资源详情

返回首页 | 相关搜索
Udemy - Kubernetes CKS 2022 Complete Course Theory Practice
大小 5.44 GB
文件数 430
Info Hash: 850E239FE1647A0735C9AAF17F7AA731B07615C3
收录时间 2026-01-13 02:36:09
更新时间 2026-01-13 02:36:09
文件列表 (430)
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/98 - Practice Encrypt ETCD.mp4
221.94 MB
1 - Introduction/1 - Welcome.mp4
27.45 MB
1 - Introduction/2 - Best Video Quality English.vtt
595 B
1 - Introduction/2 - Best Video Quality.mp4
4.46 MB
1 - Introduction/3 - Slack Community.html
420 B
1 - Introduction/4 - K8s Security Best Practices English.vtt
12.16 KB
1 - Introduction/4 - K8s Security Best Practices.mp4
57.34 MB
1 - Introduction/4 - resources.txt
44 B
2 - Create your course K8s cluster/5 - Cluster Specification English.vtt
3.34 KB
2 - Create your course K8s cluster/5 - Cluster Specification.mp4
23.21 MB
2 - Create your course K8s cluster/5 - resources.txt
374 B
2 - Create your course K8s cluster/6 - Practice Create GCP Account English.vtt
4.32 KB
2 - Create your course K8s cluster/6 - Practice Create GCP Account.mp4
42.98 MB
2 - Create your course K8s cluster/6 - resources.txt
33 B
2 - Create your course K8s cluster/7 - Practice Configure gcloud command English.vtt
4.49 KB
2 - Create your course K8s cluster/7 - Practice Configure gcloud command.mp4
74.92 MB
2 - Create your course K8s cluster/7 - resources.txt
227 B
2 - Create your course K8s cluster/8 - Practice Create Kubeadm Cluster in GCP English.vtt
9.7 KB
2 - Create your course K8s cluster/8 - Practice Create Kubeadm Cluster in GCP.mp4
122.57 MB
2 - Create your course K8s cluster/8 - resources.txt
1.02 KB
2 - Create your course K8s cluster/9 - Practice Firewall rules for NodePorts English.vtt
1.21 KB
2 - Create your course K8s cluster/9 - Practice Firewall rules for NodePorts.mp4
2.85 MB
2 - Create your course K8s cluster/9 - resources.txt
71 B
2 - Create your course K8s cluster/10 - Notice Always stop your instances English.vtt
1.94 KB
2 - Create your course K8s cluster/10 - Notice Always stop your instances.mp4
8.17 MB
2 - Create your course K8s cluster/11 - Containerd Course Upgrade English.vtt
1.21 KB
2 - Create your course K8s cluster/11 - Containerd Course Upgrade.mp4
2.49 MB
2 - Create your course K8s cluster/12 - Recap English.vtt
1.17 KB
2 - Create your course K8s cluster/12 - Recap.mp4
6.5 MB
3 - Killercoda Access/13 - How to get Access English.vtt
1.38 KB
3 - Killercoda Access/13 - How to get Access.mp4
2.37 MB
3 - Killercoda Access/14 - Your Access Code.html
816 B
4 - Foundation Kubernetes Secure Architecture/15 - Intro English.vtt
13.16 KB
4 - Foundation Kubernetes Secure Architecture/15 - Intro.mp4
31.55 MB
4 - Foundation Kubernetes Secure Architecture/16 - Practice Find various K8s certificates English.vtt
7.07 KB
4 - Foundation Kubernetes Secure Architecture/16 - Practice Find various K8s certificates.mp4
74.38 MB
4 - Foundation Kubernetes Secure Architecture/17 - Recap English.vtt
1.41 KB
4 - Foundation Kubernetes Secure Architecture/17 - Recap.mp4
4.35 MB
4 - Foundation Kubernetes Secure Architecture/17 - resources.txt
280 B
5 - Foundation Containers under the hood/18 - Intro English.vtt
11.48 KB
5 - Foundation Containers under the hood/18 - Intro.mp4
44.91 MB
5 - Foundation Containers under the hood/19 - Container Tools Introduction English.vtt
6.29 KB
5 - Foundation Containers under the hood/19 - Container Tools Introduction.mp4
16.39 MB
5 - Foundation Containers under the hood/20 - Practice The PID Namespace English.vtt
3.81 KB
5 - Foundation Containers under the hood/20 - Practice The PID Namespace.mp4
12.5 MB
5 - Foundation Containers under the hood/21 - Recap English.vtt
719 B
5 - Foundation Containers under the hood/21 - Recap.mp4
3.93 MB
5 - Foundation Containers under the hood/21 - resources.txt
89 B
5 - Foundation Containers under the hood/22 - TEST Docker Container Namespaces.html
279 B
5 - Foundation Containers under the hood/23 - TEST Podman Container Namespaces.html
268 B
6 - Cluster Setup Network Policies/24 - Cluster Reset English.vtt
763 B
6 - Cluster Setup Network Policies/24 - Cluster Reset.mp4
3.4 MB
6 - Cluster Setup Network Policies/25 - Introduction 1 English.vtt
4.76 KB
6 - Cluster Setup Network Policies/25 - Introduction 1.mp4
33.64 MB
6 - Cluster Setup Network Policies/26 - Introduction 2 English.vtt
5.57 KB
6 - Cluster Setup Network Policies/26 - Introduction 2.mp4
24.09 MB
6 - Cluster Setup Network Policies/27 - Practice Default Deny English.vtt
4.13 KB
6 - Cluster Setup Network Policies/27 - Practice Default Deny.mp4
30.9 MB
6 - Cluster Setup Network Policies/27 - resources.txt
122 B
6 - Cluster Setup Network Policies/28 - Practice Frontend to Backend traffic English.vtt
