CKS Exam Study Guide (Certified Kubernetes Security Specialist)

Certified Kubernetes Security Specialist Exam Study Guide

Preparing for the CKS Certified Kubernetes Security Specialist exam? Don't know where to start? This post is the CKS Kubernetes Security Specialist Certification Exam Preparation Study Guide (with links to each exam objective).

I have curated a list of articles from the Kubernetes documentation and other blogs on the web for each objective of the CKS Certification exam. Please share the post within your circles so it helps them to prepare for the exam.

CKS Kubernetes Security Specialist Exam Coupon

Coupon: Use Code RAVIKIRANS15

CKS Kubernetes Security Specialist Materials

To view other DevOps certificate study guides, click here.

Full Disclosure: Some of the links in this post are affiliate links. I receive a commission when you purchase through them.

CKS Curriculum Topics

Cluster Setup – 10%

Cluster Hardening – 15%

System Hardening – 15%

Minimize Microservice Vulerabilities – 20%

cks kubernetes

Amazon link (affiliate)

Supply Chain Security – 20%

Monitoring, Logging and Runtime Security – 20%

Perform behavioral analytics of syscall process and file activities at the host and container level to detect malicious activities

How to detect a Kubernetes vulnerability using Falco

Kubernetes Security monitoring at scale

Detect threats within physical infrastructure, apps, networks, data, users and workloads

Common Kubernetes config security threats

A guidance on Kubernetes threat modeling

Threat matrix for Kubernetes

Detect all phases of attack regardless where it occurs and how it spreads

Investigating Kubernetes attack scenarios in Threat Stack

Anatomy of a Kubernetes attack – How untrusted Docker images fails us

Perform deep analytical investigation and identification of bad actors within environment

Kubernetes security 101: Risks and Best practices

Ensure immutability of containers at runtime

Leverage Kubernetes to ensure that containers are immutable

Why we should use immutable Docker images?

With immutable infrastructure, your systems can rise from the dead

Use Audit Logs to monitor access

Kubernetes auditing

How to monitor Kubernetes audit logs?

Kubernetes audit logging

This brings us to the end of the Certified Kubernetes Security Specialist (CKS) Exam Preparation Study Guide

What do you think? Let me know in the comments section if I have missed out on anything. Also, I love to hear from you about how your preparation is going on!

In case you are looking for other DevOps / Kubernetes certification exams check out this page

Follow/Like ravikirans.com to Receive Updates

Sign up for Newsletter

Want to be notified as soon as I post? Subscribe to RSS feed / leave your email address in the subscribe section. Share the article to your social networks with the below links so it can benefit others.

Share the Article in Your Social Media Networks

  •  
  •  
  •  
  •  
  •  

You may also like

Leave a Reply

Your email address will not be published. Required fields are marked *