Call :+91 8055223360 

Complete Cloud Docker & Kubernetes TRAINING IN THRISSUR

2546 Reviews
4.8/5
1880 Learners

Overview

Duration 70 Hours Instructor Led Training
 
7 Real Projects + 50 + Assignments + Use Case Studies + Job Oriented Scenarios + Migration and Implementation Techniques

Watch
INTRO VIDEO

Why Radical Technologies

Check Batch Schedulings

Course Curriculum

Course description

Red Hat System Administration I (RH124) equips you with Linux® administration “survival skills” by focusing on foundational Linux concepts and core tasks. You will learn how to apply command-line concepts and enterprise-level tools, starting you on your journey toward becoming a full-time Linux system administrator. This path continues with the follow-on course, Red Hat System Administration II (RH134).

Pre-requisites

There are no formal prerequisites for this course; however, previous operating system administration experience will be very beneficial.

Course Content

Open Source- Docker & Kubernetes
2. AWS-Docker & Kubernetes
3. Azure-Docker & Kubernetes

4. GCP-Docker & Kubernetes

5. CKA – Certified Kubernetes Administrator
6. CKAD – Certified Kubernetes Application Developer
7. DCA – Docker Certified Administrator
Open Source- Docker & Kubernetes
 
Docker
Docker – Overview
Docker – Installing Docker on Linux
Docker – Installation
Docker – Hub
Docker – Images
Docker – Images Lifecycle
Docker – Containers
Docker – Containers Lifecycle
Docker – Working With Containers
Docker – Architecture
Docker – Configuring
Docker – Containers & Shells
Docker – File
Docker – Building Files
Building a Web Server Docker File
Docker – Public Repositories
Docker – Managing Ports
Docker – Private Registries
Docker – Instruction Commands
Docker – Container Linking
Docker – Storage
Docker – Networking
Docker – Setting NGINX
Docker – Toolbox
Docker – Logging
Docker – Compose
Docker-Swarm
 
 
Kubernetes
Kubernetes – Overview
Kubernetes – Architecture
Kubernetes – Setup
Kubernetes – Images
Kubernetes – Jobs
Kubernetes – Labels & Selectors
Kubernetes – Namespace
Kubernetes – Node
Kubernetes – Service
Kubernetes – Pod
Kubernetes – Replication Controller
Kubernetes – Replica Sets
Kubernetes – Deployments
Kubernetes – Volumes
Kubernetes – Secrets
Kubernetes – Network Policy
 
 
Advanced Kubernetes
Kubernetes – API
Kubernetes – Kubectl
Kubernetes – Kubectl Commands
Kubernetes – Creating an App
Kubernetes – App Deployment
Kubernetes – Autoscaling
Kubernetes – Dashboard Setup
Kubernetes – Monitoring
 
 
AWS-Docker & Kubernetes
 
 
Elastic Container Registry
What Is Amazon Elastic Container Registry?
AWS EC2
AWS CLI Setup
Components of Amazon ECR
Registry
Authorization Token
Repository
Repository Policy
Image
Commands
 
 
Elastic Container Service
Docker Container Concepts
An intro to Amazon ECS
Terms and architecture
Task Definition
Task
Service
ECS Container Instances and ECS Container Agents
Cluster
 
 
Elastic Kubernetes Service
Overview: Installing Kubernetes
Installing Dependencies
Installing the Latest Kubernetes
Exploring Your Kubernetes Installation
Kubernetes Architecture and Design
Achieving High-Availability
Scaling Kubernetes
Federation
Configuration Best Practices
Creating and Decoding Secrets
Using Secrets in Applications
Overview: Docker Containerization
Installing Docker and Building the Image
Deploying Your Docker Container
Interacting With Your Container
Hands-on Kubernetes on AWS
 
 
Azure-Docker & Kubernetes
 
 
Azure container registry
Docker Container Concepts
Deploying Containers
Multi-container Applications
Azure Container Registry
Azure Container Clustering Options
Installing ACS
 
 
Azure Container Service
Introduction to Azure Container Service
Azure Container Instances
Creating your first container in Azure
Azure Marketplace containers
Container orchestration
 
