Module 7: Security and RBAC
Kubernetes security principles and best practices Role-Based Access Control (RBAC)
Kubernetes security principles and best practices Role-Based Access Control (RBAC)
Managing application configurations with ConfigMaps Securing sensitive information with Secrets
Working with deployments and replica sets Rolling updates and rollbacks
Persistent volume concepts Storage classes and volume provisioning Configuring and
Service types and networking models Service discovery and load balancing
Creating and managing pods Configuring pod lifecycles Implementing pod scheduling
Kubernetes architecture and key components Deploying Kubernetes clusters Interacting with