|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1325677484 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
220607s2022 xx 368 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d OCLCO
|
020 |
|
|
|a 9781803237114
|q (electronic video)
|
020 |
|
|
|a 1803237112
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000072085971
|
035 |
|
|
|a (OCoLC)1325677484
|
037 |
|
|
|a 9781803237114
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.76.D47
|
082 |
0 |
4 |
|a 005.3
|2 23/eng/20220607
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Certified Kubernetes security specialist (CKS) course.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c [2022]
|
300 |
|
|
|a 1 online resource (1 video file (6 hr., 8 min.)) :
|b sound, color.
|
306 |
|
|
|a 060800
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Himanshu Sharma, instructor.
|
500 |
|
|
|a "Updated in May 2022."
|
520 |
|
|
|a Become a certified Kubernetes security specialist by taking up this complete hands-on course About This Video Deep technical insight into Kubernetes Learn to use kubesec to perform static analysis using Docker image Learn how to use Falco to find malicious processes In Detail This Kubernetes Security Specialist course provides foundational knowledge using concepts and hands-on demonstrations of the Kubernetes Cluster. In this course, we will be focusing more on the practical side, so make sure you have a running Kubernetes cluster. This course is focused on security. It deals with all aspects of security within the context of a Kubernetes environment. That means securing not only the Kubernetes cluster itself but also the applications running within the cluster. You will learn how to secure many different components of Kubernetes applications and environments. We are going to cover every topic such as cluster setup, creating an ingress, and securing an ingress. You will also learn cluster hardening, which includes RBAC, role, and role binding for a user. Further, you will learn system hardening, kernel hardening, minimizing microservice vulnerabilities, supply chain security, monitoring, logging, and runtime security. By the end of this Kubernetes course, you will gain in-depth knowledge about Kubernetes and be a Kubernetes security specialist. Audience This Docker course is designed for Kubernetes administrators, security specialists, and for those who want to master Certified Kubernetes Security Specialist. You should already have some Kubernetes Administrator knowledge before attending this course.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed June 7, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Application software
|x Development
|x Computer programs
|x Certification
|v Study guides.
|
650 |
|
0 |
|a Computer security
|x Certification
|v Study guides.
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Study guides
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Sharma, Himanshu,
|e instructor.
|
710 |
2 |
|
|a Packt Publishing,
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781803237114/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|