zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Udemy - Kubernetes CKS 2022 Complete Course Theory Practice
magnet:?xt=urn:btih:850e239fe1647a0735c9aaf17f7aa731b07615c3&dn=Udemy - Kubernetes CKS 2022 Complete Course Theory Practice
磁力链接详情
Hash值:
850e239fe1647a0735c9aaf17f7aa731b07615c3
点击数:
11
文件大小:
5.43 GB
文件数量:
160
创建日期:
2025-6-14 15:20
最后访问:
2025-6-15 11:40
访问标签:
Udemy
-
Kubernetes
CKS
2022
Complete
Course
Theory
Practice
文件列表详情
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/98 - Practice Encrypt ETCD.mp4 221.94 MB
1 - Introduction/1 - Welcome.mp4 27.45 MB
1 - Introduction/2 - Best Video Quality.mp4 4.46 MB
1 - Introduction/4 - K8s Security Best Practices.mp4 57.34 MB
2 - Create your course K8s cluster/5 - Cluster Specification.mp4 23.21 MB
2 - Create your course K8s cluster/6 - Practice Create GCP Account.mp4 42.98 MB
2 - Create your course K8s cluster/7 - Practice Configure gcloud command.mp4 74.92 MB
2 - Create your course K8s cluster/8 - Practice Create Kubeadm Cluster in GCP.mp4 122.57 MB
2 - Create your course K8s cluster/9 - Practice Firewall rules for NodePorts.mp4 2.85 MB
2 - Create your course K8s cluster/10 - Notice Always stop your instances.mp4 8.17 MB
2 - Create your course K8s cluster/11 - Containerd Course Upgrade.mp4 2.49 MB
2 - Create your course K8s cluster/12 - Recap.mp4 6.5 MB
3 - Killercoda Access/13 - How to get Access.mp4 2.37 MB
4 - Foundation Kubernetes Secure Architecture/15 - Intro.mp4 31.55 MB
4 - Foundation Kubernetes Secure Architecture/16 - Practice Find various K8s certificates.mp4 74.38 MB
4 - Foundation Kubernetes Secure Architecture/17 - Recap.mp4 4.35 MB
5 - Foundation Containers under the hood/18 - Intro.mp4 44.91 MB
5 - Foundation Containers under the hood/19 - Container Tools Introduction.mp4 16.39 MB
5 - Foundation Containers under the hood/20 - Practice The PID Namespace.mp4 12.5 MB
5 - Foundation Containers under the hood/21 - Recap.mp4 3.93 MB
6 - Cluster Setup Network Policies/24 - Cluster Reset.mp4 3.4 MB
6 - Cluster Setup Network Policies/25 - Introduction 1.mp4 33.64 MB
6 - Cluster Setup Network Policies/26 - Introduction 2.mp4 24.09 MB
6 - Cluster Setup Network Policies/27 - Practice Default Deny.mp4 30.9 MB
6 - Cluster Setup Network Policies/28 - Practice Frontend to Backend traffic.mp4 49.29 MB
6 - Cluster Setup Network Policies/29 - Practice Backend to Database traffic.mp4 41.07 MB
6 - Cluster Setup Network Policies/30 - Recap.mp4 14.18 MB
7 - Cluster Setup GUI Elements/33 - Introduction.mp4 20.55 MB
7 - Cluster Setup GUI Elements/34 - Practice Install Dashboard.mp4 11.82 MB
7 - Cluster Setup GUI Elements/35 - Practice Outside Insecure Access.mp4 44.68 MB
7 - Cluster Setup GUI Elements/36 - Practice RBAC for the Dashboard.mp4 21.64 MB
7 - Cluster Setup GUI Elements/37 - Recap.mp4 19.34 MB
8 - Cluster Setup Secure Ingress/38 - K8s Docs in correct Version.mp4 2.95 MB
8 - Cluster Setup Secure Ingress/39 - Introduction.mp4 11.59 MB
8 - Cluster Setup Secure Ingress/40 - Practice Create an Ingress.mp4 29.71 MB
8 - Cluster Setup Secure Ingress/41 - Practice Secure an Ingress.mp4 93.56 MB
8 - Cluster Setup Secure Ingress/42 - Recap.mp4 2.33 MB
9 - Cluster Setup Node Metadata Protection/45 - Introduction.mp4 11.77 MB
9 - Cluster Setup Node Metadata Protection/46 - Practice Access Node Metadata.mp4 12.87 MB
9 - Cluster Setup Node Metadata Protection/47 - Practice Protect Node Metadata via NetworkPolicy.mp4 43.37 MB
9 - Cluster Setup Node Metadata Protection/48 - Recap.mp4 2.79 MB
10 - Cluster Setup CIS Benchmarks/50 - Introduction.mp4 9.39 MB
