磁力链接

magnet:?xt=urn:btih:2D3A658D896569B680C013D4C40256C753D3ADB6
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 Practice - Encrypt ETCD.mp4 233.5 MB
  • 26 Runtime Security - Auditing/146 Practice - Create advanced Audit Policy.mp4 170.8 MB
  • 26 Runtime Security - Auditing/147 Practice - Investigate API access history.mp4 164.0 MB
  • 11 Cluster Hardening - RBAC/051 Practice - CertificateSigningRequests.mp4 163.6 MB
  • 24 Runtime Security - Behavioral Analytics at host and container level/136 Practice - Change Falco Rule.mp4 149.2 MB
  • 07 Cluster Setup - Secure Ingress/033 Practice - Secure an Ingress.mp4 135.8 MB
  • 02 Create your course K8s cluster/008 Practice - Create Kubeadm Cluster in GCP.mp4 125.3 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/095 Practice - Create and enable PodSecurityPolicy.mp4 121.0 MB
  • 23 Supply Chain Security - Secure Supply Chain/127 Practice - ImagePolicyWebhook.mp4 120.6 MB
  • 19 Open Policy Agent (OPA)/104 Practice - Enforce Namespace Labels.mp4 116.3 MB
  • 27 System Hardening - Kernel Hardening Tools/156 Practice - Seccomp for Kubernetes Nginx.mp4 108.2 MB
  • 13 Cluster Hardening - Restrict API Access/062 Practice - External Apiserver Access.mp4 106.2 MB
  • 19 Open Policy Agent (OPA)/103 Practice - Deny All Policy.mp4 106.0 MB
  • 24 Runtime Security - Behavioral Analytics at host and container level/131 Practice - Strace and _proc on ETCD.mp4 104.0 MB
  • 26 Runtime Security - Auditing/144 Practice - Enable Audit Logging in Apiserver.mp4 100.8 MB
  • 05 Cluster Setup - Network Policies/023 Practice - Backend to Database traffic.mp4 98.4 MB
  • 23 Supply Chain Security - Secure Supply Chain/125 Practice - Whitelist Registries with OPA.mp4 87.2 MB
  • 20 Supply Chain Security - Image Footprint/109 Practice - Reduce Image Footprint with Multi-Stage.mp4 82.9 MB
  • 13 Cluster Hardening - Restrict API Access/061 Practice - Manual API Request.mp4 81.8 MB
  • 07 Cluster Setup - Secure Ingress/032 Practice - Create an Ingress.mp4 79.9 MB
  • 28 System Hardening - Reduce Attack Surface/162 Practice - Investigate Linux Users.mp4 79.6 MB
  • 02 Create your course K8s cluster/007 Practice - Configure _gcloud_ command.mp4 78.8 MB
  • 24 Runtime Security - Behavioral Analytics at host and container level/134 Practice - Use Falco to find malicious processes.mp4 78.3 MB
  • 20 Supply Chain Security - Image Footprint/110 Practice - Secure and harden Images.mp4 70.6 MB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 Practice - Pod uses custom ServiceAccount.mp4 70.6 MB
  • 27 System Hardening - Kernel Hardening Tools/152 Practice - AppArmor for Docker Nginx.mp4 64.9 MB
  • 18 Microservice Vulnerabilities - mTLS/098 Practice - Create sidecar proxy.mp4 64.8 MB
  • 14 Cluster Hardening - Upgrade Kubernetes/068 Practice - Upgrade master node.mp4 63.0 MB
  • 26 Runtime Security - Auditing/145 Practice - Create Secret and check Audit Logs.mp4 62.6 MB
  • 03 Foundation - Kubernetes Secure Architecture/013 Practice - Find various K8s certificates.mp4 62.3 MB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 Practice - Install and use gVisor.mp4 59.8 MB
  • 10 Cluster Setup - Verify Platform Binaries/045 Practice - Verify apiserver binary running in our cluster.mp4 59.4 MB
  • 09 Cluster Setup - CIS Benchmarks/040 Practice - CIS in Action.mp4 58.6 MB
  • 22 Supply Chain Security - Image Vulnerability Scanning/121 Practice - Use Trivy to scan images.mp4 57.7 MB
  • 24 Runtime Security - Behavioral Analytics at host and container level/133 Practice - Falco and Installation.mp4 57.3 MB
  • 05 Cluster Setup - Network Policies/022 Practice - Frontend to Backend traffic.mp4 56.1 MB
  • 28 System Hardening - Reduce Attack Surface/160 Practice - Install and investigate Services.mp4 55.7 MB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/072 Practice - Create Simple Secret Scenario.mp4 50.7 MB
  • 11 Cluster Hardening - RBAC/049 Practice - ClusterRole and ClusterRoleBinding.mp4 49.9 MB
  • 24 Runtime Security - Behavioral Analytics at host and container level/130 Practice - Strace.mp4 49.8 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/087 Intro and Security Contexts.mp4 46.4 MB
