zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Certified Kubernetes Security Specialist (CKS)
magnet:?xt=urn:btih:86af8909e9ac8cc9b75d3ab35945b320fa4f6015&dn=Certified Kubernetes Security Specialist (CKS)
磁力链接详情
文件列表详情
86af8909e9ac8cc9b75d3ab35945b320fa4f6015
infohash:
167
文件数量
4.4 GB
文件大小
2025-6-11 17:25
创建日期
2025-6-12 07:25
最后访问
相关分词
Certified
Kubernetes
Security
Specialist
CKS
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/004. 4.3 Segmentation.mp4 99.21 MB
Introduction/001. Certified Kubernetes Security Specialist (CKS) Introduction.mp4 24.33 MB
Module 1 Preparing for the CKS Exam/001. Module Introduction.mp4 12.18 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/001. Learning objectives.mp4 6.07 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/002. 1.1 CKS Certification Requirements.mp4 37.37 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/003. 1.2 Resources and Study Tools.mp4 25.03 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/004. 1.3 Practice Strategy.mp4 37.55 MB
Module 1 Preparing for the CKS Exam/Lesson 1 Getting CKS Certified/005. 1.4 Creating a Study Timeline and Expectations.mp4 27.32 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/001. Learning objectives.mp4 6.3 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/002. 2.1 Lab Environment and Architecture.mp4 30.58 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/003. 2.2 Local Installation.mp4 22.65 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/004. 2.3 Cloud Installation.mp4 57.2 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/005. 2.4 Your Cluster Up and Running.mp4 61.81 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/001. Learning objectives.mp4 8.18 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/002. 3.1 Cloud Native Security.mp4 33.68 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/003. 3.2 Kubernetes Architecture.mp4 23.81 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/004. 3.3 Kubernetes PKI Architecture.mp4 17 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/005. 3.4 Threat Modeling K8s.mp4 17.35 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/006. 3.5 Real World K8s Hacks.mp4 25.88 MB
Module 1 Preparing for the CKS Exam/Lesson 3 Kubernetes Security Foundation/007. 3.6 OWASP Kubernetes Top 10.mp4 17.09 MB
Module 2 Kubernetes Cluster Setup/001. Module Introduction.mp4 5.34 MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/001. Learning objectives.mp4 6.96 MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/002. 4.1 Network Security Overview.mp4 33 MB
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/003. 4.2 Pod Communication Policies.mp4 39.33 MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/001. Learning objectives.mp4 8.54 MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/002. 5.1 CIS Benchmarks for Kubernetes.mp4 10.35 MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/003. 5.2 Install Kube-bench.mp4 14.33 MB
Module 2 Kubernetes Cluster Setup/Lesson 5 CIS Benchmark Review of Kubernetes Components/004. 5.3 Checking Compliance with Kube-bench.mp4 29.02 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/001. Learning objectives.mp4 8.99 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/002. 6.1 Understanding Ingress.mp4 9.15 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/003. 6.2 Creating Ingress Objects.mp4 21.68 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/004. 6.3 Ingress Security Options.mp4 26.69 MB
Module 2 Kubernetes Cluster Setup/Lesson 6 Properly Setup Ingress with TLS/005. 6.4 Testing Ingress Access.mp4 35.06 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/001. Learning objectives.mp4 10.93 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/002. 7.1 Understanding Kubelet.mp4 24.92 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/003. 7.2 Network Policies.mp4 28.82 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/004. 7.3 Node Metadata Protection.mp4 51.81 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/005. 7.4 Implement Kubelet Authentication.mp4 35.52 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/006. 7.5 Test Kubelet and Node Metadata Security.mp4 27.58 MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/001. Learning objectives.mp4 8.15 MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/002. 8.1 K8s Dashboard Architecture.mp4 17.06 MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/003. 8.2 Dashboard Installation.mp4 40.23 MB
Module 2 Kubernetes Cluster Setup/Lesson 8 Kubernetes Dashboard Security/004. 8.3 Role Based Access Control (RBAC).mp4 21.72 MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/001. Learning objectives.mp4 10.03 MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/002. 9.1 Understanding Platform Binary Integrity.mp4 21.36 MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/003. 9.2 Download the Latest Kubernetes Release.mp4 10.62 MB
Module 2 Kubernetes Cluster Setup/Lesson 9 Verify Platform Binaries Before Deploying/004. 9.3 Verify Binary Checksum.mp4 24.28 MB