 
Azure Kubernets Services
What is AKS?
Kubernetes core concepts for AKS
Install the Kubernetes CLI
Baseline architecture for an AKS cluster
Clusters and workloads
Access and identity
Security
Networking
Storage
Deploy an Azure Kubernetes Service (AKS) cluster
Create a Kubernetes cluster
Connect to cluster using kubectl
Deploy the application
Scale applications
Update an application
Upgrade Kubernetes
 
 
GCP-Docker & Kubernetes
 
 
Google Container Registry
Overview
Create Account
Compute Engine
Permissions
Running an image
Commands
 
 
Google Container Services
Containers on Compute Engine
Container technologies that run on Compute Engin
Container-optimized VM images
Installing container technologies on your instances
Install Docker
Permissions
 
 
Google Kubernets Services
Understanding the GKE Service Profiles
Benefits of Using GKE
Costing Model Used in GKE
Using the GCP Calculator
GKE Architecture
Deploying an Application
Kubernetes Components
Basic Commands
GKE Architecture
GKE and IAM Requirements
GKE Federation Requirements
Kubernetes Cluster Actions
Scale/Resize a Cluster
 
 
DCA

 

Domain​ ​1:​ ​Orchestration​ ​(25%​ ​of​ ​exam)

● Complete the setup of a swarm mode cluster, with managers and worker nodes
● State the differences between running a container vs running a service
● Demonstrate steps to lock a swarm cluster
● Extend the instructions to run individual containers into running services under swarm
● Interpret the output of “docker inspect” commands
● Convert an application deployment into a stack file using a YAML compose file with
“docker stack deploy”
● Manipulate a running stack of services
● Increase # of replicas
● Add networks, publish ports
● Mount volumes
● Illustrate running a replicated vs global service
● Identify the steps needed to troubleshoot a service not deploying
● Apply node labels to demonstrate placement of tasks
● Sketch how a Dockerized application communicates with legacy systems
● Paraphrase the importance of quorum in a swarm cluster
● Demonstrate the usage of templates with “docker service create”

 

Domain​ ​2:​ ​Image​ ​Creation,​ ​Management,​ ​and​ ​Registry​ ​(20%​ ​of​ ​exam)
Content may include the following:
● Describe Dockerfile options [add, copy, volumes, expose, entrypoint, etc)
● Show the main parts of a Dockerfile
● Give examples on how to create an efficient image via a Dockerfile
● Use CLI commands such as list, delete, prune, rmi, etc to manage images
● Inspect images and report specific attributes using filter and format
● Demonstrate tagging an image
● Utilize a registry to store an image
● Display layers of a Docker image
● Apply a file to create a Docker image
● Modify an image to a single layer
● Describe how image layers work
● Deploy a registry (not architect)
● Configure a registry
● Log into a registry
● Utilize search in a registry
● Tag an image
● Push an image to a registry
● Sign an image in a registry
● Pull an image from a registry
● Describe how image deletion works
● Delete an image from a registry

 

Domain​ ​3:​ ​Installation​ ​and​ ​Configuration​ ​(15%​ ​of​ ​exam)
Content may include the following:
● Demonstrate the ability to upgrade the Docker engine
● Complete setup of repo, select a storage driver, and complete installation of Docker
engine on multiple platforms
● Configure logging drivers (splunk, journald, etc)
● Setup swarm, configure managers, add nodes, and setup backup schedule
● Create and manager user and teams
● Interpret errors to troubleshoot installation issues without assistance
● Outline the sizing requirements prior to installation
● Understand namespaces, cgroups, and configuration of certificates
● Use certificate-based client-server authentication to ensure a Docker daemon has the
rights to access images on a registry
● Consistently repeat steps to deploy Docker engine, UCP, and DTR on AWS and on
premises in an HA config
● Complete configuration of backups for UCP and DTR
● Configure the Docker daemon to start on boot

 

