Cloud Native Kubernetes Certifications
Explore all the Kubernetes certifications to become a Kubestronaut.
Cloud Native Kubernetes Certifications
Cloud Native Kubernetes Certifications
1. Kubernetes and Cloud Native Associate (KCNA)
Focus: Foundational knowledge of Kubernetes and cloud-native technologies.Curriculum: KCNA CurriculumDomains and Competencies:
| Domain | Weight |
|---|---|
| Kubernetes Fundamentals | 46% |
| Container Orchestration | 22% |
| Cloud Native Architecture | 16% |
| Cloud Native Observability | 8% |
| Cloud Native Application Delivery | 8% |
2. Kubernetes and Cloud Security Associate (KCSA)
Focus: Foundational security knowledge for Kubernetes and cloud-native environments.Curriculum: KCSA CurriculumDomains and Competencies:
| Domain | Weight |
|---|---|
| Overview of Cloud Native Security | 14% |
| Kubernetes Cluster Component Security | 22% |
| Kubernetes Security Fundamentals | 22% |
| Kubernetes Threat Model | 16% |
| Platform Security | 16% |
| Compliance and Security Frameworks | 10% |
3. Certified Kubernetes Administrator (CKA)
Focus: Kubernetes cluster administration, troubleshooting, and configuration.Curriculum: CKA CurriculumDomains and Competencies:
| Domain | Weight |
|---|---|
| Cluster Architecture, Installation & Configuration | 25% |
| Workloads & Scheduling | 15% |
| Services & Networking | 20% |
| Storage | 10% |
| Troubleshooting | 30% |
4. Certified Kubernetes Application Developer (CKAD)
Focus: Building, deploying, and configuring Kubernetes applications.Curriculum: CKAD CurriculumDomains and Competencies:
| Domain | Weight |
|---|---|
| Application Design and Build | 20% |
| Application Deployment | 20% |
| Application Observability and Maintenance | 15% |
| Application Environment, Configuration and Security | 25% |
| Services and Networking | 20% |
5. Certified Kubernetes Security Specialist (CKS)
Focus: Security best practices for Kubernetes.Curriculum: CKS CurriculumDomains and Competencies:
| Domain | Weight |
|---|---|
| Cluster Setup | 10% |
| Cluster Hardening | 15% |
| System Hardening | 15% |
| Minimize Microservice Vulnerabilities | 20% |
| Supply Chain Security | 20% |
| Monitoring, Logging, and Runtime Security | 20% |
This post is licensed under CC BY 4.0 by the author.
