Discover what is in this course



Get more engaged with the Lightboard


Instead of relying on cold powerpoint slides, most of the concepts presented in this course are explained on the Lightboard.

The Lightboard makes it easy to explain while drawing on the Plexiglas and keeping an eye contact with learners.

This is really useful especially for visual learners.

Clean architecture diagrams


For professional engineers, nothing is compared to having a clean and detailed diagram showing all components of a system. This course provides dozens of diagrams.

Powerpoint slides ready to be reused with your customers


More than 300 slides are used in this intensive course. These slides are free to use and share within your community.


Get access to the source code and all scripts



In this course, there are more than 30 demonstrations. This means lots of code, config files and scripts. Don't worry. You will get them all organized by chapter.

Your trusted trainer is Houssem Dellai



This is not another course created by trainers who just reads the product documentation.

You are in the hands of a professional engineer and passionate content creator. Houssem Dellai is a Cloud Solution Architect working for Microsoft. He is a trusted advisor for dozens of customers running Kubernetes in production.

He enjoys sharing his professional experience on Youtube, Udemy, Microsoft official blog, conferences, webinars, etc. He was awarded Microsoft MVP for five years in a row thanks to his contributions in many opensource projects.

Why you need this course ?


You started your journey learning Kubernetes ?

You have been learning the fundamentals of a Kubernetes cluster ?

And now you want to make sure your cluster is production ready in terms of security ?

If you are looking for how to secure your Kubernetes cluster then this course is for you.

Let us face it, security is not an easy task. And Kubernetes is not an exception.

Securing a Kubernetes cluster requires thinking about all these aspects (among others):

  1. Network security: through private cluster access to API Server with Private Endpoint.
  2. Secure egress traffic: all egress traffic should be filtered using Firewall.
  3. Secure ingress traffic: using TLS and HTTPS on the ingress controller.
  4. Secure inter-pod communication: secure traffic between pods using TLS or mTLS.
  5. Controlling traffic between pods: using Network Policy tools like Calico.
  6. Securing access to Managed Identities: by restricting access to IMDS endpoint (169.254.169.254).
  7. Choosing the right network plugin: Kubenet vs Azure CNI vs Overlay mode
  8. And many more, to discover in this course!


The Curriculum for this course (12+ hours of content)




  Introduction to the course
Available in days
days after you enroll
  Introduction to Kubernetes
Available in days
days after you enroll
  Getting started with Kubernetes fundamentals
Available in days
days after you enroll
  AKS Networking Plugins
Available in days
days after you enroll
  Public and private clusters on Azure
Available in days
days after you enroll
  AKS Egress Traffic and Outbound Types
Available in days
days after you enroll
  Kubernetes Core DNS
Available in days
days after you enroll
  Kubernetes External DNS
Available in days
days after you enroll
  Kubernetes Network Policy: the in-cluster Firewall
Available in days
days after you enroll
  Securing access to cluster IMDS server (169.254.169.254)
Available in days
days after you enroll
  Exposing services through Ingress Controller
Available in days
days after you enroll
  HTTPS in Kubernetes for Ingress and Pods
Available in days
days after you enroll
  AKS Landing Zone
Available in days
days after you enroll
  Configuring private AKS network with Private Endpoint
Available in days
days after you enroll
  Karpenter for AKS
Available in days
days after you enroll
  Gateway API with Application Gateway for Containers
Available in days
days after you enroll
  Data persistence in Azure Disk
Available in days
days after you enroll
  Data persistence in Storage Account
Available in days
days after you enroll
  Backup for AKS cluster
Available in days
days after you enroll
  Securing Secrets using Secret Store CSI volume
Available in days
days after you enroll
  Scheduling Pods on Nodepools
Available in days
days after you enroll
  AKS versioning and upgrades
Available in days
days after you enroll
  Azure RBAC permissions for AKS
Available in days
days after you enroll
  Logging with Log Analytics
Available in days
days after you enroll
  Replacing Cluster Autoscaler with Karpenter
Available in days
days after you enroll

Choose a Pricing Option