10 - Cluster Setup CIS Benchmarks/51 - Practice CIS in Action.mp4 55.65 MB
10 - Cluster Setup CIS Benchmarks/52 - Practice kubebench.mp4 44.94 MB
10 - Cluster Setup CIS Benchmarks/53 - Recap.mp4 20.86 MB
11 - Cluster Setup Verify Platform Binaries/55 - Introduction.mp4 3.51 MB
11 - Cluster Setup Verify Platform Binaries/56 - Practice Download and verify K8s release.mp4 19.75 MB
11 - Cluster Setup Verify Platform Binaries/57 - Practice Verify apiserver binary running in our cluster.mp4 74.22 MB
11 - Cluster Setup Verify Platform Binaries/58 - Recap.mp4 2.08 MB
12 - Cluster Hardening RBAC/60 - Intro.mp4 26.98 MB
12 - Cluster Hardening RBAC/61 - Practice Role and Rolebinding.mp4 29.67 MB
12 - Cluster Hardening RBAC/62 - Practice ClusterRole and ClusterRoleBinding.mp4 75.85 MB
12 - Cluster Hardening RBAC/63 - Accounts and Users.mp4 11.56 MB
12 - Cluster Hardening RBAC/64 - Practice CertificateSigningRequests.mp4 155.77 MB
12 - Cluster Hardening RBAC/65 - Recap.mp4 5.8 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/70 - Intro.mp4 5.29 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/71 - Practice Pod uses custom ServiceAccount.mp4 107.57 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/72 - Practice Disable ServiceAccount mounting.mp4 33.46 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/73 - Practice Limit ServiceAccounts using RBAC.mp4 7.63 MB
13 - Cluster Hardening Exercise caution in using ServiceAccounts/74 - Recap.mp4 4.79 MB
14 - Cluster Hardening Restrict API Access/76 - Introduction.mp4 18.28 MB
14 - Cluster Hardening Restrict API Access/77 - Practice Anonymous Access.mp4 20.57 MB
14 - Cluster Hardening Restrict API Access/78 - Practice Insecure Access.mp4 16.1 MB
14 - Cluster Hardening Restrict API Access/79 - Practice Manual API Request.mp4 78.09 MB
14 - Cluster Hardening Restrict API Access/80 - Practice External Apiserver Access.mp4 101.09 MB
14 - Cluster Hardening Restrict API Access/81 - NodeRestriction AdmissionController.mp4 5.55 MB
14 - Cluster Hardening Restrict API Access/82 - Practice Verify NodeRestriction.mp4 45.06 MB
14 - Cluster Hardening Restrict API Access/83 - Recap.mp4 4.86 MB
15 - Cluster Hardening Upgrade Kubernetes/87 - Introduction.mp4 22.79 MB
15 - Cluster Hardening Upgrade Kubernetes/89 - Practice Create outdated cluster.mp4 28.62 MB
15 - Cluster Hardening Upgrade Kubernetes/90 - Practice Upgrade controlplane node.mp4 76.86 MB
15 - Cluster Hardening Upgrade Kubernetes/91 - Practice Upgrade node.mp4 22 MB
15 - Cluster Hardening Upgrade Kubernetes/92 - Recap.mp4 7.3 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/93 - Introduction.mp4 9.89 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/94 - Practice Create Simple Secret Scenario.mp4 47.95 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/95 - Practice Hack Secrets in Container Runtime.mp4 18.84 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/96 - Practice Hack Secrets in ETCD.mp4 51.43 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/97 - ETCD Encryption.mp4 15.33 MB
16 - Microservice Vulnerabilities Manage Kubernetes Secrets/99 - Recap.mp4 20.19 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/104 - Introduction.mp4 41.16 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/105 - Practice Container calls Linux Kernel.mp4 21.33 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/106 - Open Container Initiative OCI.mp4 9.42 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/107 - Sandbox Runtime Katacontainers.mp4 5.89 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/108 - Sandbox Runtime gVisor.mp4 5.38 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/109 - Practice Create and use RuntimeClasses.mp4 27.91 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/110 - Practice Install and use gVisor.mp4 72.04 MB
