Scogin Security Development
CtrlK
  • Welcome!
  • Collaborators
    • Meet the Team!
  • Cortex Xsoar-(Demisto)
    • Getting Started
  • AWS
    • Page 1
  • GCP
    • Certification Tracks
      • Security Engineer Practice Questions
      • GCP Security Practice Exam
    • Page
  • Offensive Security Tips and Tricks
    • Footprinting
      • DNS
      • Footprinting Cheat Sheet
      • Enumeration - What is going on in here?
      • Enumeration Principals
      • Enumeration Methodologies
      • Infrastructure Based Enumeration
      • FTP
      • SMB
      • NFS
    • Network Enumeration with Nmap
      • Nmap Cheat Sheet from HTB Academy
      • nmap - host and port scanning
      • nmap lab - host:port scanning - htb
      • nmap - Saving Results
      • nmap lab - saving results - htb
      • nmap - Service Enumeration
      • nmap lab - service enum - htb
      • nmap - Scripting Engine
      • nmap lab - scripting engine - htb
      • nmap - Setting the Performance
      • nmap - Evasion techniques
      • nmap - Evasion Lab - Easy - htb
      • nmap - Evasion Lab - Medium - htb
      • nmap - Evasion Lab - Hard - htb
  • K8s
    • CKAD Training
    • CKS Training
      • Locating K8s certifcates
      • Containers under the hood
      • Network Policies
    • EKS Cluster Games
      • Challenge 1: Secret Seeker
      • Challenge 2: Registry Hunt
      • Challenge 3: Image Inquisition
  • Defensive Security Tips and Tricks
    • Log Analysis Tooling
      • Brim (Zui)
      • Snort
      • Splunk
      • Wireshark Traffic Analysis
        • Nmap
        • ARP Poisoning/Spoofing
        • DHCP/NetBIOS/Kerberos
        • DNS/ICMP
        • FTP
        • HTTP
        • HTTPS
        • Hunting Clear Text Creds
        • Creating Security Rules (firewall)
      • Yara
      • Zeek
    • Windows
      • Forensics
        • THM Cheat Sheet - Windows Registry
        • Windows Registry
        • Data Acquisition
        • System Information and System Accounts
        • Files and Folders
        • Executions
        • External Devices/USB device forensics
        • Deleted Files and Data Recovery
        • Windows Prefetch files
        • File and Folder knowledge
      • Core Windows Processes
      • SysInternals
      • Event Logs
        • Event Codes
      • Sysmon
      • File Systems
        • Fat File Sysytems
        • NTFS
    • Endpoint Tools
      • Osquery
    • Linux
      • Forensics
        • Untitled
    • Forensics Tooling
      • Autopsy
      • Redline
  • LetsDefend
    • Incident Response Learning Path
      • Cyber Security Incident Handling Guide
      • Creating and Incident Response Plan
      • Incident Response Procedure
      • Answering the big Three
      • Incident Response on Windows
  • pwnedlabs-io
    • Identify the AWS Account ID from a Public S3 Bucket
  • TryHackMe
    • ItsyBitsy
    • Incident Handling with Splunk
  • Hack The Box
    • Incident Handling Process
      • Incident Handling
      • Cyber Kill Chain
      • Incident Handling Process Overview
      • Preparation Stage
      • Detection & Analysis Stage
      • Containment, Eradication, & Recovery Stage
      • Post-Incident Activity Stage
    • Security Monitoring & SIEM Fundamentals
      • SIEM Definition & Fundamentals
      • Introduction To The Elastic Stack
      • SOC Definition & Fundamentals
      • MITRE ATT&CK & Security Operations
      • SIEM Use Case Development
      • The Triaging Process
    • Windows Event Logs & Finding Evil
      • Windows Event Logs
      • Useful Windows Event Logs
      • Analyzing Evil With Sysmon & Event Logs
Powered by GitBook
On this page
  1. K8s

CKS Training

Locating K8s certifcatesContainers under the hoodNetwork Policies
PreviousCKAD TrainingNextLocating K8s certifcates