Domain​ ​4:​ ​Networking​ ​(15%​ ​of​ ​exam)
Content may include the following:
● Create a Docker bridge network for a developer to use for their containers
● Troubleshoot container and engine logs to understand a connectivity issue between
containers
● Publish a port so that an application is accessible externally
● Identify which IP and port a container is externally accessible on
● Describe the different types and use cases for the built-in network drivers
● Understand the Container Network Model and how it interfaces with the Docker engine
and network and IPAM drivers
● Configure Docker to use external DNS
● Use Docker to load balance HTTP/HTTPs traffic to an application (Configure L7 load
balancing with Docker EE)
● Understand and describe the types of traffic that flow between the Docker engine,
registry, and UCP controllers
● Deploy a service on a Docker overlay network
● Describe the difference between “host” and “ingress” port publishing mode

 

Domain​ ​5:​ ​Security​ ​(15%​ ​of​ ​exam)
Content may include the following:
● Describe the process of signing an image
● Demonstrate that an image passes a security scan
● Enable Docker Content Trust
● Configure RBAC in UCP
● Integrate UCP with LDAP/AD
● Demonstrate creation of UCP client bundles
● Describe default engine security
● Describe swarm default security
● Describe MTLS
● Identity roles
● Describe the difference between UCP workers and managers
● Describe process to use external certificates with UCP and DTR

 

Domain​ ​6:​ ​Storage​ ​and​ ​Volumes​ ​(10%​ ​of​ ​exam)
Content may include the following:
● State which graph driver should be used on which OS
● Demonstrate how to configure devicemapper
● Compare object storage to block storage, and explain which one is preferable when available
● Summarize how an application is composed of layers and where those layers reside on
the filesystem
● Describe how volumes are used with Docker for persistent storage
● Identify the steps you would take to clean up unused images on a filesystem, also on
DTR
● Demonstrate how storage can be used across cluster nodes

 

CKA

 

CKACurriculumV1.13.0
5%-Scheduling
•Use label selectors to schedule Pods.
•Understand the role of Daemon Sets.
•Understand how resource limits can affect Pod scheduling.
•Understand how to run multiple schedulers and how to configure Pods
to use them.
•Manually schedule a pod without a scheduler.
•Display scheduler events.
•Know how to configure the Kubernetes scheduler.

 

5%-Logging/Monitoring
•Understand how to monitor all cluster components.
•Understand how to monitor applications.
•Manage cluster component logs.
•Manage application logs.

 

8%-Application Lifecycle Management
•Understand Deployment sand how to perform rolling updates and rollbacks.
•Know various ways to configure applications.
•Know how to scale applications.
•Understand the primitives necessary to create a self-healing application.
11%-Cluster
•Understand Kubernetes cluster upgrade process.
•Facilitate operating system upgrades.
•Implement backup and restore methodologies.

 

12%-Security 
•Know how to configure authentication and authorization.
•Understand Kubernetes security primitives.
•Know to configure network policies.
•Create and manage TLS certificates for cluster components.
•Work with images securely.
•Define security contexts.
•Secure persistent keyvalue store.

 

7%-Storage
•Understand persistent volumes and know how to create them.
•Understand access modes for volumes.
•Understand persistent volume claims primitive.
•Understand Kubernetes storage objects.
•Know how to configure applications with persistent storage.

10%-Troubleshooting
•Trouble shoot application failure.
•Trouble shoot control plane failure.
•Trouble shoot worker node failure.
•Trouble shoot networking.

19%-Core Concepts
•Understand the Kubernetes API primitives.
•Understand the Kubernetes cluster architecture.
•Understand Services and other network primitives.

11%-Networking
•Understand the networking configuration on the cluster nodes.
•Understand Pod networking concepts.
•Understand Service networking.
•Deploy and configure network loadbalancer.
•Know how to use Ingress rules.
•Know how to configure and use the cluster DNS.
•Understand CNI.

12%-Installation,Configuration &Validation
•Design a Kubernetes cluster.
•Install Kubernetes masters and nodes.
•Configure secure cluster communications.
•Configure a Highly-Available Kubernetes cluster.
•Know where to get the Kubernetes release binaries.
•Provision underlying infrastructure to deploy a Kubernetes cluster.
•Choose a network solution.
•Choose your Kubernetes infrastructure configuration.
•Run end-to-end tests on your cluster.
•Analyse end-to-end tests results.
•Run Node end-to-end tests.

