Introduction to Kubernetes Containerization
Introduction to Kubernetes Containerization
This online instructor led training course provides the knowledge and skills to utilize Kubernetes, a product used to operate containerized applications at scale in the data-center. In this course students will learn key topics including the Kubernetes API, Cluster architecture, scheduling pods, daemon sets, pod and service networking, persisent volumes, security primitives, troubleshooting, and more.

Instructor:
Jeff Grunewald
Certified Kubernetes Administrator (CKA) and AWS Certified Cloud Practitioner
Course Information
Skills Learned
After completing this course, students will have a better understanding of:
- What Kubernetes is and what its used for
- Key Kubernetes concepts, including the Kubernetes API, cluster architecture, and more
- How to install, configure, and validate Kubernetes clusters
- Scheduling pods
- Daemon sets
- Resource limitation
- Pod and service networking
- Persistent and creating volumes
- Security primitives
- Authentication and authorization
- Logging and monitoring applications and cluster components
- Troubleshooting applications, the control plane, the worker node, and the network
Who Should Attend This Course
This course is intended for professionals who deploy containerized applications, Site Reliability Engineers (SREs), DevOps Engineers, Operations Engineers, and Full Stack Developers.
Prerequisites
None, but we recommend that students have some Linux system administration experience.
Course Outline
Course Introduction
- What is Kubernetes
- What problems does it solve?
- Key features
- Terminology to know
Core Concepts
- Kubernetes API
- Cluster architecture
- Services
- Other network primitives
Installation, Configuration, & Validation
- Cluster design
- Masters
- Nodes
- Cluster communications
- HA for Kubernetes clusters
- Acquiring the binaries
- Infrastructure
- Testing the cluster
- Analyzing results
- kubeadm
- Container runtimes
Scheduling
- Schedule Pods
- Daemon Sets
- Resource limitation
Networking
- Networking configuration for cluster nodes
- Pod networking
- Service networking
- Network load balancing
- Ingress rules
- DNS
- CNI
Storage
- Persistent Volumes
- Creating Volumes
- Access modes
- Persistent volume claims
- Storage objects
- Application with persistent storage
- CSI
Security
- Authentication and authorization
- Security primitives
- Network policies
- TLS certificate management
- Secure images
- Security contexts
- Key value store
Logging and Monitoring
- Cluster components
- Applications
- Logs
- Cluster
- Applications
Extending the API
- CRD
- Examples: Crontab
- Operator Framework
- Examples: Strimzi, Prometheus
Troubleshooting
- Application
- Control plane
- Worker node
- Networking

CLASS START DATES
Are you a student and need support?
Don’t see the class you’re looking for?
Get a demo or pricing!
Call (800) 850-9932 or submit this form to get pricing for you or your team.
We absolutely love being able to tailor the StormWind training experience to you and your goals. Simply provide us with a little bit of upfront info and we’ll get to work on customizing learning packages for you—at a price you just can’t resist.