6.28 KB
6 - Cluster Setup Network Policies/28 - Practice Frontend to Backend traffic.mp4
49.29 MB
6 - Cluster Setup Network Policies/28 - resources.txt
355 B
6 - Cluster Setup Network Policies/29 - Practice Backend to Database traffic English.vtt
6.57 KB
6 - Cluster Setup Network Policies/29 - Practice Backend to Database traffic.mp4
41.07 MB
6 - Cluster Setup Network Policies/29 - resources.txt
136 B
6 - Cluster Setup Network Policies/30 - Recap English.vtt
1.27 KB
6 - Cluster Setup Network Policies/30 - Recap.mp4
14.18 MB
6 - Cluster Setup Network Policies/30 - resources.txt
73 B
6 - Cluster Setup Network Policies/31 - TEST DefaultDeny Network Policy.html
274 B
6 - Cluster Setup Network Policies/32 - TEST NetworkPolicy Namespace Communication.html
278 B
7 - Cluster Setup GUI Elements/33 - Introduction English.vtt
4.91 KB
7 - Cluster Setup GUI Elements/33 - Introduction.mp4
20.55 MB
7 - Cluster Setup GUI Elements/34 - Practice Install Dashboard English.vtt
1.11 KB
7 - Cluster Setup GUI Elements/34 - Practice Install Dashboard.mp4
11.82 MB
7 - Cluster Setup GUI Elements/34 - resources.txt
108 B
7 - Cluster Setup GUI Elements/35 - Practice Outside Insecure Access English.vtt
4.9 KB
7 - Cluster Setup GUI Elements/35 - Practice Outside Insecure Access.mp4
44.68 MB
7 - Cluster Setup GUI Elements/35 - resources.txt
87 B
7 - Cluster Setup GUI Elements/36 - Practice RBAC for the Dashboard English.vtt
3.79 KB
7 - Cluster Setup GUI Elements/36 - Practice RBAC for the Dashboard.mp4
21.64 MB
7 - Cluster Setup GUI Elements/36 - resources.txt
273 B
7 - Cluster Setup GUI Elements/37 - Recap English.vtt
1.84 KB
7 - Cluster Setup GUI Elements/37 - Recap.mp4
19.34 MB
7 - Cluster Setup GUI Elements/37 - resources.txt
176 B
8 - Cluster Setup Secure Ingress/38 - K8s Docs in correct Version English.vtt
873 B
8 - Cluster Setup Secure Ingress/38 - K8s Docs in correct Version.mp4
2.95 MB
8 - Cluster Setup Secure Ingress/39 - Introduction English.vtt
4.33 KB
8 - Cluster Setup Secure Ingress/39 - Introduction.mp4
11.59 MB
8 - Cluster Setup Secure Ingress/40 - Practice Create an Ingress English.vtt
7.77 KB
8 - Cluster Setup Secure Ingress/40 - Practice Create an Ingress.mp4
29.71 MB
8 - Cluster Setup Secure Ingress/40 - resources.txt
403 B
8 - Cluster Setup Secure Ingress/41 - Practice Secure an Ingress English.vtt
8.92 KB
8 - Cluster Setup Secure Ingress/41 - Practice Secure an Ingress.mp4
93.56 MB
8 - Cluster Setup Secure Ingress/41 - resources.txt
520 B
8 - Cluster Setup Secure Ingress/42 - Recap English.vtt
503 B
8 - Cluster Setup Secure Ingress/42 - Recap.mp4
2.33 MB
8 - Cluster Setup Secure Ingress/43 - TEST Create an Ingress.html
255 B
8 - Cluster Setup Secure Ingress/44 - TEST Secure an Ingress.html
266 B
9 - Cluster Setup Node Metadata Protection/45 - Introduction English.vtt
3.36 KB
9 - Cluster Setup Node Metadata Protection/45 - Introduction.mp4
11.77 MB
9 - Cluster Setup Node Metadata Protection/46 - Practice Access Node Metadata English.vtt
2.18 KB
9 - Cluster Setup Node Metadata Protection/46 - Practice Access Node Metadata.mp4
12.87 MB
9 - Cluster Setup Node Metadata Protection/46 - resources.txt
171 B
9 - Cluster Setup Node Metadata Protection/47 - Practice Protect Node Metadata via NetworkPolicy English.vtt
4.19 KB
9 - Cluster Setup Node Metadata Protection/47 - Practice Protect Node Metadata via NetworkPolicy.mp4
43.37 MB
9 - Cluster Setup Node Metadata Protection/47 - resources.txt
115 B
9 - Cluster Setup Node Metadata Protection/48 - Recap English.vtt
728 B
9 - Cluster Setup Node Metadata Protection/48 - Recap.mp4
2.79 MB
9 - Cluster Setup Node Metadata Protection/49 - TEST NetworkPolicy Metadata Protection.html
274 B
10 - Cluster Setup CIS Benchmarks/50 - Introduction English.vtt
3.04 KB
10 - Cluster Setup CIS Benchmarks/50 - Introduction.mp4
9.39 MB
10 - Cluster Setup CIS Benchmarks/51 - CIS-Kubernetes-Benchmark-v1.6.0.pdf
1.07 MB
10 - Cluster Setup CIS Benchmarks/51 - Practice CIS in Action English.vtt
6.81 KB
10 - Cluster Setup CIS Benchmarks/51 - Practice CIS in Action.mp4
55.65 MB
10 - Cluster Setup CIS Benchmarks/52 - Practice kubebench English.vtt
4.34 KB
10 - Cluster Setup CIS Benchmarks/52 - Practice kubebench.mp4
44.94 MB
10 - Cluster Setup CIS Benchmarks/52 - resources.txt
354 B
10 - Cluster Setup CIS Benchmarks/53 - Recap English.vtt
2.18 KB
10 - Cluster Setup CIS Benchmarks/53 - Recap.mp4
20.86 MB
10 - Cluster Setup CIS Benchmarks/53 - resources.txt
93 B
10 - Cluster Setup CIS Benchmarks/54 - TEST Apply CIS rules for Controlplane.html
294 B
11 - Cluster Setup Verify Platform Binaries/55 - Introduction English.vtt
