Containers.en.srt
3.5 kB
14 Cluster Hardening - Upgrade Kubernetes/069 Practice - Upgrade worker node.en.srt
3.5 kB
27 System Hardening - Kernel Hardening Tools/155 Practice - Seccomp for Docker Nginx.en.srt
3.4 kB
21 Supply Chain Security - Static Analysis/113 Kubesec.en.srt
3.3 kB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/056 Practice - Limit ServiceAccounts using RBAC.en.srt
3.3 kB
14 Cluster Hardening - Upgrade Kubernetes/068 Practice - Upgrade master node.en.srt
3.2 kB
17 Microservice Vulnerabilities - OS Level Security Domains/094 PodSecurityPolicies.en.srt
2.9 kB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/082 Sandbox Runtime Katacontainers.en.srt
2.9 kB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/081 Practice - Crictl.en.srt
2.8 kB
13 Cluster Hardening - Restrict API Access/063 NodeRestriction AdmissionController.en.srt
2.7 kB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/083 Sandbox Runtime gVisor.en.srt
2.7 kB
28 System Hardening - Reduce Attack Surface/159 Practice - Systemctl and Services.en.srt
2.7 kB
17 Microservice Vulnerabilities - OS Level Security Domains/089 Practice - Force Container Non-Root.en.srt
2.7 kB
08 Cluster Setup - Node Metadata Protection/036 Practice_ Access Node Metadata.en.srt
2.6 kB
09 Cluster Setup - CIS Benchmarks/042 Recap.en.srt
2.6 kB
20 Supply Chain Security - Image Footprint/111 Recap.en.srt
2.6 kB
14 Cluster Hardening - Upgrade Kubernetes/067 Practice - Create outdated cluster.en.srt
2.5 kB
23 Supply Chain Security - Secure Supply Chain/126 ImagePolicyWebhook.en.srt
2.3 kB
30 CKS Simulator/165 Introduction.en.srt
2.3 kB
02 Create your course K8s cluster/010 Notice_ Always stop your instances.en.srt
2.3 kB
17 Microservice Vulnerabilities - OS Level Security Domains/096 Recap.en.srt
2.3 kB
28 System Hardening - Reduce Attack Surface/161 Practice - Disable application listening on port.en.srt
2.2 kB
19 Open Policy Agent (OPA)/107 Recap.en.srt
2.2 kB
21 Supply Chain Security - Static Analysis/115 OPA Confest.en.srt
2.1 kB
06 Cluster Setup - GUI Elements/030 Recap.en.srt
2.1 kB
17 Microservice Vulnerabilities - OS Level Security Domains/090 Privileged Containers.en.srt
2.1 kB
24 Runtime Security - Behavioral Analytics at host and container level/137 Recap.en.srt
1.9 kB
27 System Hardening - Kernel Hardening Tools/157 Recap.en.srt
1.9 kB
26 Runtime Security - Auditing/148 Recap.en.srt
1.9 kB
21 Supply Chain Security - Static Analysis/118 Recap.en.srt
1.8 kB
31 Rating and feedback/167 Rating and feedback.en.srt
1.8 kB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/053 Intro.en.srt
1.8 kB
10 Cluster Setup - Verify Platform Binaries/043 Introduction.en.srt
1.7 kB
03 Foundation - Kubernetes Secure Architecture/014 Recap.en.srt
1.6 kB
17 Microservice Vulnerabilities - OS Level Security Domains/093 Practice - Disable PriviledgeEscalation.en.srt
1.6 kB
14 Cluster Hardening - Upgrade Kubernetes/070 Recap.en.srt
1.5 kB
22 Supply Chain Security - Image Vulnerability Scanning/120 Clair and Trivy.en.srt
1.5 kB
29 CKS Exam Series/164 CKS Exam Series.html
1.5 kB
16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 Recap.en.srt
1.5 kB
01 Introduction/003 Slack Community.html
1.5 kB
05 Cluster Setup - Network Policies/024 Recap.en.srt
1.5 kB
12 Cluster Hardening - Exercise caution in using ServiceAccounts/057 Recap.en.srt
1.5 kB
22 Supply Chain Security - Image Vulnerability Scanning/122 Recap.en.srt
1.4 kB
02 Create your course K8s cluster/009 Practice - Firewall rules for NodePorts.en.srt
1.4 kB
02 Create your course K8s cluster/011 Recap.en.srt
1.4 kB
18 Microservice Vulnerabilities - mTLS/099 Recap.en.srt
1.3 kB
28 System Hardening - Reduce Attack Surface/163 Recap.en.srt
1.3 kB
11 Cluster Hardening - RBAC/052 Recap.en.srt
1.3 kB
13 Cluster Hardening - Restrict API Access/065 Recap.en.srt
1.3 kB
25 Runtime Security - Immutability of containers at runtime/142 Recap.en.srt
1.3 kB
06 Cluster Setup - GUI Elements/027 Practice - Install Dashboard.en.srt
1.3 kB
06 Cluster Setup - GUI Elements/025 Feedback.en.srt
1.2 kB
17 Microservice Vulnerabilities - OS Level Security Domains/092 PrivilegeEscalation.en.srt
1.2 kB
02 Create your course K8s cluster/008 resources.txt
1.0 kB
05 Cluster Setup - Network Policies/018 Cluster Reset.en.srt
843 Bytes
19 Open Policy Agent (OPA)/100 Cluster Reset.en.srt
843 Bytes
08 Cluster Setup - Node Metadata Protection/038 Recap.en.srt
808 Bytes
04 Foundation - Containers under the hood/017 Recap.en.srt
799 Bytes
