Advanced
Container and Kubernetes Hardening
Lock down namespaces, admission policies, and supply chain hooks without freezing developer velocity.
Overview
You work through KIND clusters mirroring common misconfigurations in EKS and GKE footprints used by Byteon cohorts. Includes policy-as-code snippets and bilingual runbooks for handoffs to ops.
Duration: 6 weeks · 40 hours · Format: Cohort + labs · Language: English · Certificate: Included
Price (informational): ¥138,000
What is included
- Kyverno and OPA Gatekeeper starter packs
- SBOM ingestion lab using Syft output
- NetworkPolicy exercises with service mesh edge cases
- Incident tabletop for compromised kubeconfig
- Checklist for JP data residency annotations
Outcomes
- Ship a namespace baseline PR your cluster admins accept
- Automate image signature verification in CI
- Document blast-radius assumptions per workload
Lead mentor
Priya Natarajan
SRE lead who pairs with security teams on progressive delivery guardrails.
FAQ
No — local KIND clusters suffice; optional cloud credits are not provided.
Experience notes
Admission policy lab mirrored our staging mistakes — the diff against our live repo was uncomfortably accurate.
Satoshi · Platform engineer · Trustpilot