1.43 KB
11 - Cluster Setup Verify Platform Binaries/55 - Introduction.mp4
3.51 MB
11 - Cluster Setup Verify Platform Binaries/56 - Practice Download and verify K8s release English.vtt
3.62 KB
11 - Cluster Setup Verify Platform Binaries/56 - Practice Download and verify K8s release.mp4
19.75 MB
11 - Cluster Setup Verify Platform Binaries/57 - Practice Verify apiserver binary running in our cluster English.vtt
5.03 KB
11 - Cluster Setup Verify Platform Binaries/57 - Practice Verify apiserver binary running in our cluster.mp4
74.22 MB
11 - Cluster Setup Verify Platform Binaries/58 - Recap English.vtt
566 B
11 - Cluster Setup Verify Platform Binaries/58 - Recap.mp4
2.08 MB
11 - Cluster Setup Verify Platform Binaries/59 - TEST Verify Kubelet Binary.html
284 B
12 - Cluster Hardening RBAC/60 - Intro English.vtt
10.57 KB
12 - Cluster Hardening RBAC/60 - Intro.mp4
26.98 MB
12 - Cluster Hardening RBAC/61 - Practice Role and Rolebinding English.vtt
4.6 KB
12 - Cluster Hardening RBAC/61 - Practice Role and Rolebinding.mp4
29.67 MB
12 - Cluster Hardening RBAC/61 - resources.txt
673 B
12 - Cluster Hardening RBAC/62 - Practice ClusterRole and ClusterRoleBinding English.vtt
4.03 KB
12 - Cluster Hardening RBAC/62 - Practice ClusterRole and ClusterRoleBinding.mp4
75.85 MB
12 - Cluster Hardening RBAC/62 - resources.txt
702 B
12 - Cluster Hardening RBAC/63 - Accounts and Users English.vtt
4.97 KB
12 - Cluster Hardening RBAC/63 - Accounts and Users.mp4
11.56 MB
12 - Cluster Hardening RBAC/64 - Practice CertificateSigningRequests English.vtt
10.02 KB
12 - Cluster Hardening RBAC/64 - Practice CertificateSigningRequests.mp4
155.77 MB
12 - Cluster Hardening RBAC/64 - resources.txt
506 B
12 - Cluster Hardening RBAC/65 - Recap English.vtt
1.13 KB
12 - Cluster Hardening RBAC/65 - Recap.mp4
5.8 MB
12 - Cluster Hardening RBAC/66 - TEST RBAC ServiceAccount Permissions.html
283 B
12 - Cluster Hardening RBAC/67 - TEST RBAC User Permissions.html
273 B
12 - Cluster Hardening RBAC/68 - TEST CertificateSigningRequests Sign Manually.html
294 B
12 - Cluster Hardening RBAC/69 - TEST CertificateSigningRequests Sign via API.html
289 B
13 - Cluster Hardening Exercise caution in using ServiceAccounts/70 - Intro English.vtt
1.55 KB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/70 - Intro.mp4
5.29 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/71 - Practice Pod uses custom ServiceAccount English.vtt
8.5 KB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/71 - Practice Pod uses custom ServiceAccount.mp4
107.57 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/71 - resources.txt
156 B
13 - Cluster Hardening Exercise caution in using ServiceAccounts/72 - Practice Disable ServiceAccount mounting English.vtt
3.22 KB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/72 - Practice Disable ServiceAccount mounting.mp4
33.46 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/72 - resources.txt
84 B
13 - Cluster Hardening Exercise caution in using ServiceAccounts/73 - Practice Limit ServiceAccounts using RBAC English.vtt
2.85 KB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/73 - Practice Limit ServiceAccounts using RBAC.mp4
7.63 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/74 - Recap English.vtt
1.29 KB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/74 - Recap.mp4
4.79 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/74 - resources.txt
164 B
13 - Cluster Hardening Exercise caution in using ServiceAccounts/75 - TEST ServiceAccount Token Mounting.html
281 B
14 - Cluster Hardening Restrict API Access/76 - Introduction English.vtt
5.29 KB
14 - Cluster Hardening Restrict API Access/76 - Introduction.mp4
18.28 MB
14 - Cluster Hardening Restrict API Access/77 - Practice Anonymous Access English.vtt
3.62 KB
14 - Cluster Hardening Restrict API Access/77 - Practice Anonymous Access.mp4
20.57 MB
14 - Cluster Hardening Restrict API Access/78 - Practice Insecure Access English.vtt
4.54 KB
14 - Cluster Hardening Restrict API Access/78 - Practice Insecure Access.mp4
16.1 MB
14 - Cluster Hardening Restrict API Access/79 - Practice Manual API Request English.vtt
3.67 KB
14 - Cluster Hardening Restrict API Access/79 - Practice Manual API Request.mp4
78.09 MB
14 - Cluster Hardening Restrict API Access/80 - Practice External Apiserver Access English.vtt
6.69 KB
14 - Cluster Hardening Restrict API Access/80 - Practice External Apiserver Access.mp4
101.09 MB
14 - Cluster Hardening Restrict API Access/80 - resources.txt
86 B
14 - Cluster Hardening Restrict API Access/81 - NodeRestriction AdmissionController English.vtt
2.32 KB
14 - Cluster Hardening Restrict API Access/81 - NodeRestriction AdmissionController.mp4
