Certified Kubernetes Security Specialist (CKS) Training

Level

Advanced

Duration

28h / 4 days

Date

Individually arranged

Price

Individually arranged

Certified Kubernetes Security Specialist (CKS) Training

This training prepares participants for the Certified Kubernetes Security Specialist (CKS) exam. It is an advanced course that provides in-depth knowledge of Kubernetes security. After completing the training, participants will be able to independently design and manage components responsible for security in Kubernetes.

What You Will Learn

  • During the CKS training, participants will gain knowledge and skills related to ensuring security in Kubernetes clusters, including access control configuration, monitoring, certificate management, auditing and risk assessment, as well as troubleshooting security-related issues in containerized environments.
Who is this training for?
  • logo infoshare The CKS training is intended for IT specialists, security administrators, and engineers who want to gain advanced knowledge of security in Kubernetes environments.

Training Program

  1. Cluster Configuration

  • Applying network security policies to restrict cluster-level access
  • Using CIS benchmarks to review Kubernetes component security (etcd, kubelet, kube-dns, kube-apiserver)
  • Proper configuration of Ingress objects with security controls
  • Protecting node metadata and endpoints
  • Minimizing GUI use and access
  • Verifying Kubernetes binaries before deployment
  1. Cluster Hardening

  • Restricting access to the Kubernetes API
  • Using Role-Based Access Control (RBAC) to minimize exposure
  • Avoiding excessive use of ServiceAccounts (disabling defaults, minimizing permissions for new accounts)
  • Regular Kubernetes upgrades
  1. System Hardening

  • Minimizing the host OS footprint (reducing attack surface)
  • Reducing IAM roles
  • Minimizing external network exposure
  • Using kernel hardening tools such as AppArmor and seccomp
  1. Minimizing Microservice Vulnerabilities

  • Setting appropriate OS-level security domains
  • Managing Kubernetes Secrets
  • Using container runtime sandboxes in multi-tenant environments (e.g., gVisor, Kata Containers)
  • Enabling pod-to-pod encryption with mTLS
  1. Supply Chain Security

  • Minimizing base image size
  • Securing the supply chain: approved registries, image signing and validation
  • Performing static analysis of user resources (e.g., Kubernetes manifests, Dockerfiles)
  • Scanning images for known vulnerabilities
  1. Monitoring, Logging, and Runtime Security

  • Analyzing syscalls, processes, and file activity at the host and container level to detect malicious behavior
  • Detecting threats across physical infrastructure, applications, networks, data, users, and workloads
  • Identifying all phases of an attack, regardless of origin or spread
  • Performing deep forensic investigations and identifying attackers in the environment
  • Ensuring container immutability in real time
  • Using audit logs to monitor access

Contact us

we will organize training for you tailored to your needs

Przemysław Wołosz

Key Account Manager

przemyslaw.wolosz@infoShareAcademy.com

    The controller of your personal data is InfoShare Academy Sp. z o.o. with its registered office in Gdańsk, al. Grunwaldzka 427B, 80-309 Gdańsk, KRS: 0000531749, NIP: 5842742121. Personal data are processed in accordance with information clause.