CKS Exam Study Guide (Certified Kubernetes Security Specialist)

Certified Kubernetes Security Specialist Exam Study Guide

Preparing for the CKS Certified Kubernetes Security Specialist exam? Don’t know where to start? This post is the CKS Kubernetes Security Specialist Certification Exam Preparation Study Guide (with links to each exam objective).

I have curated a list of articles from the Kubernetes documentation and other blogs on the web for each objective of the CKS Certification exam. Please share the post within your circles so it helps them to prepare for the exam.

CKS Kubernetes Security Exam Coupon

Coupon: Use Code TUX30

CKS Kubernetes Security Specialist Course

CKS Kubernetes Security Specialist Materials

CKS Kubernetes Security Exam Prerequisites

You should have attempted & cleared the Certified Kubernetes Administrator (CKA) exam prior to attempting the CKS exam.

To view other DevOps/Kubernetes certificate study guides, click here

Full Disclosure: Some of the links in this post are affiliate links. I receive a commission when you purchase through them.

CKS Curriculum Topics

Cluster Setup – 10%

Cluster Hardening – 15%

System Hardening – 15%

Minimize Microservice Vulerabilities – 20%

cks kubernetes security

Amazon link (affiliate)

Supply Chain Security – 20%

Monitoring, Logging and Runtime Security – 20%

Perform behavioral analytics of syscall process and file activities at the host and container level to detect malicious activities

How to detect a Kubernetes vulnerability using Falco

Kubernetes Security monitoring at scale

Detect threats within physical infrastructure, apps, networks, data, users and workloads

Common Kubernetes config security threats

A guidance on Kubernetes threat modeling

Threat matrix for Kubernetes

Detect all phases of attack regardless where it occurs and how it spreads

Investigating Kubernetes attack scenarios in Threat Stack

Anatomy of a Kubernetes attack – How untrusted Docker images fails us

Perform deep analytical investigation and identification of bad actors within environment

Kubernetes security 101: Risks and Best practices

Ensure immutability of containers at runtime

Leverage Kubernetes to ensure that containers are immutable

Why we should use immutable Docker images?

With immutable infrastructure, your systems can rise from the dead

Use Audit Logs to monitor access

Kubernetes auditing

How to monitor Kubernetes audit logs?

Kubernetes audit logging

This brings us to the end of the Certified Kubernetes Security Specialist (CKS) Exam Preparation Study Guide.

What do you think? Let me know in the comments section if I have missed out on anything. Also, I love to hear from you about how your preparation is going on!

In case you are looking for other DevOps / Kubernetes certification exams check out this page

Follow/Like to Receive Updates

Want to be notified as soon as I post? Subscribe to RSS feed / leave your email address in the subscribe section. Share the article to your social networks with the below links so it can benefit others.

Share the Article in Your Social Media Networks


You may also like


Leave a Reply

Your email address will not be published. Required fields are marked *