5.55 MB
14 - Cluster Hardening Restrict API Access/82 - Practice Verify NodeRestriction English.vtt
3.84 KB
14 - Cluster Hardening Restrict API Access/82 - Practice Verify NodeRestriction.mp4
45.06 MB
14 - Cluster Hardening Restrict API Access/83 - Recap English.vtt
1.1 KB
14 - Cluster Hardening Restrict API Access/83 - Recap.mp4
4.86 MB
14 - Cluster Hardening Restrict API Access/83 - resources.txt
65 B
14 - Cluster Hardening Restrict API Access/84 - TEST Crash that Apiserver.html
256 B
14 - Cluster Hardening Restrict API Access/85 - TEST Apiserver Manifest Misconfigured.html
275 B
14 - Cluster Hardening Restrict API Access/86 - TEST NodeRestriction.html
278 B
15 - Cluster Hardening Upgrade Kubernetes/87 - Introduction English.vtt
7.55 KB
15 - Cluster Hardening Upgrade Kubernetes/87 - Introduction.mp4
22.79 MB
15 - Cluster Hardening Upgrade Kubernetes/88 - Ubuntu 2004 Update.html
1.05 KB
15 - Cluster Hardening Upgrade Kubernetes/89 - Practice Create outdated cluster English.vtt
3.62 KB
15 - Cluster Hardening Upgrade Kubernetes/89 - Practice Create outdated cluster.mp4
28.62 MB
15 - Cluster Hardening Upgrade Kubernetes/89 - resources.txt
282 B
15 - Cluster Hardening Upgrade Kubernetes/90 - Practice Upgrade controlplane node English.vtt
4.81 KB
15 - Cluster Hardening Upgrade Kubernetes/90 - Practice Upgrade controlplane node.mp4
76.86 MB
15 - Cluster Hardening Upgrade Kubernetes/90 - resources.txt
623 B
15 - Cluster Hardening Upgrade Kubernetes/91 - Practice Upgrade node English.vtt
2.53 KB
15 - Cluster Hardening Upgrade Kubernetes/91 - Practice Upgrade node.mp4
22 MB
15 - Cluster Hardening Upgrade Kubernetes/91 - resources.txt
528 B
15 - Cluster Hardening Upgrade Kubernetes/92 - Recap English.vtt
1.34 KB
15 - Cluster Hardening Upgrade Kubernetes/92 - Recap.mp4
7.3 MB
15 - Cluster Hardening Upgrade Kubernetes/92 - resources.txt
172 B
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/93 - Introduction English.vtt
4.65 KB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/93 - Introduction.mp4
9.89 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/94 - Practice Create Simple Secret Scenario English.vtt
5.33 KB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/94 - Practice Create Simple Secret Scenario.mp4
47.95 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/95 - Practice Hack Secrets in Container Runtime English.vtt
6.05 KB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/95 - Practice Hack Secrets in Container Runtime.mp4
18.84 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/96 - Practice Hack Secrets in ETCD English.vtt
4.03 KB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/96 - Practice Hack Secrets in ETCD.mp4
51.43 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/96 - resources.txt
562 B
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/97 - ETCD Encryption English.vtt
6.28 KB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/97 - ETCD Encryption.mp4
15.33 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/98 - Practice Encrypt ETCD English.vtt
19 KB
1 - Introduction/1 - Welcome English.vtt
3.27 KB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/98 - resources.txt
377 B
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/99 - Recap English.vtt
5.35 KB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/99 - Recap.mp4
20.19 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/99 - resources.txt
221 B
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/100 - TEST Access Secrets in Pods.html
269 B
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/101 - TEST Read Secret Values.html
271 B
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/102 - TEST Secrets Pods and ServiceAccount.html
266 B
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/103 - TEST ETCD Encryption.html
274 B
17 - Microservice Vulnerabilities Container Runtime Sandboxes/104 - Introduction English.vtt
8 KB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/104 - Introduction.mp4
41.16 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/105 - Practice Container calls Linux Kernel English.vtt
3.04 KB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/105 - Practice Container calls Linux Kernel.mp4
21.33 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/106 - Open Container Initiative OCI English.vtt
3.73 KB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/106 - Open Container Initiative OCI.mp4
9.42 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/107 - Sandbox Runtime Katacontainers English.vtt
2.48 KB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/107 - Sandbox Runtime Katacontainers.mp4
