Essentials of Kubernetes: Mastery
RCCE students will learn Kubernetes container orchestration security including cluster hardening, pod security policies/standards, RBAC configuration, network policies, secrets management, admission controllers, and runtime security monitoring. RCCE students will learn to secure Kubernetes clusters from deployment through runtime, configure role-based access control for cluster resources, implement pod security standards to restrict container capabilities, write network policies for micro-segmentation, manage secrets securely within clusters, deploy admission controllers to enforce security policies, scan container images for vulnerabilities, and monitor cluster activity for suspicious behavior. This essentials course covers the core knowledge needed to operate competently in this domain. Starting from foundational concepts, RCCE students will learn the fundamental concepts, terminology, risks, and defenses that form the foundation for all further study and professional practice. Students build a solid knowledge base that prepares them for more advanced courses and real-world security responsibilities.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Essentials of Kubernetes: Mastery
- Execute hands-on tasks for advanced cyber defense mastery
- Explain Executive Overview fundamentals
- Explain Kubernetes Architecture Overview fundamentals
- Execute hands-on tasks for control plane
- Execute hands-on tasks for worker nodes
- Execute hands-on tasks for kubernetes threat landscape
- Execute hands-on tasks for threat vector
- Execute hands-on tasks for risk level
- Execute hands-on tasks for container escape
- Execute hands-on tasks for unscanned images
- Execute hands-on tasks for cluster hardening fundamentals
- Execute hands-on tasks for hardening checklist
| Module 01 | Advanced Cyber Defense Mastery |
| Module 02 | Executive Overview |
| Module 03 | Kubernetes Architecture Overview |
| Module 04 | Control Plane |
| Module 05 | Worker Nodes |
| Module 06 | Kubernetes Threat Landscape |
| Module 07 | Threat Vector |
| Module 08 | Risk Level |
| Module 09 | Container Escape |
| Module 10 | Unscanned Images |
| Module 11 | Cluster Hardening Fundamentals |
| Module 12 | Hardening Checklist |
| Module 13 | Role-Based Access Control (RBAC) |
| Module 14 | Resource Access |
All hands-on labs run on Rocheston Rose X OS. Students practice essentials of kubernetes: mastery by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for advanced cyber defense mastery
- Lab 2: Explain Executive Overview fundamentals
- Lab 3: Explain Kubernetes Architecture Overview fundamentals
- Lab 4: Execute hands-on tasks for control plane
- Lab 5: Execute hands-on tasks for worker nodes
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Essentials of Kubernetes: Mastery, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI