Skip to main content

CKS vs CKA vs CKAD

Side-by-side comparison of the three CNCF Kubernetes certifications — who they are for, what is on them, the prerequisite chain, and which order to take them in.

Last reviewed:

The Short Answer

  • CKAD — Certified Kubernetes Application Developer. For developers shipping workloads onto a Kubernetes cluster they do not operate.
  • CKA — Certified Kubernetes Administrator. For operators and platform engineers who install, upgrade, and run clusters.
  • CKS — Certified Kubernetes Security Specialist. For security engineers and platform engineers focused on hardening Kubernetes workloads, infrastructure, and supply chain. Requires an active CKA.

Default cert path for security/platform engineers: skip CKAD, take CKA, then CKS. CKAD does not unlock anything CKA does not, and it is not a prerequisite for either of the other two.

Comparison at a Glance

AttributeCKADCKACKS
Full nameCertified Kubernetes Application DeveloperCertified Kubernetes AdministratorCertified Kubernetes Security Specialist
AudienceApp developers shipping to KubernetesCluster operators, platform engineersSecurity engineers, platform engineers
PrerequisiteNoneNoneActive CKA
FormatPerformance-based, hands-onPerformance-based, hands-onPerformance-based, hands-on
Duration2 hours2 hours2 hours
Tasks~15–20~15–20~15–20
Pass score66%66%67%
Validity2 years2 years2 years
Free retakeYes (within 12 months)Yes (within 12 months)Yes (within 12 months)
DeliveryOnline, proctored (PSI)Online, proctored (PSI)Online, proctored (PSI)

For current pricing on each, check the official Linux Foundation pages — CKAD, CKA, CKS. Bundles and storewide promotions (Black Friday, KubeCon, CKS Day) are often the cheapest path.

What Each Exam Covers

CKAD — Application Developer

Five domains, focused on building and deploying cloud-native applications onto Kubernetes:

DomainWeight
Application Design and Build20%
Application Deployment20%
Application Observability and Maintenance15%
Application Environment, Configuration, and Security25%
Services and Networking20%

CKA — Administrator

Five domains, focused on cluster operations:

DomainWeight
Storage10%
Troubleshooting30%
Workloads and Scheduling15%
Cluster Architecture, Installation, and Configuration25%
Services and Networking20%

CKS — Security Specialist

Six domains, focused on securing clusters and workloads:

DomainWeightWhere to study
Cluster Setup15%Cluster Setup & Hardening
Cluster Hardening15%Cluster Setup & Hardening
System Hardening10%System Hardening
Minimize Microservice Vulnerabilities20%Microservice Security
Supply Chain Security20%Supply Chain Security
Monitoring, Logging & Runtime Security20%Monitoring, Logging, Runtime Security

How They Overlap

There is no overlap between CKS and CKAD beyond very basic kubectl usage — they target different roles. CKS depends heavily on CKA-level operational knowledge: kubeadm, etcd, scheduler flags, kubectl debugging, NetworkPolicy. Treat CKA as the foundation that CKS layers security on top of.

TopicCKADCKACKS
Kubernetes architecture & kubeadmRequiredAssumed (from CKA)
Pod, Deployment, Service basicsDeepOperationalAssumed
RBAC and ServiceAccountsUse existingConfigureAudit, harden, scope
NetworkPolicyApplyConfigureDefault-deny + targeted allow
Pod Security AdmissionAware ofConfigureEnforce / audit profile
etcd, audit logging, KMS encryptionOperationalHardening focus
Image scanning & signingTrivy, Cosign, admission verify
Runtime detection (Falco, Tetragon)Configure and write rules
seccomp, AppArmor, capabilitiesAware ofAware ofConfigure per workload

Which to Take First

If you are an application developer

Start with CKAD. It validates the part of the platform you actually use — Pod specs, ConfigMaps, Services, probes, Jobs. CKA is useful later if you want to move toward platform engineering, but not required for most app-dev roles.

If you are a platform / cluster operator

Start with CKA. Skip CKAD — it does not unlock anything CKA does not. Once CKA is active, decide whether security is core to your role; if it is, CKS is the natural next step.

If you are a security engineer

Take CKA → CKS. CKA is mandatory as a registration prerequisite for CKS, and the operational knowledge it builds — kubeadm, etcd, scheduler internals, debugging — is assumed throughout the CKS exam. Skip CKAD unless you also write application code on Kubernetes.

If you want all three

The most efficient order is CKAD → CKA → CKS, but CKA → CKAD → CKS is also fine. The only fixed dependency is CKA before CKS. Some organisations recognise the "Kubernetes Triple Crown" of holding all three; the value to you personally depends on whether each cert maps to current or near-term work.

Difficulty Comparison

All three exams use the same hands-on, performance-based format with the same duration and roughly the same task count. Practical difficulty differs based on scope:

  • CKAD — Manageable scope (5 domains tied to a small set of resources). Speed matters more than depth; people who know kubectl well usually pass.
  • CKA — Wider scope. Troubleshooting alone is 30% of the exam, which rewards experience working with broken clusters.
  • CKS — Hardest. Six domains, each with its own tooling (Trivy, Cosign, Falco, kube-bench, OPA/Kyverno). Requires both CKA-level operational fluency and security-specific depth, plus a higher pass score (67% vs 66%).

Cost Strategy Across Three Certs

  • Wait for storewide promotions (Black Friday / Cyber Monday / KubeCon / CKS Day). Discounts of 30–50% are common.
  • Bundle the cert with the official Kubernetes Fundamentals (LFS258) or Security Essentials (LFS260) course when bundle pricing is available.
  • Ask your employer for training-budget reimbursement — most engineering organisations cover Linux Foundation certs.
  • Avoid third-party voucher resellers. Codes there are often expired, region-locked, or already redeemed.

Resources on This Site

Decided on CKS? Start with the exam guide and study plan.

Open the CKS Exam GuideStudy Plan