5.89 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/108 - Sandbox Runtime gVisor English.vtt
2.32 KB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/108 - Sandbox Runtime gVisor.mp4
5.38 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/109 - Practice Create and use RuntimeClasses English.vtt
3.95 KB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/109 - Practice Create and use RuntimeClasses.mp4
27.91 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/109 - resources.txt
178 B
17 - Microservice Vulnerabilities Container Runtime Sandboxes/110 - Practice Install and use gVisor English.vtt
5.31 KB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/110 - Practice Install and use gVisor.mp4
72.04 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/110 - resources.txt
486 B
17 - Microservice Vulnerabilities Container Runtime Sandboxes/111 - Recap English.vtt
1.31 KB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/111 - Recap.mp4
4.69 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/111 - resources.txt
191 B
17 - Microservice Vulnerabilities Container Runtime Sandboxes/112 - TEST gVisor and RuntimeClass.html
266 B
18 - Microservice Vulnerabilities OS Level Security Domains/113 - Intro and Security Contexts English.vtt
3.68 KB
18 - Microservice Vulnerabilities OS Level Security Domains/113 - Intro and Security Contexts.mp4
37.89 MB
18 - Microservice Vulnerabilities OS Level Security Domains/113 - resources.txt
96 B
18 - Microservice Vulnerabilities OS Level Security Domains/114 - Practice Set Container User and Group English.vtt
3.62 KB
18 - Microservice Vulnerabilities OS Level Security Domains/114 - Practice Set Container User and Group.mp4
30.87 MB
18 - Microservice Vulnerabilities OS Level Security Domains/115 - Practice Force Container NonRoot English.vtt
2.25 KB
18 - Microservice Vulnerabilities OS Level Security Domains/115 - Practice Force Container NonRoot.mp4
8.3 MB
18 - Microservice Vulnerabilities OS Level Security Domains/116 - Privileged Containers English.vtt
1.82 KB
18 - Microservice Vulnerabilities OS Level Security Domains/116 - Privileged Containers.mp4
4.02 MB
18 - Microservice Vulnerabilities OS Level Security Domains/117 - Practice Create Privileged Containers English.vtt
2.93 KB
18 - Microservice Vulnerabilities OS Level Security Domains/117 - Practice Create Privileged Containers.mp4
13.87 MB
18 - Microservice Vulnerabilities OS Level Security Domains/118 - PrivilegeEscalation English.vtt
1.03 KB
18 - Microservice Vulnerabilities OS Level Security Domains/118 - PrivilegeEscalation.mp4
2.74 MB
18 - Microservice Vulnerabilities OS Level Security Domains/119 - Practice Disable PriviledgeEscalation English.vtt
1.32 KB
18 - Microservice Vulnerabilities OS Level Security Domains/119 - Practice Disable PriviledgeEscalation.mp4
5.72 MB
18 - Microservice Vulnerabilities OS Level Security Domains/120 - TEST Privileged Containers.html
273 B
18 - Microservice Vulnerabilities OS Level Security Domains/121 - TEST Privilege Escalation Containers.html
283 B
19 - Microservice Vulnerabilities mTLS/122 - Intro English.vtt
9.39 KB
19 - Microservice Vulnerabilities mTLS/122 - Intro.mp4
46.94 MB
19 - Microservice Vulnerabilities mTLS/123 - Practice Create sidecar proxy English.vtt
5.78 KB
19 - Microservice Vulnerabilities mTLS/123 - Practice Create sidecar proxy.mp4
71.81 MB
19 - Microservice Vulnerabilities mTLS/124 - Recap English.vtt
1.19 KB
19 - Microservice Vulnerabilities mTLS/124 - Recap.mp4
4.35 MB
20 - Open Policy Agent OPA/125 - Cluster Reset English.vtt
763 B
20 - Open Policy Agent OPA/125 - Cluster Reset.mp4
3.4 MB
20 - Open Policy Agent OPA/126 - Introduction English.vtt
6.56 KB
20 - Open Policy Agent OPA/126 - Introduction.mp4
18.5 MB
20 - Open Policy Agent OPA/127 - Practice Install OPA English.vtt
3.64 KB
20 - Open Policy Agent OPA/127 - Practice Install OPA.mp4
41.65 MB
20 - Open Policy Agent OPA/127 - resources.txt
127 B
20 - Open Policy Agent OPA/128 - Practice Deny All Policy English.vtt
11.31 KB
20 - Open Policy Agent OPA/128 - Practice Deny All Policy.mp4
100.36 MB
20 - Open Policy Agent OPA/128 - resources.txt
93 B
20 - Open Policy Agent OPA/129 - Practice Enforce Namespace Labels English.vtt
10.17 KB
20 - Open Policy Agent OPA/129 - Practice Enforce Namespace Labels.mp4
110.35 MB
20 - Open Policy Agent OPA/129 - resources.txt
100 B
20 - Open Policy Agent OPA/130 - Practice Enforce Deployment replica count English.vtt
4.19 KB
20 - Open Policy Agent OPA/130 - Practice Enforce Deployment replica count.mp4
42.1 MB
20 - Open Policy Agent OPA/130 - resources.txt
108 B