CKAD

Certified Kubernetes Application Developer(CKAD) ExamCurriculum v1.13.0
This document provides the curriculum outline of the Knowledge,Skills and Abilities that
a Certified Kubernetes Application Developer (CKAD) can be expected to demonstrate.

13%-Core Concepts
•Understand Kubernetes API primitives
•Create and configure basic Pods

18%-Configuration
•Understand Config Maps
•Understand Security Contexts
•Define an application’s resource requirements
•Create & consume Secrets
•Understand Service Accounts

10% Multi-Container Pods 
•Understand Multi-Container Pod design patterns (e.g.ambassador,adapter,sidecar)

18%-Observability
•Understand Liveness Probesand
Readiness Probes
•Understand container logging
•Understand how to monitor applications in Kubernetes
•Understand debugging in Kubernetes

20%-PodDesign 
•Understand how to use Labels, Selectors, and Annotations
•Understand Deployments and how to perform rolling updates
•Understand Deployments and how to perform rollbacks
•Understand Jobs and CronJobs

13%-Services&Networking
•Understand Services
•Demonstrate basic understanding of Network Policies

8%-State Persistence
•Understand Persistent Volume Claims for storage

Training Options

Live Online Training

  • Highly practical oriented training
  • Installation of Software On your System
  • 24/7 Email and Phone Support
  • 100% Placement Assistance until you get placed
  • Global Certification Preparation
  • Trainer Student Interactive Portal
  • Assignments and Projects Guided by Mentors
  • And Many More Features

Course completion certificate and Global Certifications are part of our all Master Program

Live Classroom Training

  • Weekend / Weekdays / Morning / Evening Batches
  • 80:20 Practical and Theory Ratio
  • Real-life Case Studies
  • Easy Coverup if you missed any sessions
  • PSI | Kryterion | Redhat Test Centers
  • Life Time Video Classroom Access ( coming soon )
  • Resume Preparations and Mock Interviews
  • And Many More Features

Course completion certificate and Global Certifications are part of our all Master Program

Exam & Certification

Course Reviews

I had a wonderful experience in Radical technologies where i did training in Hadoop development under the guidance of Shanit Sir. He started from the very basic and covered and shared everything he knew in this field. He was brilliant and had a lot of experience in this field. We did hands on for every topic we covered, and that’s the most important thing because honestly theoretical knowledge cannot land you a job.
Rohit Agrawal Hadoop
I have recently completed Linux course under Anand Sir and can assuredly say that it is definitely the best Linux course in Pune. Since most of the Linux courses from other sources are strictly focused on clearing the certification, they will not provide an insight into real-world server administration, but that is not the case with Anand Sir’s course. Anand Sir being an experienced IT infrastructure professional has an excellent understanding of how a data center works and all these information is seamlessly integrated into his classes.
Manu Sunil Linux
I had undergone oracle DBA course under Chetan sir’s Guidance an it was a very good learning experience overall since they not only provide us with theoretical knowledge but also conduct lot of practical sessions which are really fruitful and also the way of teaching is very fine clear and crisp which is easier to understand , overall I had a great time for around 2 months , they really train you well.also make it a point to clear all your doubts and provide you with clear and in-depth concepts hence hope to join sometime again
Reema banerjee Oracle DBA
I have completed Oracle DBA 11g from Radical technology pune. Excellent trainer (chetna gupta ). The trainer kept the energy level up and kept us interested throughout. Very practical, hands on experience. Gave us real-time examples, excellent tips and hints. It was a great experience with Radical technologies.
Mrudul Bhokare Oracle DBA
Linux learning with Anand sir is truly different experience… I don’t have any idea about Linux and system but Anand sir taught with scratch…He has a great knowledge and the best trainer…he can solve all your queries related to Linux in very simple way and giving nice examples… 100 🌟 to Anand Sir.
Harsh Singh Parihar Linux
Prev
Next

Why we are the best Radical Technologies

Radical Technologies is truly progressing and offer best possible services. And recognition towards Radical Technologies is increasing steeply as the demand is growing rapidly.

Creative

0%

Innovative

0%

Student Friendly

0%

Practical Oriented

0%

Valued Certification

0%

Training FAQs

Similar Courses

ENQUIRE NOW











    [recaptcha]