Introduction to Kubernetes Containerization


Real Class Example

Introduction to Kubernetes Containerization

This online instructor led training course provides the knowledge and skills to utilize Kubernetes, a product used to operate containerized applications at scale in the data-center. In this course students will learn key topics including the Kubernetes API, Cluster architecture, scheduling pods, daemon sets, pod and service networking, persisent volumes, security primitives, troubleshooting, and more.


Jeff Grunewald
Certified Kubernetes Administrator (CKA) and AWS Certified Cloud Practitioner

Course Information

Skills Learned

After completing this course, students will have a better understanding of:

  • What Kubernetes is and what its used for
  • Key Kubernetes concepts, including the Kubernetes API, cluster architecture, and more
  • How to install, configure, and validate Kubernetes clusters
  • Scheduling pods
  • Daemon sets
  • Resource limitation
  • Pod and service networking
  • Persistent and creating volumes
  • Security primitives
  • Authentication and authorization
  • Logging and monitoring applications and cluster components
  • Troubleshooting applications, the control plane, the worker node, and the network

Who Should Attend This Course

This course is intended for professionals who deploy containerized applications, Site Reliability Engineers (SREs), DevOps Engineers, Operations Engineers, and Full Stack Developers.


None, but we recommend that students have some Linux system administration experience.

Course Outline

Course Introduction

  • What is Kubernetes
  • What problems does it solve?
  • Key features
  • Terminology to know

Core Concepts

  • Kubernetes API
  • Cluster architecture
  • Services
  • Other network primitives

Installation, Configuration, & Validation

  • Cluster design
  • Masters
  • Nodes
  • Cluster communications
  • HA for Kubernetes clusters
  • Acquiring the binaries
  • Infrastructure
  • Testing the cluster
    • Analyzing results
  • kubeadm
  • Container runtimes


  • Schedule Pods
  • Daemon Sets
  • Resource limitation


  • Networking configuration for cluster nodes
  • Pod networking
  • Service networking
  • Network load balancing
  • Ingress rules
  • DNS
  • CNI


  • Persistent Volumes
  • Creating Volumes
  • Access modes
  • Persistent volume claims
  • Storage objects
  • Application with persistent storage
  • CSI


  • Authentication and authorization
  • Security primitives
  • Network policies
  • TLS certificate management
  • Secure images
  • Security contexts
  • Key value store

Logging and Monitoring

  • Cluster components
  • Applications
  • Logs
    • Cluster
    • Applications

Extending the API

  • CRD
    • Examples: Crontab
  • Operator Framework
    • Examples: Strimzi, Prometheus


  • Application
  • Control plane
  • Worker node
  • Networking


Are you a student and need support?

Don’t see the class you’re looking for?

Get a demo or pricing!

Call (800) 850-9932 or submit this form to get pricing for you or your team.

We absolutely love being able to tailor the StormWind training experience to you and your goals. Simply provide us with a little bit of upfront info and we’ll get to work on customizing learning packages for you—at a price you just can’t resist.