20 - Open Policy Agent OPA/131 - Practice The Rego Playground and more examples English.vtt
4.95 KB
20 - Open Policy Agent OPA/131 - Practice The Rego Playground and more examples.mp4
28.02 MB
20 - Open Policy Agent OPA/131 - resources.txt
85 B
20 - Open Policy Agent OPA/132 - Recap English.vtt
1.9 KB
20 - Open Policy Agent OPA/132 - Recap.mp4
4.35 MB
20 - Open Policy Agent OPA/132 - resources.txt
44 B
21 - Supply Chain Security Image Footprint/133 - Introduction English.vtt
5.63 KB
21 - Supply Chain Security Image Footprint/133 - Introduction.mp4
15.48 MB
21 - Supply Chain Security Image Footprint/134 - Practice Reduce Image Footprint with MultiStage English.vtt
7.12 KB
21 - Supply Chain Security Image Footprint/134 - Practice Reduce Image Footprint with MultiStage.mp4
78.66 MB
21 - Supply Chain Security Image Footprint/134 - resources.txt
118 B
21 - Supply Chain Security Image Footprint/135 - Practice Secure and harden Images English.vtt
9.61 KB
21 - Supply Chain Security Image Footprint/135 - Practice Secure and harden Images.mp4
66.82 MB
21 - Supply Chain Security Image Footprint/135 - resources.txt
118 B
21 - Supply Chain Security Image Footprint/136 - Recap English.vtt
2.19 KB
21 - Supply Chain Security Image Footprint/136 - Recap.mp4
25.17 MB
21 - Supply Chain Security Image Footprint/136 - resources.txt
73 B
21 - Supply Chain Security Image Footprint/137 - TEST Image Footprint User.html
282 B
21 - Supply Chain Security Image Footprint/138 - TEST Image Container Hardening.html
271 B
22 - Supply Chain Security Static Analysis/139 - Introduction English.vtt
8.51 KB
22 - Supply Chain Security Static Analysis/139 - Introduction.mp4
20.24 MB
22 - Supply Chain Security Static Analysis/140 - Kubesec English.vtt
2.75 KB
22 - Supply Chain Security Static Analysis/140 - Kubesec.mp4
8.69 MB
22 - Supply Chain Security Static Analysis/141 - Practice Kubesec English.vtt
4.16 KB
22 - Supply Chain Security Static Analysis/141 - Practice Kubesec.mp4
40.14 MB
22 - Supply Chain Security Static Analysis/141 - resources.txt
66 B
22 - Supply Chain Security Static Analysis/142 - OPA Conftest English.vtt
1.81 KB
22 - Supply Chain Security Static Analysis/142 - OPA Conftest.mp4
3.47 MB
22 - Supply Chain Security Static Analysis/143 - Practice OPA Conftest for K8s YAML English.vtt
4.33 KB
22 - Supply Chain Security Static Analysis/143 - Practice OPA Conftest for K8s YAML.mp4
38.33 MB
22 - Supply Chain Security Static Analysis/143 - resources.txt
176 B
22 - Supply Chain Security Static Analysis/144 - Practice OPA Conftest for Dockerfile English.vtt
3.92 KB
22 - Supply Chain Security Static Analysis/144 - Practice OPA Conftest for Dockerfile.mp4
40.53 MB
22 - Supply Chain Security Static Analysis/144 - resources.txt
172 B
22 - Supply Chain Security Static Analysis/145 - Recap English.vtt
1.6 KB
22 - Supply Chain Security Static Analysis/145 - Recap.mp4
4.51 MB
22 - Supply Chain Security Static Analysis/146 - TEST Manual Static Analysis K8s.html
278 B
22 - Supply Chain Security Static Analysis/147 - TEST Manual Static Analysis Docker.html
281 B
23 - Supply Chain Security Image Vulnerability Scanning/148 - Introduction English.vtt
8.58 KB
23 - Supply Chain Security Image Vulnerability Scanning/148 - Introduction.mp4
24.84 MB
23 - Supply Chain Security Image Vulnerability Scanning/149 - Clair and Trivy English.vtt
1.31 KB
23 - Supply Chain Security Image Vulnerability Scanning/149 - Clair and Trivy.mp4
2.59 MB
23 - Supply Chain Security Image Vulnerability Scanning/150 - Practice Use Trivy to scan images English.vtt
4.05 KB
23 - Supply Chain Security Image Vulnerability Scanning/150 - Practice Use Trivy to scan images.mp4
54.86 MB
23 - Supply Chain Security Image Vulnerability Scanning/150 - resources.txt
111 B
23 - Supply Chain Security Image Vulnerability Scanning/151 - Recap English.vtt
1.26 KB
23 - Supply Chain Security Image Vulnerability Scanning/151 - Recap.mp4
9.01 MB
23 - Supply Chain Security Image Vulnerability Scanning/152 - TEST Scan images using Trivy.html
286 B
24 - Supply Chain Security Secure Supply Chain/153 - Introduction English.vtt
4.09 KB
24 - Supply Chain Security Secure Supply Chain/153 - Introduction.mp4
16.98 MB
24 - Supply Chain Security Secure Supply Chain/154 - Practice Image Digest English.vtt
3.95 KB
24 - Supply Chain Security Secure Supply Chain/154 - Practice Image Digest.mp4
38.87 MB
24 - Supply Chain Security Secure Supply Chain/155 - Practice Whitelist Registries with OPA English.vtt
5.58 KB
24 - Supply Chain Security Secure Supply Chain/155 - Practice Whitelist Registries with OPA.mp4
36.1 MB
24 - Supply Chain Security Secure Supply Chain/155 - resources.txt