17 - Microservice Vulnerabilities Container Runtime Sandboxes/111 - Recap.mp4 4.69 MB
18 - Microservice Vulnerabilities OS Level Security Domains/113 - Intro and Security Contexts.mp4 37.89 MB
18 - Microservice Vulnerabilities OS Level Security Domains/114 - Practice Set Container User and Group.mp4 30.87 MB
18 - Microservice Vulnerabilities OS Level Security Domains/115 - Practice Force Container NonRoot.mp4 8.3 MB
18 - Microservice Vulnerabilities OS Level Security Domains/116 - Privileged Containers.mp4 4.02 MB
18 - Microservice Vulnerabilities OS Level Security Domains/117 - Practice Create Privileged Containers.mp4 13.87 MB
18 - Microservice Vulnerabilities OS Level Security Domains/118 - PrivilegeEscalation.mp4 2.74 MB
18 - Microservice Vulnerabilities OS Level Security Domains/119 - Practice Disable PriviledgeEscalation.mp4 5.72 MB
19 - Microservice Vulnerabilities mTLS/122 - Intro.mp4 46.94 MB
19 - Microservice Vulnerabilities mTLS/123 - Practice Create sidecar proxy.mp4 71.81 MB
19 - Microservice Vulnerabilities mTLS/124 - Recap.mp4 4.35 MB
20 - Open Policy Agent OPA/125 - Cluster Reset.mp4 3.4 MB
20 - Open Policy Agent OPA/126 - Introduction.mp4 18.5 MB
20 - Open Policy Agent OPA/127 - Practice Install OPA.mp4 41.65 MB
20 - Open Policy Agent OPA/128 - Practice Deny All Policy.mp4 100.36 MB
20 - Open Policy Agent OPA/129 - Practice Enforce Namespace Labels.mp4 110.35 MB
20 - Open Policy Agent OPA/130 - Practice Enforce Deployment replica count.mp4 42.1 MB
20 - Open Policy Agent OPA/131 - Practice The Rego Playground and more examples.mp4 28.02 MB
20 - Open Policy Agent OPA/132 - Recap.mp4 4.35 MB
21 - Supply Chain Security Image Footprint/133 - Introduction.mp4 15.48 MB
21 - Supply Chain Security Image Footprint/134 - Practice Reduce Image Footprint with MultiStage.mp4 78.66 MB
21 - Supply Chain Security Image Footprint/135 - Practice Secure and harden Images.mp4 66.82 MB
21 - Supply Chain Security Image Footprint/136 - Recap.mp4 25.17 MB
22 - Supply Chain Security Static Analysis/139 - Introduction.mp4 20.24 MB
22 - Supply Chain Security Static Analysis/140 - Kubesec.mp4 8.69 MB
22 - Supply Chain Security Static Analysis/141 - Practice Kubesec.mp4 40.14 MB
22 - Supply Chain Security Static Analysis/142 - OPA Conftest.mp4 3.47 MB
22 - Supply Chain Security Static Analysis/143 - Practice OPA Conftest for K8s YAML.mp4 38.33 MB
22 - Supply Chain Security Static Analysis/144 - Practice OPA Conftest for Dockerfile.mp4 40.53 MB
22 - Supply Chain Security Static Analysis/145 - Recap.mp4 4.51 MB
23 - Supply Chain Security Image Vulnerability Scanning/148 - Introduction.mp4 24.84 MB
23 - Supply Chain Security Image Vulnerability Scanning/149 - Clair and Trivy.mp4 2.59 MB
23 - Supply Chain Security Image Vulnerability Scanning/150 - Practice Use Trivy to scan images.mp4 54.86 MB
23 - Supply Chain Security Image Vulnerability Scanning/151 - Recap.mp4 9.01 MB
24 - Supply Chain Security Secure Supply Chain/153 - Introduction.mp4 16.98 MB
24 - Supply Chain Security Secure Supply Chain/154 - Practice Image Digest.mp4 38.87 MB
24 - Supply Chain Security Secure Supply Chain/155 - Practice Whitelist Registries with OPA.mp4 36.1 MB
