This course will teach you to design, configure, and manage cluster security in Azure Kubernetes Service. Focusing on API server access, authentication, authorization, and network policies.
This course will teach you to design, configure, and manage cluster security in Azure Kubernetes Service. Focusing on API server access, authentication, authorization, and network policies.
Azure Kubernetes Services is a platform-as-a-service offering that provides you with a Kubernetes service in the Azure cloud. Like any other service, to operate it successfully you need to understand how to secure it. In this course, Securing Azure Kubernetes Service (AKS) Clusters, you will learn security concepts at the cluster, node, and network level to deploy production application services in AKS.
First, you’ll learn to configure secure access to AKS Cluster itself. Next, you’ll discover how to secure AKS worker nodes. Finally, you'll explore how to secure network traffic in your cluster. When you are finished with this course, you'll have the skills and knowledge of Azure Kubernetes Service clusters needed to build and deploy secure clusters in AKS.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.