BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
This two day course is designed for system administrators, DevOps, system engineers and others who need an introduction to Containers, Kubernetes. The course begins with an introduction to containers and container orchestration. Students will then learn about and explore Kubernetes, including launching applications, configuring networking, storage and security, and using Helm to deploy applications. The course includes comprehensive presentation content to introduce new concepts and processes and extensive hands-on experience. At the completion of this course, participants will have gained an understanding of:
- Containers and Orchestration Concepts
- An Introduction to Kubernetes
- The Basics of Kubernetes
- Kubernetes Cluster Administration
- Networking, Storage and Security for Kubernetes
- Helm and Helm Charts
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Program Level
Intermediate
Prerequisites
Attendees should have familiarity with the Command Line, Linux System Administration skills and attention to details. SUSE Certified Administrator (SCA) in Enterprise Linux or SUSE Certified Linux Engineer (SCE) in Enterprise Linux certification or level of experience recommended.
Course Audience
This course is designed for system administrators and others who want to administer Kubernetes.
Course Outline
Section 1: Course Introduction
• Understand the Course
Section 2: Introduction to Containers and Container Orchestration
• Understand Container Concepts
• Understand a Microservice Architecture
• Understand Kubernetes
• Understand SUSE Rancher Kubernetes Offerings
Section 3: Kubernetes Administration
• Understand Basic Kubernetes Commands
• Work with Namespaces
• Understand Kubernetes Manifests
• Understand Multi-pod Deployment
• Work with Deployments
• Configure Networking for Applications
• Use Environment Variables with Applications
• Use ConfigMaps
• Work with Secrets in Kubernetes
• Work with Labels and Selectors
• Configure Node Affinity in Kubernetes
• Scale Out Applications
Section 4: Application Management in Kubernetes with Kustomize
• Understand Kustomize Concepts
• Use Kustomize to Deploy Applications
Section 5: Application Management in Kubernetes with Helm
• Understand Basic Helm Concepts
• Manage Applications with Helm
Section 6: Ingress Networking with an Ingress Controller in Kubernetes
• Understand Ingres Networking for Applications
• Work with an Ingress Controller
Section 7: Storage in Kubernetes
• Understand Kubernetes Storage Concepts
• Work with Persistent Storage in Storage Classes
Section 8: Resource Usage Control in Kubernetes
• Understand Resource Usage Control in Kubernetes
• Work with LimitRanges
• Work with Resource Quotas
Section 9: Role Based Access Controls In Kubernetes
• Understand Role Based Access Controls
• Authenticate to a Kubernetes Cluster
• Configure RBAC in Kubernetes
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org