309 B
24 - Supply Chain Security Secure Supply Chain/156 - ImagePolicyWebhook English.vtt
2 KB
24 - Supply Chain Security Secure Supply Chain/156 - ImagePolicyWebhook.mp4
4.41 MB
24 - Supply Chain Security Secure Supply Chain/157 - Practice ImagePolicyWebhook English.vtt
10.33 KB
24 - Supply Chain Security Secure Supply Chain/157 - Practice ImagePolicyWebhook.mp4
92.56 MB
24 - Supply Chain Security Secure Supply Chain/157 - resources.txt
422 B
24 - Supply Chain Security Secure Supply Chain/158 - Recap English.vtt
663 B
24 - Supply Chain Security Secure Supply Chain/158 - Recap.mp4
3.48 MB
24 - Supply Chain Security Secure Supply Chain/159 - TEST Complete ImagePolicyWebhook Setup.html
278 B
24 - Supply Chain Security Secure Supply Chain/160 - TEST Use Image Digest.html
268 B
25 - Runtime Security Behavioral Analytics at host and container level/161 - Introduction English.vtt
3.86 KB
25 - Runtime Security Behavioral Analytics at host and container level/161 - Introduction.mp4
30.28 MB
25 - Runtime Security Behavioral Analytics at host and container level/161 - resources.txt
55 B
25 - Runtime Security Behavioral Analytics at host and container level/162 - Practice Strace English.vtt
4.93 KB
25 - Runtime Security Behavioral Analytics at host and container level/162 - Practice Strace.mp4
60.43 MB
25 - Runtime Security Behavioral Analytics at host and container level/163 - Practice Strace and proc on ETCD English.vtt
8.4 KB
25 - Runtime Security Behavioral Analytics at host and container level/163 - Practice Strace and proc on ETCD.mp4
103.77 MB
25 - Runtime Security Behavioral Analytics at host and container level/164 - Practice proc and env variables English.vtt
5.16 KB
25 - Runtime Security Behavioral Analytics at host and container level/164 - Practice proc and env variables.mp4
26.82 MB
25 - Runtime Security Behavioral Analytics at host and container level/165 - Practice Falco and Installation English.vtt
4.54 KB
25 - Runtime Security Behavioral Analytics at host and container level/165 - Practice Falco and Installation.mp4
65.96 MB
25 - Runtime Security Behavioral Analytics at host and container level/165 - resources.txt
397 B
25 - Runtime Security Behavioral Analytics at host and container level/166 - Practice Use Falco to find malicious processes English.vtt
6 KB
25 - Runtime Security Behavioral Analytics at host and container level/166 - Practice Use Falco to find malicious processes.mp4
74.45 MB
25 - Runtime Security Behavioral Analytics at host and container level/167 - Practice Investigate Falco rules English.vtt
5.49 KB
25 - Runtime Security Behavioral Analytics at host and container level/167 - Practice Investigate Falco rules.mp4
25.57 MB
25 - Runtime Security Behavioral Analytics at host and container level/168 - Practice Change Falco Rule English.vtt
9.31 KB
25 - Runtime Security Behavioral Analytics at host and container level/168 - Practice Change Falco Rule.mp4
141.94 MB
25 - Runtime Security Behavioral Analytics at host and container level/168 - resources.txt
46 B
25 - Runtime Security Behavioral Analytics at host and container level/169 - Recap English.vtt
1.67 KB
25 - Runtime Security Behavioral Analytics at host and container level/169 - Recap.mp4
16.77 MB
25 - Runtime Security Behavioral Analytics at host and container level/169 - resources.txt
72 B
25 - Runtime Security Behavioral Analytics at host and container level/170 - TEST Syscall Activity Strace.html
275 B
25 - Runtime Security Behavioral Analytics at host and container level/171 - TEST Falco Rule Change.html
258 B
26 - Runtime Security Immutability of containers at runtime/172 - Introduction English.vtt
3.97 KB
26 - Runtime Security Immutability of containers at runtime/172 - Introduction.mp4
10.26 MB
26 - Runtime Security Immutability of containers at runtime/173 - Ways to enforce immutability English.vtt
6 KB
26 - Runtime Security Immutability of containers at runtime/173 - Ways to enforce immutability.mp4
11.97 MB
26 - Runtime Security Immutability of containers at runtime/174 - Practice StartupProbe changes container English.vtt
3.32 KB
26 - Runtime Security Immutability of containers at runtime/174 - Practice StartupProbe changes container.mp4
28.09 MB
26 - Runtime Security Immutability of containers at runtime/175 - Practice SecurityContext renders container immutable English.vtt
4.68 KB
26 - Runtime Security Immutability of containers at runtime/175 - Practice SecurityContext renders container immutable.mp4
40.81 MB
26 - Runtime Security Immutability of containers at runtime/176 - Recap English.vtt
1.11 KB
26 - Runtime Security Immutability of containers at runtime/176 - Recap.mp4
