What Is Container (Docker)?

Containers are a software package into an invisible box with everything that the application needs to run. That includes the operating system, application code, runtime, system tools, system libraries, and etc. Docker containers are built off Docker images.

Docker is an open-source platform based on Linux containers for developing, shipping, and running applications inside containers. we can deploy many containers simultaneously on a given host. Containers are very fast and lightweight because they don’t need the extra load of a hypervisor because they run directly within the host machine’s kernel.

What Is Kubernetes?

In organizations, multiple numbers of containers running at a time so it is very hard to manage all the containers together we use Kubernetes. Kubernetes is an open-source platform for managing containerized workloads and services. Kubernetes takes care of scaling and failover for your application running on container.

What Are The Benefits Of Kubernetes Developer Certification (CKAD)?

Certification is a key step in that process, allowing certified application developers to quickly establish their credibility and value in the job market, and also allowing companies to more quickly hire high-quality teams to support their growth.

The Certified Kubernetes Application Developer exam certifies that users can design, build, configure, and expose cloud native applications for Kubernetes. A Certified Kubernetes Application Developer can define application resources and use core primitives to build, monitor, and troubleshoot scalable applications and tools in Kubernetes.

The certification program allows users to demonstrate their competence in a hands-on, command-line environment. The purpose of the Certified Kubernetes Application Developer (CKAD) program is to provide assurance that CKADs have the skills, knowledge, and competency to perform the responsibilities of Kubernetes application developers.

Introducing: Docker & Certified Kubernetes Application Developer (CKAD) Training

Become expert in Docker & Certified Kubernetes Application Developer (CKAD) by mastering these 12 critical core skills…


img

Kubernetes Basics
img

Kubernetes Architecture
img

Core Concepts
img

Basic Networking
img

Deploying Application
img

Kubernetes Storage
img

Pod Designing & MultiContainer
img

Adv. Scheduling Concepts
img

Kubernetes Observability
img

Storage Provisioning
img

Kubernetes App. Security
img

Network Policies

COURSE BREAKDOWN


  1. MONOLITHIC APPLICATION OVERVIEW
  2. MICROSERVICES APPLICATION OVERVIEW
  3. INTRODUCTION TO CONTAINERS
  4. KERNEL FEATURES — CGROUPS AND NAMESPACE
  5. TYPES OF CONTAINERS
  6. VMS VS CONTAINERS
  7. INSTALLING DOCKER
  8. LEARNING BASIC DOCKER COMMANDS
  9. CONTAINER LIFECYCLE
  10. DOCKER PORT BINDING
  11. DOCKER COMMANDS
  12. ACTIVITY GUIDE: DOCKER INSTALLATION AND BASIC DOCKER COMMANDS
  13. ACTIVITY GUIDE: LAUNCHING CONTAINER WITH UBUNTU IMAGE FROM DOCKER HUB PUBLIC IMAGES
  14. ACTIVITY GUIDE: REGISTER FOR AZURE CLOUD ACCOUNT & ACCESSING CONSOLE
  15. ACTIVITY GUIDE: CREATE & CONNECT TO UBUNTU 18.04 SERVER ON AZURE CLOUD ACCOUNT

  1. INTRODUCTION TO DOCKER HUB
  2. INTRODUCTION TO DOCKER IMAGES
    • 2.1 CREATE/PUSH AN IMAGE
    • 2.2 TAGGING IMAGE
    • 2.3 COMMITTING CHANGES
    • 2.4 IMAGE LAYERING
    • 2.5 STORAGE DRIVERS
    • 2.6 INSPECTING AND PRUNING IMAGES
  3. ACTIVITY GUIDE: WORKING WITH DOCKER IMAGES

  1. TAGGING IMAGES
  2. ICOMMITING CHANGES
  3. DEPLOYING & CONFIGURING PRIVATE REGISTRY
  4. PUSH/PULL IMAGES WITH REGISTRY
  5. ACTIVITY GUIDE: CREATING A PRIVATE DOCKER REGISTRY FOR DOCKER CONTAINERS

