PluralSight – Kubernetes for Developers Integrating Volumes and Using Multi container Pods

PluralSight – Kubernetes for Developers Integrating Volumes and Using Multi container Pods-BOOKWARE-KNiSO
English | Size: 239.47 MB
Category: Tutorial


Release Notes: This course teaches vital skills for deploying applications to Kubernetes in production environments. In this course, Kubernetes for Developers: Integrating Volumes and Using Multi-container Pods, you’ll gain the ability to deploy and secure complex real-world applications on Kubernetes. First, you’ll learn how to integrate production-grade external storage volumes into real-world Kubernetes clusters. Next, you’ll discover the major multi-container Pod Patterns and gain hands-on experience implementing them and learning how they can augment and productionise your Kubernetes applications. Finally, you’ll explore Kubernetes authentication and authorization, and learn how to use Service Accounts and RBAC to control access to the Kubernetes API from the applications running on your clusters. When you’re finished with this course, you’ll have the skills and knowledge needed to securely deploy more complex applications to Kubernetes. Software required: Access to a Kubernetes cluster (easy options include Docker Desktop or Minikube on your laptop, or any of the major hosted cloud Kubernetes services)

Cloud Academy – Implementing Multi Factor Authentication on Azure

Cloud Academy – Implementing Multi Factor Authentication on Azure-STM
English | Size: 549.74 MB
Category: Tutorial

Multi-factor authentication or MFA is no longer optional and it is paramount that you protect not only your privileged accounts but enable it for all accounts. Azure Active Directory offers the ability to secure your identities with an additional authentication method Verification of your identity can be done via an automated voice call, text message, through the Microsoft Authenticator app, or with a verification code Azure multi-factor authentication can be enforced using different methods. We will configure the user settings to give the ability to a user to report fraudulent attempts on their accounts. We will also review how an administrator can provide a one-time bypass code and whitelist trusted locations to bypass the two-step verification. Lastly, you will see how to configure Azure Active Directory conditional access to enforce MFA on cloud-based applications