Google Kubernetes Engine Security on Google Cloud Platform
Develop essential systems & infrastructure skills with expert instruction and practical examples.
Skills you'll gain:
Skill Level
Requirements
Who This Course Is For
About This Course
Understanding Kubernetes: Cluster Components and ArchitectureIntroductionThe Kubernetes Cluster ArchitectureLearn Architecture Through ExamplesGetting Started with KubernetesControl Plane Components in Kubernetes (Master Node)Kubernetes Scheduler: A Key Control Plane ComponentKubernetes Controller ManagerSet Up a K8s Cluster on Google Kubernetes Engine (GKE)Lab 1: Practical Kubernetes Cluster SetupLab 2: Practical Kubernetes Cluster SetupLab 3: Practical Kubernetes Cluster SetupLab 4: Practical Kubernetes Cluster SetupRBAC Policies for Securing Kubernetes ClusterIntroductionKey components of RBACHow RBAC works. How Role and RoleBinding Work TogetherKubernetes Roles: Defining Permissions and AccessPermissions Granted by Kubernetes RolesCreate a roleBind the Role to a User or Service AccountSet Up a Minikube Kubernetes Cluster on Google CloudProject OverviewLaunch VM for Minikube ClusterActivate Cloud Shell and Connect to VMMinikube Kubernetes Cluster Setup - Practical Lab 1Minikube Kubernetes Cluster Setup - Practical Lab 2Minikube Kubernetes Cluster Setup - Practical Lab 3Start Minikube and Deploy Nginx PodClient Authentication using SSL/TLS CertificateSet Up New Namespace & Launch PodOverview of Client Certificate GenerationGenerate a Private KeyGenerate a Certificate Signing Request (CSR)Sign a CSR with Minikube's CA to Generate a User CertificateSet and Verify Client Credentials in Kubernetes ConfigRBAC: Role and RoleBindingCreate a RoleCreate RoleBinding to Assign Role to UserTest RBAC PermissionsAccess the K8s Minikube Cluster as a UserList and Manage Kubernetes ContextsSet Up a New Context for a UserVerify RBAC Permissions with New ContextModify and Test RBAC Role PermissionsSet Up and Verify Network Policies for PodsIntroduction to Kubernetes Network PoliciesWhy Restrict Pod-To-Pod Communication. Understanding K8s Network Policies and CNI PluginsExample Use Case ScenariosLab: Restrict Pod Communication Using Network PoliciesStart Minikube with Cilium CNICreate Two Pods with LabelsVerify Pod Connectivity Using CurlCreate Ingress Network Policy to Restrict Pod AccessCheck if Pod-to-Pod Access is BlockedRestrict Ingress/Egress Traffic with Network PolicyVM Remote Access: Using MobaXterm or PuTTY for Secure ConnectionsDeploy a Virtual MachineAdd User and Setup SSH AuthenticationCreate SSH Key PairConvert Private Key to.
ppk FormatVM Access TroubleshootingDeploy Minikube on Virtual MachineInitialize Minikube ClusterSecure Deployment and Access of Nginx on KubernetesOverview of Securing Nginx with HTTPSDeploy and Expose a Nginx Pod to External TrafficAccess Nginx Web Server Through HTTPSet Up Nginx on Host Machine for Accessing Nginx PodAccess Nginx Web Server via Web Browser (HTTP Only)Implement HTTPS for Nginx in a K8s Cluster Using TLS CertificatesDeploy and Expose a Nginx Pod to External TrafficGenerate a self-signed TLS CertificateStore the TLS Certificate as a SecretCheck Minikube's Ingress Controller StatusCreate Ingress Resource for HTTPSLast Lecture.
Topics Covered
Course Details
View pricing and check out the reviews. See what other learners had to say about the course.
This course includes:
Not sure if this is right for you?
Browse More Systems & Infrastructure CoursesContinue Your Learning Journey
Explore more Systems & Infrastructure courses to deepen your skills and advance your expertise.