Additional Updates
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Kubernetes plugins enforcing API policies
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Linux security module for application access control.
Deploying Cloud Native Applications
Application Lifecycle Management
ArgoCD
Attach and detaching from containers
Audit Logs for Access Monitoring
Authentication and Authorization
Authentication Mechanisms
Authorization Mechanisms
Running containers in AWS
Being Cloud Native
Changing deprecated API versions
Cheatsheet: Kubernetes Commands
CIS Security Benchmarks
Being Cloud Native
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Cluster Maintenance
Defining default commands on containers
CNCF Projects
Storing non-sensitive data
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Container Best Practices
Container Metrics
Container Resource Requirements
Isolating containers for enhanced security
Container Security
Container Management Challenges
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Custom Kuberenetes resource types
Container Management Challenges
Dependencies in Docker Compose
Deployments
Disable open ports
Docker Architecture
Docker Cheatsheet
Managing multiple containers
Docker Compose Issues
Layers for containers
Networking for containers
Docker Objects
Running Docker on Windows
Where you store and share container images
Cluster of nodes working together
Enabling API versions
Environment Variables
Error Guides
Error: Failing to Delete CloudFormation Stack
etcd Default Server Port
Recommendations
Kubernetes visibility through Falco
GitOps Basics
Introduction to GitOps
Helm Chart and Templates
Helm Cheat Sheet
Helm Package Manager
Inputs and Port Mapping
Install Docker Compose
Install Docker Desktop
Install Docker on RHEL/CentOS
Install Docker on Ubuntu
Install Docker on WSL2 without Docker Desktop
Jobs and CronJobs
Kubeconfig File
Kubelet Security
Container Management Challenges
Kubernetes API Objects
Container Management Challenges
Kubernetes Ecosystem
Kubernetes in the Cloud
Kubernetes Ingress
Kubernetes Networking
Kubernetes Patterns for Application Developers
Services, ClusterIP, NodePort, and LoadBalancers
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Labels, Selectors, and Annotations
Least Privilege Principle
Limit Node Access
Leveraging linux features
The Linux kernel enhances resource management.
Linux Privilege Escalation
Container Logging
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Configuration file for resources
Best practices for securing container images
Minimize IAM Roles
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Multi-Stage Builds
Mutable and Immutable Infrastructure
Network Policy
Some of the scenario questions here are based on Kodekloud's CKA course labs.
nodeSelectors and nodeAffinity
Authenticating client and server communication
Enforcing policies across systems
Persisting Data
Container Management Challenges
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Container Management Challenges
Security rules for pod deployments
The building blocks of Kubernetes
Product is live. What's next?
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Pre-requisites for Container Labs
Probes and Multi-Container Pods
Kubectl Proxy and Port Forwarding
Remove Obsolete Packages and Services
ReplicaSets and Scaling
Restrict Kernel Modules
Restrict Network Access
Role-Based Access Control
Rollouts and Rollbacks
Detect security vulnerabilities in container images.
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Scheduling Pods
Filter system calls to enhance application security
Storing sensitive information
Securing Control Plane Communications with Ciphers
Securing the Docker Daemon
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Security Contexts
Security Primitives
Service Accounts
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Container Management Challenges
Sharing Data in Docker Compose
SSH Hardening
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Stateless and Stateful
Inspect container images for security issues.
Pods managed directly by the kubelet
Status Codes and Restart Policies
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Adding tags to container images
Influencing the scheduling of Pods
TLS Basics
TLS in Kubernetes
Tracing Linux Syscalls
Troubleshooting Basics
Uninstall Docker
Using Docker without Root Permission
Checking and enforcing policies with Admission Controllers
Volumes and StorageClass
Webhooks for validation and modification policies.
Docker containers
Limit image sources to trusted registries only.