  1. OVERVIEW OF DOCKER NETWORKING
  2. BRIDGE NETWORKING
  3. IMPLEMENTING USER-DEFINED BRIDGE NETWORK
  4. HOST NETWORKING
  5. USE-CASE AND NEED FOR VARIOUS NETWORKING TYPES
  6. DNS SERVER CONFIGURATION
  7. ACTIVITY GUIDE: CREATING CONTAINERS WITH BRIDGE TYPE NETWORK
  8. ACTIVITY GUIDE: IMPLEMENTING MULTI-CONTAINER CONNECTIVITY WITH CUSTOM BRIDGE NETWORKS
  9. ACTIVITY GUIDE: IMPLEMENTING HOST NETWORKING

  1. PERSISTENCY IN CONTAINERS
  2. OVERVIEW OF STORAGE DRIVERS
  3. UNDERSTANDING BIND MOUNT AND TMPFS MOUNT
  4. OVERVIEW OF DOCKER VOLUMES
  5. IMPLEMENTING DOCKER VOLUMES
  6. UNDERSTANDING USE-CASE AND NEED FOR VARIOUS STORAGE TYPES
  7. ACTIVITY GUIDE: WORKING WITH A CONTAINER AND IMPLEMENTING HOSTPATH (BIND) MOUNT
  8. ACTIVITY GUIDE: WORKING WITH A CONTAINER AND IMPLEMENTING VOLUME MOUNT
  9. ACTIVITY GUIDE: CONFIGURING EXTERNAL DNS, LOGGING AND STORAGE DRIVER

  1. DOCKERFILE INTRODUCTION
  2. AUTOMATING BUILD USING DOCKERFILE
    • 2.1 RUN INSTRUCTION
    • 2.2 FROM INSTRUCTION
    • 2.3 CMD, ENTRYPOINT, EXPOSE, VOLUME
    • 2.4 COPY, ENV AND MUCH MORE..
  3. DOCKER ENVIRONMENT VARIABLES
  4. ACTIVITY GUIDE: BUILDING A DOCKERFILE TO SETUP AN UBUNTU CONTAINER WITH WORDPRESS APPLICATION

  1. INTRODUCTION TO DOCKER COMPOSE
  2. WORKING OF DOCKER COMPOSE
  3. UNDERSTANDING BIND MOUNT AND TMPFS MOUNT
  4. FEATURES OF COMPOSE
  5. ACTIVITY GUIDE: DEPLOYING MULTI CONTAINER APPLICATION WITH DOCKER COMPOSE
  6. ACTIVITY GUIDE: WORKING WITH APPLICATION STACK

  1. HISTORY OF KUBERNETES
  2. INTRODUCTION TO KUBERNETES (NEED FOR KUBERNETES, KUBERNETES COMPONENTS)

  1. KUBERNETES COMPONENTS
  2. KUBERNETES MASTER NODE ARCHITECTURE
  3. KUBERNETES WORKER NODE ARCHITECTURE
  4. KUBERNETES MASTER – WORKER NODE COMMUNICATION
  5. ACTIVITY GUIDE: BOOTSTRAP A KUBERNETES CLUSTER USING KUBEADM
  6. ACTIVITY GUIDE: BOOTSTRAP A KUBERNETES CLUSTER ON CLOUD

  1. NAMESPACE
  2. LABELS AND SELECTOR
  3. ANNOTATIONS
  4. KUBERNETES RESOURCES
  5. POD AND POD LIFECYCLE

  1. POD NETWORKING CONCEPTS
  2. CNI IN KUBERNETES
  3. DNS AND IP ADDRESS MANAGEMENT
  4. SERVICE NETWORKING (CLUSTERIP, NODEPORT, LOADBALANCER)
  5. ACTIVITY GUIDE: CREATING PODS WITH CLUSTERIP AND NODEPORT TYPE OF SERVICES

  1. SCALING APPLICATION WITH REPLICATION CONTROLLER
  2. UNDERSTANDING DEPLOYMENT AND REPLICASET
  3. SCALING APPLICATION WITH DEPLOYMENT
  4. HORIZONTAL POD AUTOSCALER
  5. ACTIVITY GUIDE: DEPLOYING HIGHLY AVAILABLE STATELESS APPLICATION WITH DEPLOYMENT AND REPLICASET
  6. ACTIVITY GUIDE: UPGRADING AND ROLLBACK APPLICATION WITH DEPLOYMENT AND REPLICASET
  7. ACTIVITY GUIDE: AUTOMATED SCALING OF APPLICATION WITH HPA AND METRIC SERVER

