Home > Store

Certified Kubernetes Security Specialist (CKS) (Video Course)

Register your product to gain access to bonus material or receive a coupon.

Certified Kubernetes Security Specialist (CKS) (Video Course)

Online Video

Description

  • Copyright 2025
  • Edition: 1st
  • Online Video
  • ISBN-10: 0-13-829647-2
  • ISBN-13: 978-0-13-829647-6

21+ Hours of Video Training

Master essential Kubernetes security concepts for the CKS exam through hands-on demos, real-world scenarios, and expert insights.

  • Prepare to pass the Certified Kubernetes Security Specialist (CKS) exam
  • Set up a Kubernetes cluster using secure practices
  • Apply security controls to service accounts
  • Protect node meta-data and endpoints

Get ready for the Certified Kubernetes Security Specialist (CKS) exam! In this video training course, author and trainer Chris Jackson will provide in depth discussion of exam concepts, objectives, and demonstrate key topics so you get the edge you need to successfully study for and pass the test. This 21-hour course follows the CKS blueprint domains and includes not only demonstrations of the technology throughout but also hands-exercises so you can practice and apply the skills. These hands-on exercises were built in a similar fashion to the actual exam so you can feel confident on test day.

CKS is a performance-based test that requires candidates to solve multiple tasks from a command line running Kubernetes. Chris Jackson has designed this class to walk you through Kubernetes topics like secure cluster setup, role-based access control, API security, system hardening, and network security. To further increase your practical skills, you will learn how to build your own Kubernetes lab for further study and discovery as you continue your journey. With an easy to understand and engaging style this video series can be your complete path to preparation and success achieving CKS certification.

Skill Level:

  • Intermediate

Course requirement:

  • A working knowledge of Linux
  • A working understanding of containers and their management
  • Kubernetes experience and foundational knowledge (CKA equivalent knowledge level)
  • For certification, you must have passed CKA exam prior to CKS

About Pearson Video Training:              

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at  http://www.informit.com/video.

Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.

Sample Content

Table of Contents

Module 1: Preparing for the CKS Exam

Lesson 1: Getting CKS Certified

Lesson 2: Building Your K8s Home Lab

Lesson 3: Kubernetes Security Foundation

Module 2: Kubernetes Cluster Setup

Lesson 4: Network Security Policies

Lesson 5: CIS Benchmark Review of Kubernetes Components                  

Lesson 6: Properly Setup Ingress with TLS

Lesson 7: Protect Node Metadata and Endpoints

Lesson 8: Kubernetes Dashboard Security

Lesson 9: Verify Platform Binaries Before Deploying

Module 3: Cluster Hardening

Lesson 10: Restrict Access to Kubernetes API

Lesson 11: Role Based Access Control (RBAC)

Lesson 12: Protecting Service Accounts

Lesson 13: Upgrade Kubernetes to Avoid Vulnerabilities

Module 4: System Hardening

Lesson 14: Minimize Host OS Footprint

Lesson 15: Minimize External Access to the Network

Lesson 16: Kernel Hardening

Lesson 17: Use Least Privilege IAM

Module 5: Minimize Microservice Vulnerabilities

Lesson 18: Use Appropriate Pod Security Standards

Lesson 19: Managing Kubernetes Secrets

Lesson 20: Implement Container Isolation Techniques

Lesson 21: Implement Pod-to-Pod Encryption with Cilium

Module 6: Software Supply Chain Security

Lesson 22: Secure Your Software Supply Chain

Lesson 23: Static Analysis of Workloads and Containers

Lesson 24: Minimize Base Image Footprint

Lesson 25: Scan Images for Known Vulnerabilities

Module 7: Monitoring, Logging, and Runtime Security

Lesson 26: Ensure Immutability of Containers at Runtime

Lesson 27: Use Kubernetes Audit Logs to Monitor Access

Lesson 28: Detect Malicious Activity, Threats, and Attacks

Lesson 29: Investigate and Identify Signs of Compromise

Module 8: Exam Practice Scenarios

Lesson 30: CKS Practice Exam 1

Lesson 31: CKS Practice Exam 2

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.