Call :+91 8055223360 

COMPLETE CLOUD DOCKER & KUBERNETES TRAINING IN KOCHI

856 Reviews
4.8/5
1780 Learners
All Cloud Docker & Kubernetes + CKA | CKAD | DCA Certification Training in Kochi
 
Duration 70 Hours Instructor Led Training
 
7 Real Projects + 50 + Assignments + Use Case Studies + Job Oriented Scenarios + Migration and Implementation Techniques

Overview

Contents Covered
 

1. Open Source- Docker & Kubernetes
2. AWS-Docker & Kubernetes
3. Azure-Docker & Kubernetes

4. GCP-Docker & Kubernetes

5. CKA – Certified Kubernetes Administrator
6. CKAD – Certified Kubernetes Application Developer
7. DCA – Docker Certified Administrator

Watch
INTRO VIDEO

Why Radical Technologies

Check Batch Schedulings

Course Curriculum

Course Content

Contents Covered
 

1. Open Source- Docker & Kubernetes
2. AWS-Docker & Kubernetes
3. Azure-Docker & Kubernetes

4. GCP-Docker & Kubernetes

5. CKA – Certified Kubernetes Administrator
6. CKAD – Certified Kubernetes Application Developer
7. DCA – Docker Certified Administrator
 
 
Course Content
 
 
Open Source- Docker & Kubernetes
 
Docker
Docker – Overview
Docker – Installing Docker on Linux
Docker – Installation
Docker – Hub
Docker – Images
Docker – Images Lifecycle
Docker – Containers
Docker – Containers Lifecycle
Docker – Working With Containers
Docker – Architecture
Docker – Configuring
Docker – Containers & Shells
Docker – File
Docker – Building Files
Building a Web Server Docker File
Docker – Public Repositories
Docker – Managing Ports
Docker – Private Registries
Docker – Instruction Commands
Docker – Container Linking
Docker – Storage
Docker – Networking
Docker – Setting NGINX
Docker – Toolbox
Docker – Logging
Docker – Compose
Docker-Swarm
 
 
Kubernetes
Kubernetes – Overview
Kubernetes – Architecture
Kubernetes – Setup
Kubernetes – Images
Kubernetes – Jobs
Kubernetes – Labels & Selectors
Kubernetes – Namespace
Kubernetes – Node
Kubernetes – Service
Kubernetes – Pod
Kubernetes – Replication Controller
Kubernetes – Replica Sets
Kubernetes – Deployments
Kubernetes – Volumes
Kubernetes – Secrets
Kubernetes – Network Policy
 
 
Advanced Kubernetes
Kubernetes – API
Kubernetes – Kubectl
Kubernetes – Kubectl Commands
Kubernetes – Creating an App
Kubernetes – App Deployment
Kubernetes – Autoscaling
Kubernetes – Dashboard Setup
Kubernetes – Monitoring
 
 
AWS-Docker & Kubernetes
 
 
Elastic Container Registry
What Is Amazon Elastic Container Registry?
AWS EC2
AWS CLI Setup
Components of Amazon ECR
Registry
Authorization Token
Repository
Repository Policy
Image
Commands
 
 
Elastic Container Service
Docker Container Concepts
An intro to Amazon ECS
Terms and architecture
Task Definition
Task
Service
ECS Container Instances and ECS Container Agents
Cluster
 
 
Elastic Kubernetes Service
Overview: Installing Kubernetes
Installing Dependencies
Installing the Latest Kubernetes
Exploring Your Kubernetes Installation
Kubernetes Architecture and Design
Achieving High-Availability
Scaling Kubernetes
Federation
Configuration Best Practices
Creating and Decoding Secrets
Using Secrets in Applications
Overview: Docker Containerization
Installing Docker and Building the Image
Deploying Your Docker Container
Interacting With Your Container
Hands-on Kubernetes on AWS
 
 
Azure-Docker & Kubernetes
 
 
Azure container registry
Docker Container Concepts
Deploying Containers
Multi-container Applications
Azure Container Registry
Azure Container Clustering Options
Installing ACS
 
 
Azure Container Service
Introduction to Azure Container Service
Azure Container Instances
Creating your first container in Azure
Azure Marketplace containers
Container orchestration
 
 
Azure Kubernets Services
What is AKS?
Kubernetes core concepts for AKS
Install the Kubernetes CLI
Baseline architecture for an AKS cluster
Clusters and workloads
Access and identity
Security
Networking
Storage
Deploy an Azure Kubernetes Service (AKS) cluster
Create a Kubernetes cluster
Connect to cluster using kubectl
Deploy the application
Scale applications
Update an application
Upgrade Kubernetes
 
 
GCP-Docker & Kubernetes
 
 
Google Container Registry
Overview
Create Account
Compute Engine
Permissions
Running an image
Commands
 