3.21 MB
26 - Runtime Security Immutability of containers at runtime/177 - TEST Immutability Readonly Filesystem.html
276 B
27 - Runtime Security Auditing/178 - Introduction English.vtt
13.13 KB
27 - Runtime Security Auditing/178 - Introduction.mp4
113.1 MB
27 - Runtime Security Auditing/179 - Practice Enable Audit Logging in Apiserver English.vtt
5.79 KB
27 - Runtime Security Auditing/179 - Practice Enable Audit Logging in Apiserver.mp4
95.78 MB
27 - Runtime Security Auditing/179 - resources.txt
106 B
27 - Runtime Security Auditing/180 - Practice Create Secret and check Audit Logs English.vtt
3.49 KB
27 - Runtime Security Auditing/180 - Practice Create Secret and check Audit Logs.mp4
59.79 MB
27 - Runtime Security Auditing/180 - resources.txt
106 B
27 - Runtime Security Auditing/181 - Practice Create advanced Audit Policy English.vtt
9.01 KB
27 - Runtime Security Auditing/181 - Practice Create advanced Audit Policy.mp4
162.33 MB
27 - Runtime Security Auditing/181 - resources.txt
106 B
27 - Runtime Security Auditing/182 - Recap English.vtt
1.6 KB
27 - Runtime Security Auditing/182 - Recap.mp4
5.79 MB
27 - Runtime Security Auditing/182 - resources.txt
44 B
27 - Runtime Security Auditing/183 - TEST Enable Audit Logging.html
278 B
28 - System Hardening Kernel Hardening Tools/184 - Introduction English.vtt
3.11 KB
28 - System Hardening Kernel Hardening Tools/184 - Introduction.mp4
9.14 MB
28 - System Hardening Kernel Hardening Tools/185 - AppArmor English.vtt
2.97 KB
28 - System Hardening Kernel Hardening Tools/185 - AppArmor.mp4
7.36 MB
28 - System Hardening Kernel Hardening Tools/186 - Practice AppArmor for curl English.vtt
6.74 KB
28 - System Hardening Kernel Hardening Tools/186 - Practice AppArmor for curl.mp4
31.54 MB
28 - System Hardening Kernel Hardening Tools/187 - Practice AppArmor for Docker Nginx English.vtt
6.37 KB
28 - System Hardening Kernel Hardening Tools/187 - Practice AppArmor for Docker Nginx.mp4
61.63 MB
28 - System Hardening Kernel Hardening Tools/187 - resources.txt
254 B
28 - System Hardening Kernel Hardening Tools/188 - Practice AppArmor for Kubernetes Nginx English.vtt
5.87 KB
28 - System Hardening Kernel Hardening Tools/188 - Practice AppArmor for Kubernetes Nginx.mp4
43.41 MB
28 - System Hardening Kernel Hardening Tools/189 - Seccomp English.vtt
3.86 KB
28 - System Hardening Kernel Hardening Tools/189 - Seccomp.mp4
10.3 MB
28 - System Hardening Kernel Hardening Tools/190 - Practice Seccomp for Docker Nginx English.vtt
2.87 KB
28 - System Hardening Kernel Hardening Tools/190 - Practice Seccomp for Docker Nginx.mp4
15.73 MB
28 - System Hardening Kernel Hardening Tools/190 - resources.txt
154 B
28 - System Hardening Kernel Hardening Tools/191 - Practice Seccomp for Kubernetes Nginx English.vtt
8.21 KB
28 - System Hardening Kernel Hardening Tools/191 - Practice Seccomp for Kubernetes Nginx.mp4
71.68 MB
28 - System Hardening Kernel Hardening Tools/192 - Recap English.vtt
1.65 KB
28 - System Hardening Kernel Hardening Tools/192 - Recap.mp4
17.9 MB
28 - System Hardening Kernel Hardening Tools/192 - resources.txt
135 B
28 - System Hardening Kernel Hardening Tools/193 - TEST AppArmor.html
260 B
29 - System Hardening Reduce Attack Surface/194 - Introduction English.vtt
6.01 KB
29 - System Hardening Reduce Attack Surface/194 - Introduction.mp4
21.11 MB
29 - System Hardening Reduce Attack Surface/195 - Practice Systemctl and Services English.vtt
2.26 KB
29 - System Hardening Reduce Attack Surface/195 - Practice Systemctl and Services.mp4
25.99 MB
29 - System Hardening Reduce Attack Surface/196 - Practice Install and investigate Services English.vtt
4.97 KB
29 - System Hardening Reduce Attack Surface/196 - Practice Install and investigate Services.mp4
65.87 MB
29 - System Hardening Reduce Attack Surface/197 - Practice Disable application listening on port English.vtt
1.89 KB
29 - System Hardening Reduce Attack Surface/197 - Practice Disable application listening on port.mp4
21.5 MB
29 - System Hardening Reduce Attack Surface/198 - Practice Investigate Linux Users English.vtt
5.3 KB
29 - System Hardening Reduce Attack Surface/198 - Practice Investigate Linux Users.mp4
75.67 MB
29 - System Hardening Reduce Attack Surface/199 - Recap English.vtt
1.18 KB
29 - System Hardening Reduce Attack Surface/199 - Recap.mp4
4.07 MB
29 - System Hardening Reduce Attack Surface/200 - TEST Close Open Ports.html
285 B
29 - System Hardening Reduce Attack Surface/201 - TEST Manage Packages.html
284 B
30 - Linux Foundation Simulator Sessions/202 - Linux Foundation Simulator Sessions.html
864 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。