24 - Supply Chain Security Secure Supply Chain/156 - ImagePolicyWebhook.mp4 4.41 MB
24 - Supply Chain Security Secure Supply Chain/157 - Practice ImagePolicyWebhook.mp4 92.56 MB
24 - Supply Chain Security Secure Supply Chain/158 - Recap.mp4 3.48 MB
25 - Runtime Security Behavioral Analytics at host and container level/161 - Introduction.mp4 30.28 MB
25 - Runtime Security Behavioral Analytics at host and container level/162 - Practice Strace.mp4 60.43 MB
25 - Runtime Security Behavioral Analytics at host and container level/163 - Practice Strace and proc on ETCD.mp4 103.77 MB
25 - Runtime Security Behavioral Analytics at host and container level/164 - Practice proc and env variables.mp4 26.82 MB
25 - Runtime Security Behavioral Analytics at host and container level/165 - Practice Falco and Installation.mp4 65.96 MB
25 - Runtime Security Behavioral Analytics at host and container level/166 - Practice Use Falco to find malicious processes.mp4 74.45 MB
25 - Runtime Security Behavioral Analytics at host and container level/167 - Practice Investigate Falco rules.mp4 25.57 MB
25 - Runtime Security Behavioral Analytics at host and container level/168 - Practice Change Falco Rule.mp4 141.94 MB
25 - Runtime Security Behavioral Analytics at host and container level/169 - Recap.mp4 16.77 MB
26 - Runtime Security Immutability of containers at runtime/172 - Introduction.mp4 10.26 MB
26 - Runtime Security Immutability of containers at runtime/173 - Ways to enforce immutability.mp4 11.97 MB
26 - Runtime Security Immutability of containers at runtime/174 - Practice StartupProbe changes container.mp4 28.09 MB
26 - Runtime Security Immutability of containers at runtime/175 - Practice SecurityContext renders container immutable.mp4 40.81 MB
26 - Runtime Security Immutability of containers at runtime/176 - Recap.mp4 3.21 MB
27 - Runtime Security Auditing/178 - Introduction.mp4 113.1 MB
27 - Runtime Security Auditing/179 - Practice Enable Audit Logging in Apiserver.mp4 95.78 MB
27 - Runtime Security Auditing/180 - Practice Create Secret and check Audit Logs.mp4 59.79 MB
27 - Runtime Security Auditing/181 - Practice Create advanced Audit Policy.mp4 162.33 MB
27 - Runtime Security Auditing/182 - Recap.mp4 5.79 MB
28 - System Hardening Kernel Hardening Tools/184 - Introduction.mp4 9.14 MB
28 - System Hardening Kernel Hardening Tools/185 - AppArmor.mp4 7.36 MB
28 - System Hardening Kernel Hardening Tools/186 - Practice AppArmor for curl.mp4 31.54 MB
28 - System Hardening Kernel Hardening Tools/187 - Practice AppArmor for Docker Nginx.mp4 61.63 MB
28 - System Hardening Kernel Hardening Tools/188 - Practice AppArmor for Kubernetes Nginx.mp4 43.41 MB
28 - System Hardening Kernel Hardening Tools/189 - Seccomp.mp4 10.3 MB
28 - System Hardening Kernel Hardening Tools/190 - Practice Seccomp for Docker Nginx.mp4 15.73 MB
28 - System Hardening Kernel Hardening Tools/191 - Practice Seccomp for Kubernetes Nginx.mp4 71.68 MB
28 - System Hardening Kernel Hardening Tools/192 - Recap.mp4 17.9 MB
29 - System Hardening Reduce Attack Surface/194 - Introduction.mp4 21.11 MB
29 - System Hardening Reduce Attack Surface/195 - Practice Systemctl and Services.mp4 25.99 MB
29 - System Hardening Reduce Attack Surface/196 - Practice Install and investigate Services.mp4 65.87 MB
29 - System Hardening Reduce Attack Surface/197 - Practice Disable application listening on port.mp4 21.5 MB
29 - System Hardening Reduce Attack Surface/198 - Practice Investigate Linux Users.mp4 75.67 MB
29 - System Hardening Reduce Attack Surface/199 - Recap.mp4 4.07 MB
其他位置