Skip to main content

CKS Study Plan

Three sequenced roadmaps — 30, 60, or 90 days — for preparing for the Certified Kubernetes Security Specialist exam. Each block names the domain, the practical work, and the articles on this site to read.

Last reviewed:

Pick the Right Plan

Match the plan to how much time per day you can realistically commit.

PlanDaily commitmentBest for
30-day2–3 hours/day, including weekendsExisting CKA holders comfortable with kubectl, NetworkPolicy, and RBAC; need a focused security cram
60-day1–1.5 hours/dayRecommended default — works alongside a full-time job and leaves time for hands-on lab work
90-day45–60 minutes/dayNewer to security primitives; want time to build labs, read official docs, and absorb the supply-chain stack

Active CKA is required. If you do not yet hold the CKA, pass it first — it is a registration prerequisite for the CKS. See the CKS vs CKA vs CKAD comparison.

Lab Setup — Do This Once Before Day 1

  • Spin up a local multi-node cluster — kind, k3d, or minikube with at least one worker. The exam environment uses real nodes, so a single-node setup is not enough for NetworkPolicy and PSA practice.
  • Install kubectl, kube-bench, Trivy, Falco, and Cosign. You will use all of them in the exam.
  • Configure shell aliases up front: alias k=kubectl, source <(kubectl completion bash), and a --dry-run=client -o yaml snippet for fast manifest generation.
  • Bookmark the kubernetes.io documentation pages for NetworkPolicy, Pod Security Admission, RBAC, AuditPolicy, RuntimeClass, ServiceAccount, and ImagePolicyWebhook — these are the most often-referenced during the exam.

30-Day Plan (Intensive)

Week 1 — Cluster Setup & Hardening (Domains 1, 2)

Day 1–2: Foundations and CIS

Day 3–4: API server and admission control

Day 5–6: NetworkPolicy

Day 7: RBAC and ServiceAccounts

Week 2 — Pod Security & System Hardening (Domain 3 + Pod Security)

Day 8–9: Pod Security Admission

Day 10–11: Linux capabilities and seccomp

Day 12: AppArmor

Day 13–14: Sandboxing and host hardening

Week 3 — Microservice & Supply Chain (Domains 4, 5)

Day 15–16: Image hardening

Day 17–18: Vulnerability scanning

Day 19–20: SBOM and signing

Day 21: Admission verification

  • Wire Cosign verification through Kyverno verifyImages and block an unsigned image

Week 4 — Runtime, Audit & Final Drills (Domain 6)

Day 22–23: Audit logging

Day 24–25: Runtime detection

  • Falco — install, write a custom rule, trigger an alert
  • Tetragon — read at minimum

Day 26–27: Secrets and etcd

Day 28–30: Final drills

60-Day Plan (Recommended)

Same six domains, with breathing room. Each week below covers half what the 30-day plan covers in one week — leaving time for lab work, recap, and kubernetes.io reading.

WeekFocusOutcome
1Fundamentals — auth, RBAC, admission lifecycleMental model of every API request path
2Cluster Setup — CIS, kube-bench, API server flagskube-bench score above 80% on a fresh cluster
3NetworkPolicy + CNI choiceDefault-deny applied across two namespaces
4RBAC + ServiceAccount hardeningClusterRole with no wildcards; SA token automount disabled by default
5Pod Security Admission + capabilitiesRestricted profile applied to dev / prod namespaces; capabilities dropped
6System Hardening — seccomp, AppArmor, sandboxingCustom AppArmor profile loaded; seccomp RuntimeDefault verified
7Microservice + image hardeningDistroless image with non-root + read-only root FS
8Supply chain — Trivy, Syft, CosignSBOM + signed image + admission verification
9Audit logging + FalcoCustom audit policy + custom Falco rule
10Secrets, etcd, KMS v2Encryption at rest verified; rotated KEK
11Practice questions + targeted weak-spot reviewScore above 80% on the practice set
12Mock exam under 2-hour timer + cheat-sheet rehearsalConfident on every domain; sit the exam

90-Day Plan (Thorough)

Cover the same material but with one month per domain group, which gives time to read official kubernetes.io docs in depth and build small projects rather than just running through tutorials.

Month 1 — Foundations & Cluster Hardening

  • Fundamentals — full section, two passes (week 1 and week 4)
  • Cluster Setup & Hardening — every subsection: CIS, API server, control plane, network, node, pod, RBAC, secrets, configuration validation
  • Project: deploy a hardened kubeadm cluster, score it with kube-bench, document each finding and fix

Month 2 — System Hardening, Microservice, Supply Chain

  • System Hardening — capabilities, seccomp, AppArmor, sandboxing, sysctls
  • Microservice security — base images, SAST, SCA, secret handling
  • Supply chain — SBOM with Syft, scanning with Trivy, signing with Cosign, admission verification with Kyverno
  • Project: CI pipeline that builds a distroless image, emits an SBOM, signs with Cosign, and is verified at admission by Kyverno

Month 3 — Runtime, Drilling, Mock Exams

Day-Before Checklist

  • Run the official PSI compatibility check on the same machine and network you will use during the exam.
  • Re-read the cheat sheet end to end. Practice typing the NetworkPolicy and seccomp YAML skeletons from memory.
  • Verify your photo ID, charge your laptop, and clear the desk and walls of any notes, monitors, or paper.
  • Rehearse your shell setup: aliases, kubectl completion, and --dry-run=client -o yaml snippets.
  • Sleep. Hydration matters more than one extra hour of revision.

Print the cheat sheet and start drilling questions.

Open the CKS Cheat SheetPractice Questions