 
Google Container Services
Containers on Compute Engine
Container technologies that run on Compute Engin
Container-optimized VM images
Installing container technologies on your instances
Install Docker
Permissions
 
 
Google Kubernets Services
Understanding the GKE Service Profiles
Benefits of Using GKE
Costing Model Used in GKE
Using the GCP Calculator
GKE Architecture
Deploying an Application
Kubernetes Components
Basic Commands
GKE Architecture
GKE and IAM Requirements
GKE Federation Requirements
Kubernetes Cluster Actions
Scale/Resize a Cluster
 
 
DCA

Domain 1: Orchestration (25% of exam)

● Complete the setup of a swarm mode cluster, with managers and worker nodes
● State the differences between running a container vs running a service
● Demonstrate steps to lock a swarm cluster
● Extend the instructions to run individual containers into running services under swarm
● Interpret the output of “docker inspect” commands
● Convert an application deployment into a stack file using a YAML compose file with
“docker stack deploy”
● Manipulate a running stack of services
● Increase # of replicas
● Add networks, publish ports
● Mount volumes
● Illustrate running a replicated vs global service
● Identify the steps needed to troubleshoot a service not deploying
● Apply node labels to demonstrate placement of tasks
● Sketch how a Dockerized application communicates with legacy systems
● Paraphrase the importance of quorum in a swarm cluster
● Demonstrate the usage of templates with “docker service create”

Domain 2: Image Creation, Management, and Registry (20% of exam)
Content may include the following:
● Describe Dockerfile options [add, copy, volumes, expose, entrypoint, etc)
● Show the main parts of a Dockerfile
● Give examples on how to create an efficient image via a Dockerfile
● Use CLI commands such as list, delete, prune, rmi, etc to manage images
● Inspect images and report specific attributes using filter and format
● Demonstrate tagging an image
● Utilize a registry to store an image
● Display layers of a Docker image
● Apply a file to create a Docker image
● Modify an image to a single layer
● Describe how image layers work
● Deploy a registry (not architect)
● Configure a registry
● Log into a registry
● Utilize search in a registry
● Tag an image
● Push an image to a registry
● Sign an image in a registry
● Pull an image from a registry
● Describe how image deletion works
● Delete an image from a registry

Domain 3: Installation and Configuration (15% of exam)
Content may include the following:
● Demonstrate the ability to upgrade the Docker engine
● Complete setup of repo, select a storage driver, and complete installation of Docker
engine on multiple platforms
● Configure logging drivers (splunk, journald, etc)
● Setup swarm, configure managers, add nodes, and setup backup schedule
● Create and manager user and teams
● Interpret errors to troubleshoot installation issues without assistance
● Outline the sizing requirements prior to installation
● Understand namespaces, cgroups, and configuration of certificates
● Use certificate-based client-server authentication to ensure a Docker daemon has the
rights to access images on a registry
● Consistently repeat steps to deploy Docker engine, UCP, and DTR on AWS and on
premises in an HA config
● Complete configuration of backups for UCP and DTR
● Configure the Docker daemon to start on boot

Domain 4: Networking (15% of exam)
Content may include the following:
● Create a Docker bridge network for a developer to use for their containers
● Troubleshoot container and engine logs to understand a connectivity issue between
containers
● Publish a port so that an application is accessible externally
● Identify which IP and port a container is externally accessible on
● Describe the different types and use cases for the built-in network drivers
● Understand the Container Network Model and how it interfaces with the Docker engine
and network and IPAM drivers
● Configure Docker to use external DNS
● Use Docker to load balance HTTP/HTTPs traffic to an application (Configure L7 load
balancing with Docker EE)
● Understand and describe the types of traffic that flow between the Docker engine,
registry, and UCP controllers
● Deploy a service on a Docker overlay network
● Describe the difference between “host” and “ingress” port publishing mode

Domain 5: Security (15% of exam)
Content may include the following:
● Describe the process of signing an image
● Demonstrate that an image passes a security scan
● Enable Docker Content Trust
● Configure RBAC in UCP
● Integrate UCP with LDAP/AD
● Demonstrate creation of UCP client bundles
● Describe default engine security
● Describe swarm default security
● Describe MTLS
● Identity roles
● Describe the difference between UCP workers and managers
● Describe process to use external certificates with UCP and DTR

Domain 6: Storage and Volumes (10% of exam)
Content may include the following:
● State which graph driver should be used on which OS
● Demonstrate how to configure devicemapper
● Compare object storage to block storage, and explain which one is preferable when available
● Summarize how an application is composed of layers and where those layers reside on
the filesystem
● Describe how volumes are used with Docker for persistent storage
● Identify the steps you would take to clean up unused images on a filesystem, also on
DTR
● Demonstrate how storage can be used across cluster nodes

CKA

CKACurriculumV1.13.0
5%-Scheduling
•Use label selectors to schedule Pods.
•Understand the role of Daemon Sets.
•Understand how resource limits can affect Pod scheduling.
•Understand how to run multiple schedulers and how to configure Pods
to use them.
•Manually schedule a pod without a scheduler.
•Display scheduler events.
•Know how to configure the Kubernetes scheduler.

