Amazon EKS Security and Networking Masterclass
What you’ll learn
Calico and AWS CNI Plugins
Calico Network Policies
CIS Benchmarks and kube-bench
IAM Authentication with OIDC
Private API Endpoint
Pod Security Policies
Vulnerability Scanning
Private Networking
Requirements
Basic understanding of Amazon EKS
A valid AWS account
Description
Welcome to Amazon EKS Security and Networking Masterclass course.This course is completely focused on Amazon EKS Security. You will learn various security best practices based on CIS Benchmarks for Amazon EKS v1.0.0You will move one step ahead in the game after learning all Amazon EKS security implementations.In this masterclass, you will learn how toProvision EKS using eksctl in private subnetsConfigure IAM Role with Service Accounts using OIDCSecure EKS API Endpoint AccessDeploy Calico Network PoliciesPod Networking with AWS CNIPod Networking with Calico CNIEncrypt EKS Secrets using Customer Managed KMS KeyImplement Pod Security PoliciesECR Private Endpoint AccessVulnerability Scanning of Docker ImagesUnderstand CIS BenchmarksDeploy kube-bench utilityEKS Audit LogsThis course enables you to create EKS clusters and implement security best practices.P.S. – This course does not cover Amazon EKS basics. You can (optionally) checkout my other course called ‘Kubernetes on AWS using Amazon EKS’ to learn EKS basics.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Download Resources
Section 2: Provision EKS Cluster and Workspace
Lecture 3 Create EKS Cluster using eksctl
Lecture 4 Setup client workspace using Cloud9
Section 3: Identity & Access Management
Lecture 5 Use IAM Role with Service Account
Section 4: EKS Network Security
Lecture 6 Private API Endpoint Access
Lecture 7 Calico Network Policies
Lecture 8 Pod Networking with AWS VPC CNI
Lecture 9 Pod Networking with Calico CNI
Section 5: Securing Cluster Resources
Lecture 10 Envelope Encryption for Secrets
Lecture 11 Pod Security Policy (PSP)
Section 6: CIS Benchmark & Vulnerability Management
Lecture 12 ECR using VPC Private Endpoints
Lecture 13 CIS Benchmarks and kube-bench
Section 7: Detective Controls
Lecture 14 EKS Control Plane Logging
Section 8: Summary
Lecture 15 Recap
Amazon EKS users who want to enhance cluster security,AWS DevOps Engineers and Architects,Anyone who wants to learn and configure secure EKS clusters
Course Information:
Udemy | English | 2h 30m | 657.25 MB
Created by: Karan Brar
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com