Part 1: Cluster Setup
Secure cluster setup including network policies, CIS benchmarks, ingress hardening, and node metadata protection.
Modules
Section titled “Modules”| Module | Description |
|---|---|
| Module 1.1: Network Policies Deep Dive | Advanced network policy design and troubleshooting |
| Module 1.2: CIS Benchmarks and kube-bench | Auditing clusters against CIS security standards |
| Module 1.3: Ingress Security | Securing ingress controllers and TLS configuration |
| Module 1.4: Node Metadata Protection | Preventing access to cloud provider metadata |
| Module 1.5: GUI Security (Kubernetes Dashboard) | Securing the Kubernetes Dashboard and web UIs |