Module 3 Cluster Hardening/001. Module Introduction.mp4 5.45 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/001. Learning objectives.mp4 4.5 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/002. 10.1 Kubernetes API Fundamentals.mp4 24.84 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/003. 10.2 Kubernetes Access Control.mp4 42.51 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/004. 10.3 API Server Configuration.mp4 49.37 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/005. 10.4 API Server Hardening.mp4 62.41 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/006. 10.5 Verify Access Control Policies.mp4 52.3 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/001. Learning objectives.mp4 6.25 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/002. 11.1 Understanding Kubernetes RBAC.mp4 28.2 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/003. 11.2 Creating a User Account.mp4 16.69 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/004. 11.3 Applying Roles to a User.mp4 33.89 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/005. 11.4 Configuring and Binding Cluster Roles.mp4 19.65 MB
Module 3 Cluster Hardening/Lesson 11 Role Based Access Control (RBAC)/006. 11.5 Verifying Role Rules.mp4 32.99 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/001. Learning objectives.mp4 6.72 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/002. 12.1 Understanding Service Accounts.mp4 12.6 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/003. 12.2 Creating a Service Account.mp4 18.26 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/004. 12.3 Disable Default Settings.mp4 24.92 MB
Module 3 Cluster Hardening/Lesson 12 Protecting Service Accounts/005. 12.4 Verify Service Account Permissions.mp4 16.81 MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/001. Learning objectives.mp4 6.34 MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/002. 13.1 Kubernetes Update Process.mp4 17.51 MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/003. 13.2 Plan Upgrade Process.mp4 20.65 MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/004. 13.3 Upgrade Components and Test.mp4 57.76 MB
Module 4 System Hardening/001. Module Introduction.mp4 6 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/001. Learning objectives.mp4 4.16 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/002. 14.1 Host Hardening.mp4 43.2 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/003. 14.2 Remove Unneeded Services.mp4 30.79 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/004. 14.3 Log System Activities.mp4 33.77 MB
Module 4 System Hardening/Lesson 14 Minimize Host OS Footprint/005. 14.4 Limit Access.mp4 33.74 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/001. Learning objectives.mp4 5.69 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/002. 15.1 Understanding External Access to Kubernetes.mp4 11.74 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/003. 15.2 Finding Open Ports.mp4 30.5 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/004. 15.3 Host Firewall Configuration.mp4 14.99 MB
Module 4 System Hardening/Lesson 15 Minimize External Access to the Network/005. 15.4 Test Host Firewall.mp4 26.42 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/001. Learning objectives.mp4 5.53 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/002. 16.1 Understanding Kernel Threats.mp4 26.63 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/003. 16.2 Using Seccomp.mp4 53.55 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/004. 16.3 Using AppArmor.mp4 27.49 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/005. 16.4 Testing Kernel Security.mp4 44.15 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/001. Learning objectives.mp4 5.06 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/002. 17.1 Principle of Least Privilege.mp4 20.23 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/003. 17.2 Host Based IAM.mp4 33 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/004. 17.3 Restricting User Privileges.mp4 20.37 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/005. 17.4 Controlling File Access and User Logging.mp4 22.19 MB
Module 4 System Hardening/Lesson 17 Use Least Privilege IAM/006. 17.5 Understanding Cloud RBAC.mp4 13.97 MB
Module 5 Minimize Microservice Vulnerabilities/001. Module Introduction.mp4 6.8 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/001. Learning objectives.mp4 7.16 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/002. 18.1 Understanding Pod Security.mp4 51.94 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/003. 18.2 Configure Security Contexts.mp4 47.7 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/004. 18.3 Pod Security Admission.mp4 23.17 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/005. 18.4 OPA Gatekeeper.mp4 40.24 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/001. Learning objectives.mp4 5.79 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/002. 19.1 Understanding Kubernetes Secrets.mp4 13.89 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/003. 19.2 Creating and Using a Secret.mp4 16.87 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/004. 19.3 Using Secrets in Pods.mp4 8.77 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 19 Managing Kubernetes Secrets/005. 19.4 Encrypting Secrets at Rest.mp4 38.29 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/001. Learning objectives.mp4 5.01 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/002. 20.1 Containing Containers.mp4 19.48 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/003. 20.2 Sandboxed Pods.mp4 53.83 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/004. 20.3 Using gVisor.mp4 25.35 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/005. 20.4 Using Kata Containers.mp4 31.53 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/001. Learning objectives.mp4 5.45 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/002. 21.1 Introduction to Cilium and mTLS.mp4 20.47 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/003. 21.2 Using Cilium for Pod-to-Pod Encryption.mp4 64.98 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/004. 21.3 Deploying and Verifying mTLS with Cilium.mp4 34.57 MB