  • 09 Cluster Setup - CIS Benchmarks/041 Practice - kube-bench.mp4 46.2 MB
  • 27 System Hardening - Kernel Hardening Tools/153 Practice - AppArmor for Kubernetes Nginx.mp4 45.9 MB
  • 08 Cluster Setup - Node Metadata Protection/037 Practice_ Protect Node Metadata via NetworkPolicy.mp4 45.7 MB
  • 19 Open Policy Agent (OPA)/105 Practice - Enforce Deployment replica count.mp4 44.5 MB
  • 06 Cluster Setup - GUI Elements/028 Practice - Outside Insecure Access.mp4 43.6 MB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 Practice - Hack Secrets in ETCD.mp4 43.3 MB
  • 25 Runtime Security - Immutability of containers at runtime/141 Practice - SecurityContext renders container immutable.mp4 43.1 MB
  • 21 Supply Chain Security - Static Analysis/117 Practice - OPA Confest for Dockerfile.mp4 42.7 MB
  • 21 Supply Chain Security - Static Analysis/114 Practice - Kubesec.mp4 42.3 MB
  • 23 Supply Chain Security - Secure Supply Chain/124 Practice - Image Digest.mp4 41.0 MB
  • 04 Foundation - Containers under the hood/015 Intro.mp4 40.3 MB
  • 26 Runtime Security - Auditing/143 Introduction.mp4 39.2 MB
  • 10 Cluster Setup - Verify Platform Binaries/044 Practice - Download and verify K8s release.mp4 38.7 MB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 Practice - Disable ServiceAccount mounting.mp4 35.3 MB
  • 19 Open Policy Agent (OPA)/102 Practice - Install OPA.mp4 35.1 MB
  • 05 Cluster Setup - Network Policies/021 Practice - Default Deny.mp4 35.0 MB
  • 03 Foundation - Kubernetes Secure Architecture/012 Intro.mp4 33.6 MB
  • 13 Cluster Hardening - Restrict API Access/060 Practice - Insecure Access.mp4 33.5 MB
  • 27 System Hardening - Kernel Hardening Tools/151 Practice - AppArmor for curl.mp4 33.4 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/088 Practice - Set Container User and Group.mp4 32.7 MB
  • 11 Cluster Hardening - RBAC/048 Practice - Role and Rolebinding.mp4 31.4 MB
  • 25 Runtime Security - Immutability of containers at runtime/140 Practice - StartupProbe changes container.mp4 29.6 MB
  • 19 Open Policy Agent (OPA)/106 Practice - The Rego Playground and more examples.mp4 29.6 MB
  • 01 Introduction/004 K8s Security Best Practices.mp4 29.2 MB
  • 11 Cluster Hardening - RBAC/047 Intro.mp4 28.7 MB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/073 Practice - Hack Secrets in Docker.mp4 28.5 MB
  • 14 Cluster Hardening - Upgrade Kubernetes/069 Practice - Upgrade worker node.mp4 28.2 MB
  • 28 System Hardening - Reduce Attack Surface/159 Practice - Systemctl and Services.mp4 27.3 MB
  • 24 Runtime Security - Behavioral Analytics at host and container level/132 Practice - _proc and env variables.mp4 27.2 MB
  • 24 Runtime Security - Behavioral Analytics at host and container level/135 Practice - Investigate Falco rules.mp4 27.1 MB
  • 20 Supply Chain Security - Image Footprint/111 Recap.mp4 26.4 MB
  • 21 Supply Chain Security - Static Analysis/116 Practice - OPA Confest for K8s YAML.mp4 26.3 MB
  • 05 Cluster Setup - Network Policies/020 Introduction 2.mp4 25.5 MB
  • 14 Cluster Hardening - Upgrade Kubernetes/066 Introduction.mp4 24.2 MB
  • 18 Microservice Vulnerabilities - mTLS/097 Intro.mp4 22.7 MB
  • 28 System Hardening - Reduce Attack Surface/161 Practice - Disable application listening on port.mp4 22.6 MB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/079 Practice - Container calls Linux Kernel.mp4 22.5 MB
  • 13 Cluster Hardening - Restrict API Access/064 Practice - Verify NodeRestriction.mp4 22.0 MB
  • 06 Cluster Setup - GUI Elements/026 Introduction.mp4 21.8 MB
  • 21 Supply Chain Security - Static Analysis/112 Introduction.mp4 21.5 MB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 Recap.mp4 21.4 MB
  • 22 Supply Chain Security - Image Vulnerability Scanning/119 Introduction.mp4 21.0 MB
  • 24 Runtime Security - Behavioral Analytics at host and container level/129 Introduction.mp4 20.4 MB
  • 06 Cluster Setup - GUI Elements/030 Recap.mp4 20.3 MB
  • 01 Introduction/001 Welcome.mp4 19.8 MB
  • 19 Open Policy Agent (OPA)/101 Introduction.mp4 19.7 MB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/078 Introduction.mp4 19.4 MB