5%-Logging/Monitoring
•Understand how to monitor all cluster components.
•Understand how to monitor applications.
•Manage cluster component logs.
•Manage application logs.

8%-Application Lifecycle Management
•Understand Deployment sand how to perform rolling updates and rollbacks.
•Know various ways to configure applications.
•Know how to scale applications.
•Understand the primitives necessary to create a self-healing application.
11%-Cluster
•Understand Kubernetes cluster upgrade process.
•Facilitate operating system upgrades.
•Implement backup and restore methodologies.

12%-Security 
•Know how to configure authentication and authorization.
•Understand Kubernetes security primitives.
•Know to configure network policies.
•Create and manage TLS certificates for cluster components.
•Work with images securely.
•Define security contexts.
•Secure persistent keyvalue store.

7%-Storage
•Understand persistent volumes and know how to create them.
•Understand access modes for volumes.
•Understand persistent volume claims primitive.
•Understand Kubernetes storage objects.
•Know how to configure applications with persistent storage.

10%-Troubleshooting
•Trouble shoot application failure.
•Trouble shoot control plane failure.
•Trouble shoot worker node failure.
•Trouble shoot networking.

19%-Core Concepts
•Understand the Kubernetes API primitives.
•Understand the Kubernetes cluster architecture.
•Understand Services and other network primitives.

11%-Networking
•Understand the networking configuration on the cluster nodes.
•Understand Pod networking concepts.
•Understand Service networking.
•Deploy and configure network loadbalancer.
•Know how to use Ingress rules.
•Know how to configure and use the cluster DNS.
•Understand CNI.

12%-Installation,Configuration &Validation
•Design a Kubernetes cluster.
•Install Kubernetes masters and nodes.
•Configure secure cluster communications.
•Configure a Highly-Available Kubernetes cluster.
•Know where to get the Kubernetes release binaries.
•Provision underlying infrastructure to deploy a Kubernetes cluster.
•Choose a network solution.
•Choose your Kubernetes infrastructure configuration.
•Run end-to-end tests on your cluster.
•Analyse end-to-end tests results.
•Run Node end-to-end tests.

CKAD

Certified Kubernetes Application Developer(CKAD) ExamCurriculum v1.13.0
This document provides the curriculum outline of the Knowledge,Skills and Abilities that
a Certified Kubernetes Application Developer (CKAD) can be expected to demonstrate.

13%-Core Concepts
•Understand Kubernetes API primitives
•Create and configure basic Pods

18%-Configuration
•Understand Config Maps
•Understand Security Contexts
•Define an application’s resource requirements
•Create & consume Secrets
•Understand Service Accounts

10% Multi-Container Pods 
•Understand Multi-Container Pod design patterns (e.g.ambassador,adapter,sidecar)

18%-Observability
•Understand Liveness Probes and
Readiness Probes
•Understand container logging
•Understand how to monitor applications in Kubernetes
•Understand debugging in Kubernetes

20%-PodDesign 
•Understand how to use Labels, Selectors, and Annotations
•Understand Deployments and how to perform rolling updates
•Understand Deployments and how to perform rollbacks
•Understand Jobs and CronJobs

13%-Services  &  Networking
•Understand Services
•Demonstrate basic understanding of Network Policies

8%-State Persistence
•Understand Persistent Volume Claims for storage

Training Options

Live Online Training

  • Highly practical oriented training
  • Installation of Software On your System
  • 24/7 Email and Phone Support
  • 100% Placement Assistance until you get placed
  • Global Certification Preparation
  • Trainer Student Interactive Portal
  • Assignments and Projects Guided by Mentors
  • And Many More Features

Course completion certificate and Global Certifications are part of our all Master Program

Live Classroom Training

  • Weekend / Weekdays / Morning / Evening Batches
  • 80:20 Practical and Theory Ratio
  • Real-life Case Studies
  • Easy Coverup if you missed any sessions
  • PSI | Kryterion | Redhat Test Centers
  • Life Time Video Classroom Access ( coming soon )
  • Resume Preparations and Mock Interviews
  • And Many More Features

Course completion certificate and Global Certifications are part of our all Master Program

Exam & Certification

Course Reviews

Why we are the best Radical Technologies

Radical Technologies is truly progressing and offer best possible services. And recognition towards Radical Technologies is increasing steeply as the demand is growing rapidly.

Creative

0%

Innovative

0%

Student Friendly

0%

Practical Oriented

0%

Valued Certification

0%

Training FAQs

Similar Courses

ENQUIRE NOW











    [recaptcha]