  1. UNDERSTANDING AND CREATING PERSISTENT VOLUMES
  2. ACCESS MODES FOR VOLUMES
  3. UNDERSTANDING PERSISTENT VOLUME CLAIMS
  4. MOUNTING PERSISTENT VOLUME IN PODS
  5. ACTIVITY GUIDE: CREATING POD WITH NFS PERSISTENT VOLUME AND VOLUME CLAIM

  1. MULTI-CONTAINER PODS PATTERNS (AMBASSADOR, ADAPTER, SIDECAR)
  2. JOBS
  3. CRON JOBS
  4. INIT-CONTAINERS

  1. NODE SELECTOR
  2. NODE AFFINITY AND ANTI-AFFINITY
  3. POD AFFINITY AND ANTI-AFFINITY
  4. TAINT AND TOLERATIONS
  5. ACTIVITY GUIDE: POD ASSIGNMENT WITH NODE SELECTOR
  6. ACTIVITY GUIDE: ADVANCED POD SCHEDULING WITH NODE AFFINITY AND ANTI-AFFINITY
  7. ACTIVITY GUIDE: ADVANCED POD SCHEDULING WITH POD AFFINITY AND ANTI-AFFINITY
  8. ACTIVITY GUIDE: ADVANCED POD SCHEDULING WITH TAINT AND TOLERATION

  1. RESOURCE QUOTA
  2. LIMITING RESOURCES
  3. AUTO-HEALING AND HEALTH CHECK WITH PROBES (READINESS PROBES, LIVENESS PROBES, PROBING PARAMETERS AND USE CASE)
  4. APPLICATION FAILURE
  5. MONITORING APPLICATION AND ANALYZING LOGS
  6. CONTAINER LOGGING
  7. ACTIVITY GUIDE: ASSIGNING RESOURCE QUOTA AND DEMONSTRATING LIMITING RESOURCES SCENARIO
  8. ACTIVITY GUIDE: CONFIGURING READINESS PROBES FOR CONTAINER HEALTH CHECK
  9. ACTIVITY GUIDE: CONFIGURING LIVENESS PROBES FOR CONTAINER HEALTH CHECK
  10. ACTIVITY GUIDE: TROUBLESHOOTING APPLICATION LEVEL FAILURE
  11. ACTIVITY GUIDE: MONITOR AND DEBUG CONTAINER LOGS
  12. ACTIVITY GUIDE: ADDING ELK LOGGING AND MONITORING TO YOUR GUESTBOOK APPLICATION

  1. STORAGE CLASSES
  2. UNDERSTANDING DAEMONSETS CONTROLLERS
  3. WORKING WITH STATEFUL APPLICATION
  4. STATEFULSETS CONTROLLER
  5. INGRESS CONTROLLER
  6. ACTIVITY GUIDE: CREATING POD WITH CLOUD PERSISTENT VOLUME AND VOLUME CLAIM
  7. ACTIVITY GUIDE: UNDERSTANDING DAEMONSETS
  8. ACTIVITY GUIDE: DEPLOYING STATEFUL APPLICATION IN KUBERNETES CLUSTER
  9. ACTIVITY GUIDE: DEMONSTRATING INGRESS CONTROLLER LOAD BALANCING TECHNIQUES

  1. SERVICE ACCOUNT
  2. SECURITY CONTEXT IN CONTAINERS
  3. NETWORK POLICIES
  4. CONFIGMAP
  5. SECRETS
  6. ACTIVITY GUIDE: DEMONSTRATING VARIOUS WAYS TO SPIN UP SECURED CONTAINERS
  7. ACTIVITY GUIDE: CREATE INGRESS AND EGRESS NETWORK POLICIES TO SECURE TRAFFIC BETWEEN PODS
  8. ACTIVITY GUIDE: DEPLOYING PHP GUESTBOOK APPLICATION WITH REDIS