23 Supply Chain Security - Secure Supply Chain/128 Recap.en.srt
743 Bytes
11 Cluster Hardening - RBAC/049 resources.txt
702 Bytes
11 Cluster Hardening - RBAC/048 resources.txt
673 Bytes
01 Introduction/002 Best Video Quality.en.srt
662 Bytes
10 Cluster Setup - Verify Platform Binaries/046 Recap.en.srt
620 Bytes
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 resources.txt
562 Bytes
07 Cluster Setup - Secure Ingress/034 Recap.en.srt
557 Bytes
11 Cluster Hardening - RBAC/051 resources.txt
506 Bytes
23 Supply Chain Security - Secure Supply Chain/127 resources.txt
422 Bytes
24 Runtime Security - Behavioral Analytics at host and container level/133 resources.txt
391 Bytes
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 resources.txt
377 Bytes
02 Create your course K8s cluster/005 resources.txt
374 Bytes
05 Cluster Setup - Network Policies/022 resources.txt
355 Bytes
09 Cluster Setup - CIS Benchmarks/041 resources.txt
316 Bytes
23 Supply Chain Security - Secure Supply Chain/125 resources.txt
309 Bytes
14 Cluster Hardening - Upgrade Kubernetes/067 resources.txt
282 Bytes
03 Foundation - Kubernetes Secure Architecture/014 resources.txt
280 Bytes
06 Cluster Setup - GUI Elements/029 resources.txt
273 Bytes
07 Cluster Setup - Secure Ingress/033 resources.txt
254 Bytes
27 System Hardening - Kernel Hardening Tools/152 resources.txt
254 Bytes
07 Cluster Setup - Secure Ingress/032 resources.txt
248 Bytes
02 Create your course K8s cluster/007 resources.txt
227 Bytes
15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 resources.txt
210 Bytes
16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 resources.txt
205 Bytes
16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 resources.txt
191 Bytes
06 Cluster Setup - GUI Elements/030 resources.txt
176 Bytes
21 Supply Chain Security - Static Analysis/116 resources.txt
176 Bytes
14 Cluster Hardening - Upgrade Kubernetes/070 resources.txt
172 Bytes
21 Supply Chain Security - Static Analysis/117 resources.txt
172 Bytes
08 Cluster Setup - Node Metadata Protection/036 resources.txt
171 Bytes
12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 resources.txt
156 Bytes
27 System Hardening - Kernel Hardening Tools/155 resources.txt
154 Bytes
05 Cluster Setup - Network Policies/023 resources.txt
136 Bytes
27 System Hardening - Kernel Hardening Tools/157 resources.txt
135 Bytes
19 Open Policy Agent (OPA)/102 resources.txt
127 Bytes
05 Cluster Setup - Network Policies/021 resources.txt
122 Bytes
20 Supply Chain Security - Image Footprint/109 resources.txt
118 Bytes
20 Supply Chain Security - Image Footprint/110 resources.txt
118 Bytes
08 Cluster Setup - Node Metadata Protection/037 resources.txt
115 Bytes
22 Supply Chain Security - Image Vulnerability Scanning/121 resources.txt
111 Bytes
06 Cluster Setup - GUI Elements/027 resources.txt
108 Bytes
19 Open Policy Agent (OPA)/105 resources.txt
108 Bytes
26 Runtime Security - Auditing/144 resources.txt
106 Bytes
26 Runtime Security - Auditing/145 resources.txt
106 Bytes
26 Runtime Security - Auditing/146 resources.txt
106 Bytes
26 Runtime Security - Auditing/147 resources.txt
106 Bytes
19 Open Policy Agent (OPA)/104 resources.txt
100 Bytes
17 Microservice Vulnerabilities - OS Level Security Domains/087 resources.txt
96 Bytes
09 Cluster Setup - CIS Benchmarks/042 resources.txt
93 Bytes
19 Open Policy Agent (OPA)/103 resources.txt
93 Bytes
04 Foundation - Containers under the hood/017 resources.txt
89 Bytes
06 Cluster Setup - GUI Elements/028 resources.txt
87 Bytes
13 Cluster Hardening - Restrict API Access/062 resources.txt
86 Bytes
19 Open Policy Agent (OPA)/106 resources.txt
85 Bytes
12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 resources.txt
84 Bytes
05 Cluster Setup - Network Policies/024 resources.txt
73 Bytes
20 Supply Chain Security - Image Footprint/111 resources.txt
73 Bytes
24 Runtime Security - Behavioral Analytics at host and container level/137 resources.txt
72 Bytes
02 Create your course K8s cluster/009 resources.txt
71 Bytes
21 Supply Chain Security - Static Analysis/114 resources.txt
66 Bytes
13 Cluster Hardening - Restrict API Access/065 resources.txt
65 Bytes
24 Runtime Security - Behavioral Analytics at host and container level/129 resources.txt
55 Bytes
24 Runtime Security - Behavioral Analytics at host and container level/136 resources.txt
46 Bytes
01 Introduction/004 resources.txt
44 Bytes
19 Open Policy Agent (OPA)/107 resources.txt
44 Bytes
02 Create your course K8s cluster/006 resources.txt
33 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>