Module 6 Software Supply Chain Security/001. Module Introduction.mp4 5.99 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/001. Learning objectives.mp4 4.71 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/002. 22.1 Software Supply Chain Risks.mp4 34.3 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/003. 22.2 Protect Image Registry Access.mp4 19.75 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/004. 22.3 Require Signed Images.mp4 46.24 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/005. 22.4 Policy Enforcement Image Policy Webhook.mp4 78.29 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/006. 22.5 Policy Enforcement Validating Admission Policy.mp4 32.55 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/001. Learning objectives.mp4 5.27 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/002. 23.1 Static Analysis Fundamentals.mp4 22.12 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/003. 23.2 Scan Manifests for Vulnerabilities with Kube-linter.mp4 22.66 MB
Module 6 Software Supply Chain Security/Lesson 23 Static Analysis of Workloads and Containers/004. 23.3 Scanning for Cluster Vulnerabilities.mp4 23.7 MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/001. Learning objectives.mp4 4.32 MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/002. 24.1 Understanding Container Images.mp4 36.51 MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/003. 24.2 Use Image Creation Good Practices.mp4 31.04 MB
Module 6 Software Supply Chain Security/Lesson 24 Minimize Base Image Footprint/004. 24.3 Reduce Image Attack Surface.mp4 25.3 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/001. Learning objectives.mp4 6.89 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/002. 25.1 Scanning for Vulnerable Images.mp4 17.52 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/003. 25.2 Using Trivy to Identify Vulnerable Containers.mp4 30.13 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/004. 25.3 Using the Trivy Operator.mp4 48.7 MB
Module 6 Software Supply Chain Security/Lesson 25 Scan Images for Known Vulnerabilities/005. 25.4 Using Trivy and Kyverno for SBOM Attestation.mp4 41.29 MB
Module 7 Monitoring, Logging, and Runtime Security/001. Module Introduction.mp4 5.96 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/001. Learning objectives.mp4 6.71 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/002. 26.1 Understanding Immutability.mp4 23.24 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/003. 26.2 Read Only Filesystem.mp4 24.92 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 26 Ensure Immutability of Containers at Runtime/004. 26.3 Policy Enforcement with VAP.mp4 36.12 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.mp4 4.99 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/002. 27.1 Auditing in Kubernetes.mp4 27.4 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.mp4 50.35 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/004. 27.3 Event Batching and Tuning.mp4 12.69 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/005. 27.4 Configure Backend Log Storage.mp4 32.14 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.mp4 6.48 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.mp4 51.91 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/003. 28.2 Using Falco for Threat Detection.mp4 26.39 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.mp4 60.19 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/005. 28.4 Falco Kubernetes Installation.mp4 43.13 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/006. 28.5 Falco Configuration and Rules.mp4 27.04 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.mp4 90.48 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/001. Learning objectives.mp4 4.7 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.mp4 54.56 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/003. 29.2 Security Event Log Review.mp4 15.21 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.mp4 51.83 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/005. 29.4 Practicing Kubernetes Security.mp4 41.14 MB
Module 8 Exam Practice Scenarios/001. Module Introduction.mp4 6.18 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/001. Learning objectives.mp4 7.35 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/002. 30.1 Securing Kubernetes API Access.mp4 43.8 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/003. 30.2 Implementing Pod Security Standards (PSS).mp4 36.58 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/004. 30.3 Enforcing Network Policies for Pod Communication.mp4 44.84 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/005. 30.4 Restricting Image Registries.mp4 35.71 MB
Module 8 Exam Practice Scenarios/Lesson 30 CKS Practice Exam 1/006. 30.5 Configuring Secret Encryption.mp4 45.95 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/001. Learning objectives.mp4 8.17 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/002. 31.1 Container Runtime Security.mp4 38.19 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.mp4 61.39 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/004. 31.3 Enforcing Network Encryption.mp4 46.81 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/005. 31.4 Secure Ingress via TLS.mp4 42.64 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.mp4 67.76 MB
Summary/001. Certified Kubernetes Security Specialist (CKS) Summary.mp4 15.24 MB
其他位置