Securing Kubernetes (CKS) Prep Course

Secure Kubernetes from build to runtime. Learn to monitor, detect, and mitigate threats without disrupting DevOps workflows.

Course Thumbnail

Essential Skills Gained

Checkmark

Cluster Setup

Checkmark

Cluster Hardening

Checkmark

System Hardening

Checkmark

Minimizing Microservices Vulnerabilities

Format

  • Instructor-led
  • 5 days with lectures and hands-on labs.

Audience

  • This course is ideal for anyone holding a CKA certification and interested in or responsible for cloud security.

Description

Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. Our Securing Kubernetes course emphasizes the skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment and runtime. As a security expert in the DEVOPS world, your role is to observe and track activity. This means you need to understand processes without inserting secure systems or gatekeepers into the process and slowing it down. You must be able to observe rapidly progressing devops processes and pinpoint which container, process, or subsystem causes a security concern.

Calendar icon

Upcoming Course Dates

June 9-13, 2025

9:00 AM - 5:00 PM

Virtual: Online - UTC

Enroll

$2895

June 23-27, 2025

10:00 AM - 6:00 PM

Virtual: Online - US/Eastern

Enroll

$2895

September 15-19, 2025

10:00 AM - 6:00 PM

Virtual: Online - US/Eastern

Enroll

$2895

Alta3 Academy Icon

Also Available in Self-Paced Format

Accessible anytime with Alta3 Academy

Explore Self-Paced Training

Course Outline

Download PDF

Cloud Security Primer

Securing your Kubernetes Cluster

Install Kubernetes using kubeadm

Securing the kube-apiserver

Securing ETCD

Purge Kubernetes

Image Scanning

Manually Installing Kubernetes

Kubectl (Optional)

Labels (Optional)

Securing your Application

User Administration

Implementing Pod Policy

Securing Secrets

Securing the Network

Threat Analysis and Detection

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.