  • 13 Cluster Hardening - Restrict API Access/058 Introduction.mp4 19.4 MB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/084 Practice - Create and use RuntimeClasses.mp4 19.3 MB
  • 06 Cluster Setup - GUI Elements/029 Practice - RBAC for the Dashboard.mp4 19.3 MB
  • 13 Cluster Hardening - Restrict API Access/059 Practice - Anonymous Access.mp4 19.1 MB
  • 14 Cluster Hardening - Upgrade Kubernetes/067 Practice - Create outdated cluster.mp4 19.0 MB
  • 28 System Hardening - Reduce Attack Surface/158 Introduction.mp4 18.9 MB
  • 23 Supply Chain Security - Secure Supply Chain/123 Introduction.mp4 18.0 MB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/081 Practice - Crictl.mp4 17.9 MB
  • 05 Cluster Setup - Network Policies/019 Introduction 1.mp4 16.9 MB
  • 20 Supply Chain Security - Image Footprint/108 Introduction.mp4 16.4 MB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/075 ETCD Encryption.mp4 16.3 MB
  • 05 Cluster Setup - Network Policies/024 Recap.mp4 14.8 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/091 Practice - Create Privileged Containers.mp4 14.7 MB
  • 02 Create your course K8s cluster/006 Practice - Create GCP Account.mp4 14.3 MB
  • 27 System Hardening - Kernel Hardening Tools/155 Practice - Seccomp for Docker Nginx.mp4 13.9 MB
  • 09 Cluster Setup - CIS Benchmarks/042 Recap.mp4 13.7 MB
  • 04 Foundation - Containers under the hood/016 Practice - The PID Namespace.mp4 13.3 MB
  • 25 Runtime Security - Immutability of containers at runtime/139 Ways to enforce immutability.mp4 12.8 MB
  • 27 System Hardening - Kernel Hardening Tools/157 Recap.mp4 12.5 MB
  • 06 Cluster Setup - GUI Elements/027 Practice - Install Dashboard.mp4 12.5 MB
  • 07 Cluster Setup - Secure Ingress/031 Introduction.mp4 12.3 MB
  • 11 Cluster Hardening - RBAC/050 Accounts and Users.mp4 12.3 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/096 Recap.mp4 11.9 MB
  • 08 Cluster Setup - Node Metadata Protection/036 Practice_ Access Node Metadata.mp4 11.5 MB
  • 24 Runtime Security - Behavioral Analytics at host and container level/137 Recap.mp4 11.4 MB
  • 27 System Hardening - Kernel Hardening Tools/154 Seccomp.mp4 11.0 MB
  • 25 Runtime Security - Immutability of containers at runtime/138 Introduction.mp4 10.9 MB
  • 02 Create your course K8s cluster/005 Cluster Specification.mp4 10.8 MB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/071 Introduction.mp4 10.5 MB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/080 Open Container Initiative OCI.mp4 10.0 MB
  • 08 Cluster Setup - Node Metadata Protection/035 Introduction.mp4 9.9 MB
  • 27 System Hardening - Kernel Hardening Tools/149 Introduction.mp4 9.7 MB
  • 31 Rating and feedback/167 Rating and feedback.mp4 9.3 MB
  • 21 Supply Chain Security - Static Analysis/113 Kubesec.mp4 9.2 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/089 Practice - Force Container Non-Root.mp4 8.8 MB
  • 30 CKS Simulator/165 Introduction.mp4 8.8 MB
  • 02 Create your course K8s cluster/010 Notice_ Always stop your instances.mp4 8.6 MB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/056 Practice - Limit ServiceAccounts using RBAC.mp4 8.1 MB
  • 09 Cluster Setup - CIS Benchmarks/039 Introduction.mp4 7.8 MB
  • 27 System Hardening - Kernel Hardening Tools/150 AppArmor.mp4 7.8 MB
  • 14 Cluster Hardening - Upgrade Kubernetes/070 Recap.mp4 7.7 MB
  • 22 Supply Chain Security - Image Vulnerability Scanning/122 Recap.mp4 6.7 MB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/082 Sandbox Runtime Katacontainers.mp4 6.3 MB
  • 26 Runtime Security - Auditing/148 Recap.mp4 6.1 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/094 PodSecurityPolicies.mp4 6.1 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/093 Practice - Disable PriviledgeEscalation.mp4 6.1 MB
  • 13 Cluster Hardening - Restrict API Access/063 NodeRestriction AdmissionController.mp4 5.9 MB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/083 Sandbox Runtime gVisor.mp4 5.7 MB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/053 Intro.mp4 5.6 MB
  • 02 Create your course K8s cluster/011 Recap.mp4 5.4 MB
  • 13 Cluster Hardening - Restrict API Access/065 Recap.mp4 5.1 MB
  • 11 Cluster Hardening - RBAC/052 Recap.mp4 5.1 MB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/057 Recap.mp4 5.1 MB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 Recap.mp4 5.0 MB
