Skip to main content

Introduction to Kubernetes Training

Code: 3658 Category: Tag:

Kubernetes (k8s) is an open-source system for automating deployment, scaling, and containerization of applications. Kubernetes provides a cloud-agnostic container orchestration system and is supported by most major cloud providers.

In this 2-day hands-on Kubernetes course, you will learn to deploy containerized applications on Kubernetes, and scale those applications to handle dynamic traffic. You also learn how to continuously deploy new application versions in a Kubernetes cluster to provide application updates with no downtime. This course ends with a section on Kubernetes security and the Kubernetes ecosystem of tools including Helm and Rancher.

This hands-on course is designed for anyone wanting to learn how to deploy containerized workloads on Kubernetes.

Introduction to Kubernetes Training Delivery Methods
After-course instructor coaching benefit
Introduction to Kubernetes Training Course Benefits
Containerize applications to implement microservices architecturesCreate EKS clustersInstall and configure kubectlDeploy containers to a Kubernetes clusterPerform rolling updates and blue/green deployments of application versionsAutoscale the number of running pods
Kubernetes Training Course Outline
Introduction
Introduce Containers and their benefits
Create Microservices architectures using Containers
Apply best practices for managing containers and build files
Understand the Docker architecture
Get Started with Kubernetes
Deploy and Scale Workloads
Monitor Kubernetes Deployments
Introduction to Kubernetes Security
The Kubernetes Ecosystem

Request Quotes

Register now

Introduction to Linux Training

Tableau Visual Analytics Training

Business Relationship Management (BRM) Training: Aligning IT & the Business

InDesign Fundamentals: An Introduction to InDesign CC Training

FAC-P/PM-IT Training: Security, Accessibility and Quality (FPM 512)

Ethical Hacking Essentials Labs

Critical Thinking Training

Introduction to C# Training

Vulnerability Assessment Training: Protecting Your Organization

Microsoft Cybersecurity Architect (SC-100)

arالعربية