Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.en.srt
963 B
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.mp4
5.27 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.en.srt
9.94 KB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.mp4
22.12 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.en.srt
6.86 KB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.mp4
22.66 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.en.srt
6.91 KB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.mp4
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.en.srt
1.24 KB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.mp4
6.89 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.en.srt
7.59 KB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.mp4
17.52 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.en.srt
12.89 KB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.mp4
30.13 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.en.srt
16.5 KB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.mp4
48.7 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.en.srt
19.68 KB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.mp4
41.29 MB
Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.en.srt
965 B
Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.mp4
5.96 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.en.srt
1.09 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.mp4
6.71 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.en.srt
10.1 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.mp4
23.24 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.en.srt
8 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.mp4
24.92 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.en.srt
12.63 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.mp4
36.12 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.en.srt
770 B
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.mp4
4.99 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.en.srt
12.63 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.mp4
27.4 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.en.srt
20.04 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.mp4
50.35 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.en.srt
4.89 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.mp4
12.69 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.en.srt
12.04 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.mp4
32.14 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.en.srt
1.11 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.mp4
6.48 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.en.srt
19.71 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.mp4
51.91 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.en.srt
10.9 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.mp4
26.39 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.en.srt
22.63 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.mp4
60.19 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.en.srt
22.65 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.mp4
43.13 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.en.srt
12.46 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.mp4
27.04 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.en.srt
30.42 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.mp4
90.48 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.en.srt
699 B
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.mp4
4.7 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.en.srt
18.85 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.mp4
54.56 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.en.srt
7.3 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.mp4
15.21 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.en.srt
17.55 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.mp4
51.83 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.en.srt
12.92 KB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.mp4
41.14 MB
Module 8 Exam Practice Scenarios/001. Module Introduction.en.srt
1.04 KB
Module 8 Exam Practice Scenarios/001. Module Introduction.mp4
6.18 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.en.srt
1.17 KB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.mp4
7.35 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.en.srt
19.89 KB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.mp4
43.8 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).en.srt
18.03 KB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).mp4
36.58 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.en.srt
18.23 KB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.mp4
44.84 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.en.srt
17.08 KB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.mp4
35.71 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.en.srt
17.47 KB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.mp4
45.95 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.en.srt
1.38 KB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.mp4
8.17 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.en.srt
17.21 KB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.mp4
38.19 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.en.srt
26.41 KB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.mp4
61.39 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.en.srt
18.01 KB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.mp4
46.81 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.en.srt
20.99 KB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.mp4
42.64 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.en.srt
23.85 KB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.mp4