  • 21 Supply Chain Security - Static Analysis/118 Recap.mp4 4.8 MB
  • 23 Supply Chain Security - Secure Supply Chain/126 ImagePolicyWebhook.mp4 4.7 MB
  • 19 Open Policy Agent (OPA)/107 Recap.mp4 4.6 MB
  • 03 Foundation - Kubernetes Secure Architecture/014 Recap.mp4 4.6 MB
  • 18 Microservice Vulnerabilities - mTLS/099 Recap.mp4 4.6 MB
  • 06 Cluster Setup - GUI Elements/025 Feedback.mp4 4.3 MB
  • 28 System Hardening - Reduce Attack Surface/163 Recap.mp4 4.3 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/090 Privileged Containers.mp4 4.3 MB
  • 10 Cluster Setup - Verify Platform Binaries/043 Introduction.mp4 3.7 MB
  • 21 Supply Chain Security - Static Analysis/115 OPA Confest.mp4 3.7 MB
  • 23 Supply Chain Security - Secure Supply Chain/128 Recap.mp4 3.7 MB
  • 05 Cluster Setup - Network Policies/018 Cluster Reset.mp4 3.6 MB
  • 19 Open Policy Agent (OPA)/100 Cluster Reset.mp4 3.6 MB
  • 25 Runtime Security - Immutability of containers at runtime/142 Recap.mp4 3.4 MB
  • 04 Foundation - Containers under the hood/017 Recap.mp4 3.2 MB
  • 02 Create your course K8s cluster/009 Practice - Firewall rules for NodePorts.mp4 3.0 MB
  • 08 Cluster Setup - Node Metadata Protection/038 Recap.mp4 2.9 MB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/092 PrivilegeEscalation.mp4 2.9 MB
  • 22 Supply Chain Security - Image Vulnerability Scanning/120 Clair and Trivy.mp4 2.8 MB
  • 07 Cluster Setup - Secure Ingress/034 Recap.mp4 2.5 MB
  • 01 Introduction/002 Best Video Quality.mp4 2.2 MB
  • 10 Cluster Setup - Verify Platform Binaries/046 Recap.mp4 2.2 MB
  • 09 Cluster Setup - CIS Benchmarks/040 CIS-Kubernetes-Benchmark-v1.6.0.pdf 1.1 MB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 Practice - Encrypt ETCD.en.srt 22.6 kB
  • 26 Runtime Security - Auditing/143 Introduction.en.srt 15.5 kB
  • 03 Foundation - Kubernetes Secure Architecture/012 Intro.en.srt 15.4 kB
  • 01 Introduction/004 K8s Security Best Practices.en.srt 14.2 kB
  • 26 Runtime Security - Auditing/147 Practice - Investigate API access history.en.srt 14.0 kB
  • 19 Open Policy Agent (OPA)/103 Practice - Deny All Policy.en.srt 13.5 kB
  • 04 Foundation - Containers under the hood/015 Intro.en.srt 13.5 kB
  • 11 Cluster Hardening - RBAC/047 Intro.en.srt 12.4 kB
  • 23 Supply Chain Security - Secure Supply Chain/127 Practice - ImagePolicyWebhook.en.srt 12.2 kB
  • 19 Open Policy Agent (OPA)/104 Practice - Enforce Namespace Labels.en.srt 12.2 kB
  • 11 Cluster Hardening - RBAC/051 Practice - CertificateSigningRequests.en.srt 12.0 kB
  • 20 Supply Chain Security - Image Footprint/110 Practice - Secure and harden Images.en.srt 11.5 kB
  • 24 Runtime Security - Behavioral Analytics at host and container level/136 Practice - Change Falco Rule.en.srt 11.1 kB
  • 18 Microservice Vulnerabilities - mTLS/097 Intro.en.srt 11.0 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/095 Practice - Create and enable PodSecurityPolicy.en.srt 10.9 kB
  • 02 Create your course K8s cluster/008 Practice - Create Kubeadm Cluster in GCP.en.srt 10.8 kB
  • 26 Runtime Security - Auditing/146 Practice - Create advanced Audit Policy.en.srt 10.8 kB
  • 21 Supply Chain Security - Static Analysis/112 Introduction.en.srt 10.0 kB
  • 22 Supply Chain Security - Image Vulnerability Scanning/119 Introduction.en.srt 10.0 kB
  • 24 Runtime Security - Behavioral Analytics at host and container level/131 Practice - Strace and _proc on ETCD.en.srt 9.9 kB
  • 07 Cluster Setup - Secure Ingress/033 Practice - Secure an Ingress.en.srt 9.9 kB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/078 Introduction.en.srt 9.4 kB
  • 27 System Hardening - Kernel Hardening Tools/156 Practice - Seccomp for Kubernetes Nginx.en.srt 9.1 kB
  • 14 Cluster Hardening - Upgrade Kubernetes/066 Introduction.en.srt 8.9 kB
  • 07 Cluster Setup - Secure Ingress/032 Practice - Create an Ingress.en.srt 8.7 kB
  • 20 Supply Chain Security - Image Footprint/109 Practice - Reduce Image Footprint with Multi-Stage.en.srt 8.5 kB
  • 03 Foundation - Kubernetes Secure Architecture/013 Practice - Find various K8s certificates.en.srt 8.3 kB
