Course Summary

The Certified Cloud-Native Security Expert (CCNSE) is a vendor-neutral cloud-native certification program in security. This Cloud-Native course covers topics in security such as Introduction to Cloud-Native Concepts and its Security, Containers, and Container Security, Introduction to Kubernetes, Hacking Kubernetes Cluster, Kubernetes Authentication and Authorization, Kubernetes Admission Controllers, Defending Kubernetes Cluster, Kubernetes Network Security, Kubernetes Data Security.

After the CCNSE Cloud-Native security training, you will be able to:

• Build a solid foundation that is required to understand the container and Kubernetes security landscape.
• Gain a practical understanding of how to hack misconfigured Kubernetes workloads.
• Learn and implement different ways of Authentication and Authorization methods used in Kubernetes.
• Experience Network security and Zero Trust in action using Network policies and Service Meshes.
• Gain the necessary skills to Defend Kubernetes cluster from most common attacks.

Module 1: Introduction to Cloud-Native Concepts and its Security
• Course Introduction (About the course, syllabus, and how to approach it)
• About Certification and how to approach it
• Lab Environment
• Lifetime course support (Mattermost)
• Overview of the Cloud Native Technologies
• The 4C’s of Cloud-Native Security
• Cloud
• Clusters
• Containers
• Code (SCA, SAST, DAST) – DevSecOps
• Security and Threat Model of Cloud-Native technologies
• Overview of Cloud Security
• Overview of Container Security (Container Vulnerability, Supply Chain Attack, Least Privilege)
• Overview of Kubernetes Security
• Overview of Microservices Security

Module 2: Introduction to Microservices Architecture
• The need for microservices
• Monolith vs Microservices
• Technical and Business pros and cons of Microservices
• Tools of the trade
• Source code management
• CI/CD tools
• Artefact management
• Cloud Platform
• Infrastructure as code
• Monitoring and logging tools
• Collaboration tools
• REST APIs
• What is an API
• API Security
• Introduction to OWASP API Top 10
• Software Component Analysis of API
• Static Application Security Testing of API
• Dynamic Application Security Testing of API

Module 3: Containers and Container Security
• What is a container?
• Container vs Virtualization
• Container Advantages
• Container Disadvantages
• Docker Architecture and its components
• Command Line Interface(CLI)
• Engine (Daemon, API)
• Runtime (containerd, shim, runc)
• Basics of container technology and its challenges
• Container fundamentals
• Namespaces
• Cgroup
• Capabilities
• Ways to interact with container ecosystem
• Container security issues
• Container Defenses

Module 4: Introduction to Kubernetes
• Introduction to Kubernetes
• Kubernetes Use Cases
• Kubernetes Architecture (Core Components)
• Cluster, Nodes, and Pods
• API Server
• Controller Manager
• Etcd
• kube-scheduler
• kubelet
• Kube-proxy
• Container Runtime
• Bootstrapping the Kubernetes cluster
• Kubernetes Package Manager
• Understanding Helm Workflow
• Creating Helm Charts

Module 5: Hacking Kubernetes Cluster
• Kubernetes Attack Surface and Threat Matrix
• Common Kubernetes security issues
• Differences in k8s installations (support for PSP vs no PSP)

Module 6: Kubernetes Authentication and Authorization
• Fundamentals of Kubernetes Authentication and Authorization
• Authentication mechanisms in Kubernetes
• Authentication with Client Certificates
• Authentication with Bearer Tokens
• HTTP Basic Authentication
• Remote Authentication
• Authorization mechanisms in Kubernetes
• Node Authorization
• Attribute Based Access Control (ABAC)
• Role-Based Access Control (RBAC)

Module 7: Kubernetes Admission Controllers
• Fundamentals of Admission Controllers
• Static Admission Controllers
• LimitRanger
• DefaultStorageClass
• AlwaysPullImages
• Dynamic Admission Controllers
• Introduction to Custom Admission Controllers
• Working with Custom Admission WebHooks
• Authenticating API Servers
• Open Policy Agent (OPA) and Rego Policies
• Using OPA with Kubernetes
• OPA Gatekeeper
• OPA Kube-mgmt vs OPA Gatekeeper
• Pod Security Context
• Pod Security Policies
• Pod Security Admission
• Pod Security Standards
• Policy Modes
• Applying Policies
• Different Options to Write Custom Policies for K8s

Module 8: Kubernetes Data Security
• Kubernetes Data Storage mechanisms
• Image Layers
• Container Mounts and Volumes
• Distributed Volumes in Kubernetes
• Persistent Volumes on Cloud
• Dynamically Provisioning Cloud Storage for Workloads
• Managing secrets in traditional infrastructure
• Managing secrets in containers at Scale
• Exploring Secret Storage Options
• Kubernetes Secrets Object
• Encrypted Configurations
• Managing Encryption Keys in External KMS
• Encrypting Secret Objects in Version Control Systems
• Mozilla SOPS for Secret OPerationS
• Introducing Secrets Store CSI Drivers
• Environment Variables and Volume Mounts
• Injecting Secrets with Hashicorp Vault
• Scanning for Secrets Exposure

Module 9: Kubernetes Network Security
• Introduction to Kubernetes Networking
• Kubernetes Networking Architecture
• Challenges with Kubernetes Networking
• Network Policies in Kubernetes
• Network Policy and Its Characteristics
• Anatomy of a Network Policy
• Fallacies of Distributed Computing
• Service Mesh Architecture
• Exploring Linkerd
• Zero Trust with Consul Connect
• Service Identities with Istio

Module 10: Defending Kubernetes Cluster
• Compliance and Governance
• Kubernetes Compliance with Kubebench
• Kubernetes Compliance with Inspec
• Threat Modeling for Kubernetes
• Static Analysis of Kubernetes clusters
• Building Secure Container Images
• Dynamic and Runtime Security Analysis
• Security Monitoring

You should have knowledge of running basic Linux commands like ls, cd, mkdir, etc., Basic knowledge in container technology and k8s helps but is needed. Understanding of OWASP Top 10 vulnerabilities

Certified Cloud Native Security Expert Exam Duration: 6 hours Exam type: Practical/labs Number of tasks: 5 Passing score: 80%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?