LEARNING PATH: Kubernetes Security

Kubernetes Network Security and Service-Mesh Essentials

Kubernetes has fuelled the rise of containerized, microservice applications, which allow for dynamic orchestration and workloads. While this makes releasing new builds more efficient, it’s also created a greater reliance on networks compared to traditional monolithic apps. As a network grows larger, so does its surface area susceptible to attacks. Traditional network security methods just don’t work with Kubernetes.

Kubernetes Network Security & Service Mesh Essentials is a course is designed to change the way you look at network security and prepare you for the security needs of Kubernetes networks and deployment. We begin by talking about common Kubernetes network security flaws and exploits, and how to identify insecure deployments. We’ll learn about DNS spoofing attacks as well as network policies in Kubernetes with the help of hands-on labs. Finally, we’ll introduce you to Kubernetes Service Mesh and take you through Istio Service Mesh.

Our learning material is backed by years of security testing experience, knowledge, and original research consolidated by our entire team. This course on Kubernetes network security and Service Mesh is designed so that once you complete it, you’ll be able to directly implement what you’ve learned in a fully-functioning Kubernetes deployment.

Proficiency Intermediate
Audience Cloud Security Expert
Course Duration​ 1
Lessons​ 22
Cloud Labs​ 3
Proficiency

Intermediate

Audience

Cloud Security Expert

Course duration

4

Lessons

16

Cloud Labs

2

  • Introduction
    • Course Introduction
    • Course Pre-requisites
  • Kubernetes Networking Deep-Dive
    • Kubernetes Networking Intro
  • Kubernetes DNS Spoofing Attack
    • Kubernetes DNS Spoofing
    • DNS Spoofing Attack – Part 1
    • DNS Spoofing Attack – Part 2
    • DNS Spoofing on Kubernetes
  • NetworkPolicy in Kubernetes
    • Kubernetes Network Policy and Lab
    • VideoKubernetes Network Policy
    • Video: Kubernetes NetworkPolicy
  • Introduction to Service Mesh
    • Introduction to Service Mesh
    • Istio Service Mesh
    • Istio Authorization
    • Istio Authorization – Part 1
    • Istio Service Mesh – Part 2
    • Istio Service Mesh – Part 3
    • Istio Service Mesh – Part 4
  • DNS Spoofing on Kubernetes Clusters
  • Understanding Kubernetes Network Policy
  • Implementing the Istio Service Mesh
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking "Accept" you consent to the use of All the cookies