Skip to main content
Back to top
Ctrl
+
K
Search
Ctrl
+
K
👨🎓 Certifications
📓 Awk
📑 Getting Started with awk
📑 Running awk and gawk
📑 Regular Expressions
📑 Reading Input Files
📑 Printing Output
📑 Expressions
📑 Patterns, Actions, and Variables
📑 Arrays in awk
📑 Functions
♥️ Awk is awesome
📓 CKA
🔖 Cluster Architecture Installation and Configuration
🏷️ Prepare underlying infrastructure for installing a Kubernetes cluster
🏷️ Create and manage Kubernetes clusters using
kubeadm
🏷️ Manage the lifecycle of Kubernetes clusters
🏷️ Understand extension interfaces (CNI, CSI, CRI, etc…)
🏷️ Use Helm and Kustomize to install cluster components
🏷️ Manage role based access control (RBAC)
🏷️ Implement and configure a highly-available control plane
🏷️ Understand CRDs, install and configure operators
🔖 Servicing and Networking
🏷️ Use ClusterIP, NodePort, LoadBalancer service types and endpoints
🏷️ Understand connectivity between Pods
🏷️ Understand and use CoreDNS
🏷️ Know how to use
Ingress
controllers and
Ingress
resources
🏷️ Use the Gateway API to manage Ingress traffic
🏷️ Define and enforce Network Policies
🔖 Storage
🏷️ Configure volume types, access modes and reclaim policies
🏷️ Manage persistent volumes and persistent volume claims
🏷️ Implement storage classes and dynamic volume provisioning
🔖 Workloads and Scheduling
🏷️ Understand application deployments and how to perform rolling update and rollbacks
🏷️ Use ConfigMaps and Secrets to configure applications
🏷️ Configure Pod admission and scheduling (limits, node affinity, etc.)
🏷️ Understand the primitives used to create robust, self-healing, application deployments
🏷️ Configure workload autoscaling
🔖 Troubleshooting
🏷️ Troubleshoot cluster and nodes
🏷️ Troubleshoot cluster component
🏷️ Monitor cluster and application resource usage
🏷️ Manage and evaluate container output streams
🏷️ Troubleshoot services and networking
📓 CKS
🔖 Cluster Setup
🏷️ Use Network security policies to restrict cluster level access
🏷️ Use CIS benchmark to review the security configuration
🏷️ Properly set up Ingress objects with TLS
🏷️ Protect node metadata and endpoints
🏷️ Verify platform binaries before deploying
🔖 Cluster Hardenning
🏷️ Use Role Based Access Controls to minimize exposure
🏷️ Exercise caution in using service accounts
🏷️ Restrict access to Kubernetes API
🏷️ Upgrade Kubernetes to avoid vulnerabilities
🔖 System Hardenning
🏷️ Minimize host OS footprint (reduce attack surface)
🏷️ Using least-privilege identity and access management
🏷️ Minimize external access to the network
🏷️ Appropriately use kernel hardening tools such as AppArmor, seccomp
🔖 Minimize Microservice Vulnerabilities
🏷️ Use appropriate pod security standards
🏷️ Manage kubernetes secrets
🏷️ Understand and implement isolation techniques
🏷️ Implement Pod-to-Pod encryption
🔖 Supply Chain Security
🏷️ Minimize base image footprint
🏷️ Understand your supply chain
🏷️ Secure your supply chain
🏷️ Perform static analysis of user workloads and container images
🔖 Monitoring, Logging and Runtime Security
🏷️ Perform behavioral analytics to detect malicious activities
🏷️ Detect threats within physical infrastructure, apps, networks, data, users and workloads
🏷️ Investigate and identify phases of attack and bad actors within the environment
🏷️ Ensure immutability of containers at runtime
🏷️ Use Kubernetes audit logs to monitor access
📓 Desktop
🎮 Batocera
📘 Byobu
📘 Csh History
📘 Ditaa
📘 Fedora Workstation
📘 GNOME
📘 LUKS
📘 SELinux
📘 Passwd Recovery
📘 Vim
📘 Zsh
📓 Network
📙 Ipset
📙 Nftables
📙 OPNSense
📙 OSI Model
📓 System
📗 Ansible from scratch
📗 ArgoCD
📗 Argo Workflows
📗 Apache Cassandra
📗 Apache Tomcat
📗 Docker
📗 Forgejo
📗 Let’s Encrypt
📗 MySQL Replication
📗 Nginx
📗 PostgreSQL
📗 Systemd
📗 Terraform
.md
.pdf
🏷️ Configure workload autoscaling
🏷️ Configure workload autoscaling
#