  • 09 Cluster Setup - CIS Benchmarks/040 Practice - CIS in Action.en.srt 8.1 kB
  • 27 System Hardening - Kernel Hardening Tools/151 Practice - AppArmor for curl.en.srt 8.1 kB
  • 13 Cluster Hardening - Restrict API Access/062 Practice - External Apiserver Access.en.srt 7.9 kB
  • 05 Cluster Setup - Network Policies/023 Practice - Backend to Database traffic.en.srt 7.8 kB
  • 19 Open Policy Agent (OPA)/101 Introduction.en.srt 7.7 kB
  • 27 System Hardening - Kernel Hardening Tools/152 Practice - AppArmor for Docker Nginx.en.srt 7.5 kB
  • 05 Cluster Setup - Network Policies/022 Practice - Frontend to Backend traffic.en.srt 7.5 kB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/075 ETCD Encryption.en.srt 7.4 kB
  • 25 Runtime Security - Immutability of containers at runtime/139 Ways to enforce immutability.en.srt 7.1 kB
  • 24 Runtime Security - Behavioral Analytics at host and container level/134 Practice - Use Falco to find malicious processes.en.srt 7.1 kB
  • 28 System Hardening - Reduce Attack Surface/158 Introduction.en.srt 7.0 kB
  • 27 System Hardening - Kernel Hardening Tools/153 Practice - AppArmor for Kubernetes Nginx.en.srt 7.0 kB
  • 26 Runtime Security - Auditing/144 Practice - Enable Audit Logging in Apiserver.en.srt 6.9 kB
  • 18 Microservice Vulnerabilities - mTLS/098 Practice - Create sidecar proxy.en.srt 6.8 kB
  • 23 Supply Chain Security - Secure Supply Chain/125 Practice - Whitelist Registries with OPA.en.srt 6.7 kB
  • 20 Supply Chain Security - Image Footprint/108 Introduction.en.srt 6.6 kB
  • 05 Cluster Setup - Network Policies/020 Introduction 2.en.srt 6.5 kB
  • 24 Runtime Security - Behavioral Analytics at host and container level/135 Practice - Investigate Falco rules.en.srt 6.5 kB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/072 Practice - Create Simple Secret Scenario.en.srt 6.3 kB
  • 28 System Hardening - Reduce Attack Surface/162 Practice - Investigate Linux Users.en.srt 6.3 kB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 Recap.en.srt 6.2 kB
  • 13 Cluster Hardening - Restrict API Access/058 Introduction.en.srt 6.2 kB
  • 24 Runtime Security - Behavioral Analytics at host and container level/132 Practice - _proc and env variables.en.srt 6.0 kB
  • 28 System Hardening - Reduce Attack Surface/160 Practice - Install and investigate Services.en.srt 5.9 kB
  • 24 Runtime Security - Behavioral Analytics at host and container level/130 Practice - Strace.en.srt 5.9 kB
  • 19 Open Policy Agent (OPA)/106 Practice - The Rego Playground and more examples.en.srt 5.8 kB
  • 11 Cluster Hardening - RBAC/050 Accounts and Users.en.srt 5.8 kB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 Practice - Pod uses custom ServiceAccount.en.srt 5.8 kB
  • 06 Cluster Setup - GUI Elements/026 Introduction.en.srt 5.7 kB
  • 10 Cluster Setup - Verify Platform Binaries/045 Practice - Verify apiserver binary running in our cluster.en.srt 5.7 kB
  • 25 Runtime Security - Immutability of containers at runtime/141 Practice - SecurityContext renders container immutable.en.srt 5.6 kB
  • 05 Cluster Setup - Network Policies/019 Introduction 1.en.srt 5.6 kB
  • 11 Cluster Hardening - RBAC/048 Practice - Role and Rolebinding.en.srt 5.5 kB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/071 Introduction.en.srt 5.5 kB
  • 02 Create your course K8s cluster/007 Practice - Configure _gcloud_ command.en.srt 5.4 kB
  • 24 Runtime Security - Behavioral Analytics at host and container level/133 Practice - Falco and Installation.en.srt 5.3 kB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 Practice - Install and use gVisor.en.srt 5.3 kB
  • 02 Create your course K8s cluster/006 Practice - Create GCP Account.en.srt 5.1 kB
  • 21 Supply Chain Security - Static Analysis/116 Practice - OPA Confest for K8s YAML.en.srt 5.1 kB
  • 21 Supply Chain Security - Static Analysis/114 Practice - Kubesec.en.srt 5.1 kB
  • 07 Cluster Setup - Secure Ingress/031 Introduction.en.srt 5.0 kB
  • 09 Cluster Setup - CIS Benchmarks/041 Practice - kube-bench.en.srt 5.0 kB
  • 19 Open Policy Agent (OPA)/105 Practice - Enforce Deployment replica count.en.srt 4.9 kB
  • 08 Cluster Setup - Node Metadata Protection/037 Practice_ Protect Node Metadata via NetworkPolicy.en.srt 4.9 kB
  • 11 Cluster Hardening - RBAC/049 Practice - ClusterRole and ClusterRoleBinding.en.srt 4.9 kB
  • 05 Cluster Setup - Network Policies/021 Practice - Default Deny.en.srt 4.9 kB
  • 23 Supply Chain Security - Secure Supply Chain/123 Introduction.en.srt 4.8 kB
  • 22 Supply Chain Security - Image Vulnerability Scanning/121 Practice - Use Trivy to scan images.en.srt 4.8 kB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 Practice - Hack Secrets in ETCD.en.srt 4.7 kB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/084 Practice - Create and use RuntimeClasses.en.srt 4.7 kB
  • 21 Supply Chain Security - Static Analysis/117 Practice - OPA Confest for Dockerfile.en.srt 4.7 kB
  • 25 Runtime Security - Immutability of containers at runtime/138 Introduction.en.srt 4.7 kB
  • 23 Supply Chain Security - Secure Supply Chain/124 Practice - Image Digest.en.srt 4.7 kB
  • 13 Cluster Hardening - Restrict API Access/064 Practice - Verify NodeRestriction.en.srt 4.6 kB
  • 24 Runtime Security - Behavioral Analytics at host and container level/129 Introduction.en.srt 4.5 kB
  • 27 System Hardening - Kernel Hardening Tools/154 Seccomp.en.srt 4.5 kB
  • 04 Foundation - Containers under the hood/016 Practice - The PID Namespace.en.srt 4.5 kB
  • 06 Cluster Setup - GUI Elements/029 Practice - RBAC for the Dashboard.en.srt 4.5 kB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/080 Open Container Initiative OCI.en.srt 4.3 kB
  • 13 Cluster Hardening - Restrict API Access/061 Practice - Manual API Request.en.srt 4.3 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/088 Practice - Set Container User and Group.en.srt 4.3 kB
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/073 Practice - Hack Secrets in Docker.en.srt 4.3 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/087 Intro and Security Contexts.en.srt 4.3 kB
  • 19 Open Policy Agent (OPA)/102 Practice - Install OPA.en.srt 4.3 kB
  • 10 Cluster Setup - Verify Platform Binaries/044 Practice - Download and verify K8s release.en.srt 4.2 kB
  • 26 Runtime Security - Auditing/145 Practice - Create Secret and check Audit Logs.en.srt 4.2 kB
  • 25 Runtime Security - Immutability of containers at runtime/140 Practice - StartupProbe changes container.en.srt 4.0 kB
  • 02 Create your course K8s cluster/005 Cluster Specification.en.srt 4.0 kB
  • 13 Cluster Hardening - Restrict API Access/060 Practice - Insecure Access.en.srt 3.9 kB
  • 08 Cluster Setup - Node Metadata Protection/035 Introduction.en.srt 3.9 kB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 Practice - Disable ServiceAccount mounting.en.srt 3.8 kB
  • 01 Introduction/001 Welcome.en.srt 3.8 kB
  • 13 Cluster Hardening - Restrict API Access/059 Practice - Anonymous Access.en.srt 3.8 kB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/079 Practice - Container calls Linux Kernel.en.srt 3.6 kB
  • 27 System Hardening - Kernel Hardening Tools/149 Introduction.en.srt 3.6 kB
  • 09 Cluster Setup - CIS Benchmarks/039 Introduction.en.srt 3.6 kB
  • 27 System Hardening - Kernel Hardening Tools/150 AppArmor.en.srt 3.5 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/091 Practice - Create Privileged Containers.en.srt 3.5 kB
  • 14 Cluster Hardening - Upgrade Kubernetes/069 Practice - Upgrade worker node.en.srt 3.5 kB
  • 27 System Hardening - Kernel Hardening Tools/155 Practice - Seccomp for Docker Nginx.en.srt 3.4 kB
  • 21 Supply Chain Security - Static Analysis/113 Kubesec.en.srt 3.3 kB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/056 Practice - Limit ServiceAccounts using RBAC.en.srt 3.3 kB
  • 14 Cluster Hardening - Upgrade Kubernetes/068 Practice - Upgrade master node.en.srt 3.2 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/094 PodSecurityPolicies.en.srt 2.9 kB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/082 Sandbox Runtime Katacontainers.en.srt 2.9 kB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/081 Practice - Crictl.en.srt 2.8 kB
  • 13 Cluster Hardening - Restrict API Access/063 NodeRestriction AdmissionController.en.srt 2.7 kB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/083 Sandbox Runtime gVisor.en.srt 2.7 kB
