
English | Size: 621 MB
Genre: eLearning
Learn to secure Kubernetes API, enforce network policies, and enhance cluster security for the CKS certification.
What you’ll learn
Understand and Implement RBAC Policies to secure Kubernetes API access effectively.
Gain Hands-On Experience by implementing Role-Based Access Control (RBAC) in Kubernetes through practical labs.
Configure Client Authentication using SSL/TLS certificates for secure Kubernetes communication.
Set Up and Manage Client Credentials in the Kubernetes configuration file.
Deep Dive into RBAC Components, including Roles and RoleBindings, to control access within the cluster.
Expand RBAC Permissions to enable users to manage Pods within a specific namespace.
Access and Work with a Minikube Kubernetes Cluster as a designated user with controlled privileges.
Design and Implement Network Policies to regulate Pod-to-Pod communication securely.
Enforce Pod-to-Pod Communication Restrictions using Network Policies in a hands-on lab session.
Configure Selective Network Policies to allow controlled communication between specific Pods.
Secure an Nginx Server on a Kubernetes cluster using HTTPS (TLS encryption) for enhanced security.
Kubernetes is the backbone of modern cloud-native applications, but securing its API and network communication is critical. In this course, you will learn how to protect your Kubernetes environment from unauthorized access, enforce security policies, and ensure encrypted communication between services.
Course Content
Architecture of the Kubernetes Cluster
- Understanding the Kubernetes architecture with examples
- Working with Kubernetes
- Roles of the Master Node
- Components of the Control Plane (Master Node)API ServerEtcdScheduler
Controller Manager
- Kubelet
- Service Proxy
- POD (Pod)
- Container Engine (Docker, Containerd, or Rocket)
RBAC Policies for Securing Kubernetes API Access
- Introduction
- Key components of RBAC
- How RBAC works in Kubernetes API Access?
- How Role and RoleBinding Work Together
- Kubernetes Roles: Defining Permissions and Access
- Permissions Granted by Kubernetes Roles
- Create a role
- Bind the Role to a User or Service Account
Hands-On Lab: Implementing RBAC in Kubernetes
- Introduction to Scenario-Based RBAC Exercises
- Set Up a VM for a Minikube Cluster
- Set Up a K8s Minikube Cluster – Part 1
- Set Up a K8s Minikube Cluster – Part 2
- Set Up a K8s Minikube Cluster – Part 3
- Start the K8s Minikube Cluster
- Create a Namespace and Run a Pod
Client Authentication using SSL/TLS Certificates
- Overview of Client Certificate Generation
- Generate a Private Key
- Generate a Certificate Signing Request (CSR)
- Sign a CSR with Minikube’s CA to Generate a User Certificate
- Set Client Credentials in Kubernetes Config
- Verify User Credentials in Kubernetes Config
RBAC: Role and RoleBinding
- Create a Role
- Verify the Role and Its Associated Permissions
- Create a RoleBinding to Assign a User
- Test RBAC Permissions
Expand RBAC Permissions to Manage Pods in a Namespace
- Generate a Private Key and CSR
- Generate a User Certificate by Signing CSR with Minikube CA
- Set User Credentials in Kubernetes (K8s)
- Create a Role with Specific Permissions
- Create a RoleBinding
- RBAC Testing: Validate Permissions
Access the K8s Minikube Cluster as a User
- List and Manage Kubernetes Contexts
- Set Up a Kubernetes Context for a User
- Verify RBAC Permissions in a New Context
- Set Up a K8s Context for a Different User
- Test RBAC Permissions for Pod Creation
- Modify RBAC Role Permissions in K8s
Implement and Test Network Policies for Pod Communication
- Introduction to Kubernetes Network Policies
- Why Restrict Pod-To-Pod Communication?
- Understanding K8s Network Policies and CNI Plugins
- Example Use Case Scenarios
Hands-On Lab: Enforcing Pod-to-Pod Restrictions with Network Policies
- Set Up a VM for a Kubernetes Cluster
- Start Minikube with Cilium CNI
- Deploy Two Pods and Assign Labels
- Test Pod-to-Pod Connectivity with Curl
- Create a Network Policy to Restrict Pod Communication
- Verify Pod-to-Pod Connectivity is Blocked
- Network Policy to Restrict Ingress and Egress Traffic
Configuring Network Policy for Selective Pod Communication
- Overview of Selective Pod Communication
- Network Policy for Selective Pod Communication
- Test Pod Connectivity
- Deploy a Pod and Verify Its Network Connectivity
Securing, Deploying, and Accessing Nginx in Kubernetes
- Overview of Securing Nginx with HTTPS
- Deploy and Expose a Nginx Pod to External Traffic
- Access Nginx Web Server Through HTTP
- Set Up Nginx on Host Machine for Accessing Nginx Pod
- Access Nginx Web Server via Web Browser (HTTP Only)
Secure Nginx Server with HTTPS (TLS) on K8s Cluster
- Deploy and Expose a Nginx Pod to External Traffic
- Generate a self-signed TLS Certificate
- Store the TLS Certificate as a Secret
- Check Minikube’s Ingress Controller Status
- Create Ingress Resource for HTTPS
- Last lecture
Who this course is for:
- DevOps Engineers – Looking to implement secure access controls and network policies in Kubernetes environments.
- Cloud Engineers & Architects
- Software Developers
- IT Professionals & Enthusiasts – Anyone interested in learning Kubernetes security best practices.

rapidgator.net/file/22276b4bcfb54d349c79a9aed8bae45c/UD-MasteringKubernetesAPISecurityandNetworkPolicies2025-3.part1.rar.html
rapidgator.net/file/9691776ccd313623da89d0b54aa3e613/UD-MasteringKubernetesAPISecurityandNetworkPolicies2025-3.part2.rar.html
trbt.cc/g8dzy1p72snu/UD-MasteringKubernetesAPISecurityandNetworkPolicies2025-3.part1.rar.html
trbt.cc/g4lmaf4io3ab/UD-MasteringKubernetesAPISecurityandNetworkPolicies2025-3.part2.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9