PART I: Introduction to Kubernetes
Chapter 02: Container and Docker Review
Chapter 03: Kubernetes History and Architecture
Chapter 04: Running Workloads Imperatively
Chapter 05: The Declarative Model
Chapter 06: Persisting Data
PART II: Kubernetes Hardening
Chapter 08: General Hardening
Chapter 10: Audit IaC Code
Chapter 11: Kubernetes API Hardening
Chapter 12: SecurityContext Hardening
Chapter 13: Kubernetes Network Policies
Chapter 14: Audit Logging and Threat Detection
Chapter 15: Best Practices
PART II: Kubernetes Hardening
Chapter 16: From the Outside
Chapter 17: From inside a Pod
Chapter 18: Kubernetes Post-Explotation
Chapter 19: Kubernetes Post-Explotation Part 2