  • 28 System Hardening - Reduce Attack Surface/159 Practice - Systemctl and Services.en.srt 2.7 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/089 Practice - Force Container Non-Root.en.srt 2.7 kB
  • 08 Cluster Setup - Node Metadata Protection/036 Practice_ Access Node Metadata.en.srt 2.6 kB
  • 09 Cluster Setup - CIS Benchmarks/042 Recap.en.srt 2.6 kB
  • 20 Supply Chain Security - Image Footprint/111 Recap.en.srt 2.6 kB
  • 14 Cluster Hardening - Upgrade Kubernetes/067 Practice - Create outdated cluster.en.srt 2.5 kB
  • 23 Supply Chain Security - Secure Supply Chain/126 ImagePolicyWebhook.en.srt 2.3 kB
  • 30 CKS Simulator/165 Introduction.en.srt 2.3 kB
  • 02 Create your course K8s cluster/010 Notice_ Always stop your instances.en.srt 2.3 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/096 Recap.en.srt 2.3 kB
  • 28 System Hardening - Reduce Attack Surface/161 Practice - Disable application listening on port.en.srt 2.2 kB
  • 19 Open Policy Agent (OPA)/107 Recap.en.srt 2.2 kB
  • 21 Supply Chain Security - Static Analysis/115 OPA Confest.en.srt 2.1 kB
  • 06 Cluster Setup - GUI Elements/030 Recap.en.srt 2.1 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/090 Privileged Containers.en.srt 2.1 kB
  • 24 Runtime Security - Behavioral Analytics at host and container level/137 Recap.en.srt 1.9 kB
  • 27 System Hardening - Kernel Hardening Tools/157 Recap.en.srt 1.9 kB
  • 26 Runtime Security - Auditing/148 Recap.en.srt 1.9 kB
  • 21 Supply Chain Security - Static Analysis/118 Recap.en.srt 1.8 kB
  • 31 Rating and feedback/167 Rating and feedback.en.srt 1.8 kB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/053 Intro.en.srt 1.8 kB
  • 10 Cluster Setup - Verify Platform Binaries/043 Introduction.en.srt 1.7 kB
  • 03 Foundation - Kubernetes Secure Architecture/014 Recap.en.srt 1.6 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/093 Practice - Disable PriviledgeEscalation.en.srt 1.6 kB
  • 14 Cluster Hardening - Upgrade Kubernetes/070 Recap.en.srt 1.5 kB
  • 22 Supply Chain Security - Image Vulnerability Scanning/120 Clair and Trivy.en.srt 1.5 kB
  • 29 CKS Exam Series/164 CKS Exam Series.html 1.5 kB
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 Recap.en.srt 1.5 kB
  • 01 Introduction/003 Slack Community.html 1.5 kB
  • 05 Cluster Setup - Network Policies/024 Recap.en.srt 1.5 kB
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/057 Recap.en.srt 1.5 kB
  • 22 Supply Chain Security - Image Vulnerability Scanning/122 Recap.en.srt 1.4 kB
  • 02 Create your course K8s cluster/009 Practice - Firewall rules for NodePorts.en.srt 1.4 kB
  • 02 Create your course K8s cluster/011 Recap.en.srt 1.4 kB
  • 18 Microservice Vulnerabilities - mTLS/099 Recap.en.srt 1.3 kB
  • 28 System Hardening - Reduce Attack Surface/163 Recap.en.srt 1.3 kB
  • 11 Cluster Hardening - RBAC/052 Recap.en.srt 1.3 kB
  • 13 Cluster Hardening - Restrict API Access/065 Recap.en.srt 1.3 kB
  • 25 Runtime Security - Immutability of containers at runtime/142 Recap.en.srt 1.3 kB
  • 06 Cluster Setup - GUI Elements/027 Practice - Install Dashboard.en.srt 1.3 kB
  • 06 Cluster Setup - GUI Elements/025 Feedback.en.srt 1.2 kB
  • 17 Microservice Vulnerabilities - OS Level Security Domains/092 PrivilegeEscalation.en.srt 1.2 kB
  • 02 Create your course K8s cluster/008 resources.txt 1.0 kB
  • 05 Cluster Setup - Network Policies/018 Cluster Reset.en.srt 843 Bytes
  • 19 Open Policy Agent (OPA)/100 Cluster Reset.en.srt 843 Bytes
  • 08 Cluster Setup - Node Metadata Protection/038 Recap.en.srt 808 Bytes
  • 04 Foundation - Containers under the hood/017 Recap.en.srt 799 Bytes
  • 23 Supply Chain Security - Secure Supply Chain/128 Recap.en.srt 743 Bytes
  • 11 Cluster Hardening - RBAC/049 resources.txt 702 Bytes
  • 11 Cluster Hardening - RBAC/048 resources.txt 673 Bytes
  • 01 Introduction/002 Best Video Quality.en.srt 662 Bytes
  • 10 Cluster Setup - Verify Platform Binaries/046 Recap.en.srt 620 Bytes
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/074 resources.txt 562 Bytes
  • 07 Cluster Setup - Secure Ingress/034 Recap.en.srt 557 Bytes
  • 11 Cluster Hardening - RBAC/051 resources.txt 506 Bytes
  • 23 Supply Chain Security - Secure Supply Chain/127 resources.txt 422 Bytes
  • 24 Runtime Security - Behavioral Analytics at host and container level/133 resources.txt 391 Bytes
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/076 resources.txt 377 Bytes
  • 02 Create your course K8s cluster/005 resources.txt 374 Bytes
  • 05 Cluster Setup - Network Policies/022 resources.txt 355 Bytes
  • 09 Cluster Setup - CIS Benchmarks/041 resources.txt 316 Bytes
  • 23 Supply Chain Security - Secure Supply Chain/125 resources.txt 309 Bytes
  • 14 Cluster Hardening - Upgrade Kubernetes/067 resources.txt 282 Bytes
  • 03 Foundation - Kubernetes Secure Architecture/014 resources.txt 280 Bytes
  • 06 Cluster Setup - GUI Elements/029 resources.txt 273 Bytes
  • 07 Cluster Setup - Secure Ingress/033 resources.txt 254 Bytes
  • 27 System Hardening - Kernel Hardening Tools/152 resources.txt 254 Bytes
  • 07 Cluster Setup - Secure Ingress/032 resources.txt 248 Bytes
  • 02 Create your course K8s cluster/007 resources.txt 227 Bytes
  • 15 Microservice Vulnerabilities - Manage Kubernetes Secrets/077 resources.txt 210 Bytes
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/085 resources.txt 205 Bytes
  • 16 Microservice Vulnerabilities - Container Runtime Sandboxes/086 resources.txt 191 Bytes
  • 06 Cluster Setup - GUI Elements/030 resources.txt 176 Bytes
  • 21 Supply Chain Security - Static Analysis/116 resources.txt 176 Bytes
  • 14 Cluster Hardening - Upgrade Kubernetes/070 resources.txt 172 Bytes
  • 21 Supply Chain Security - Static Analysis/117 resources.txt 172 Bytes
  • 08 Cluster Setup - Node Metadata Protection/036 resources.txt 171 Bytes
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/054 resources.txt 156 Bytes
  • 27 System Hardening - Kernel Hardening Tools/155 resources.txt 154 Bytes
  • 05 Cluster Setup - Network Policies/023 resources.txt 136 Bytes
  • 27 System Hardening - Kernel Hardening Tools/157 resources.txt 135 Bytes
  • 19 Open Policy Agent (OPA)/102 resources.txt 127 Bytes
  • 05 Cluster Setup - Network Policies/021 resources.txt 122 Bytes
  • 20 Supply Chain Security - Image Footprint/109 resources.txt 118 Bytes
  • 20 Supply Chain Security - Image Footprint/110 resources.txt 118 Bytes
  • 08 Cluster Setup - Node Metadata Protection/037 resources.txt 115 Bytes
  • 22 Supply Chain Security - Image Vulnerability Scanning/121 resources.txt 111 Bytes
  • 06 Cluster Setup - GUI Elements/027 resources.txt 108 Bytes
  • 19 Open Policy Agent (OPA)/105 resources.txt 108 Bytes
  • 26 Runtime Security - Auditing/144 resources.txt 106 Bytes
  • 26 Runtime Security - Auditing/145 resources.txt 106 Bytes
  • 26 Runtime Security - Auditing/146 resources.txt 106 Bytes
  • 26 Runtime Security - Auditing/147 resources.txt 106 Bytes
  • 19 Open Policy Agent (OPA)/104 resources.txt 100 Bytes
  • 17 Microservice Vulnerabilities - OS Level Security Domains/087 resources.txt 96 Bytes
  • 09 Cluster Setup - CIS Benchmarks/042 resources.txt 93 Bytes
  • 19 Open Policy Agent (OPA)/103 resources.txt 93 Bytes
  • 04 Foundation - Containers under the hood/017 resources.txt 89 Bytes
  • 06 Cluster Setup - GUI Elements/028 resources.txt 87 Bytes
  • 13 Cluster Hardening - Restrict API Access/062 resources.txt 86 Bytes
  • 19 Open Policy Agent (OPA)/106 resources.txt 85 Bytes
  • 12 Cluster Hardening - Exercise caution in using ServiceAccounts/055 resources.txt 84 Bytes
  • 05 Cluster Setup - Network Policies/024 resources.txt 73 Bytes
  • 20 Supply Chain Security - Image Footprint/111 resources.txt 73 Bytes
  • 24 Runtime Security - Behavioral Analytics at host and container level/137 resources.txt 72 Bytes
  • 02 Create your course K8s cluster/009 resources.txt 71 Bytes
  • 21 Supply Chain Security - Static Analysis/114 resources.txt 66 Bytes
  • 13 Cluster Hardening - Restrict API Access/065 resources.txt 65 Bytes
  • 24 Runtime Security - Behavioral Analytics at host and container level/129 resources.txt 55 Bytes
  • 24 Runtime Security - Behavioral Analytics at host and container level/136 resources.txt 46 Bytes
  • 01 Introduction/004 resources.txt 44 Bytes
  • 19 Open Policy Agent (OPA)/107 resources.txt 44 Bytes
  • 02 Create your course K8s cluster/006 resources.txt 33 Bytes

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!