Live Online Style Video +Live Instructor + Official Course-Book + Hands-on Labs

Kubernetes Boot Camp (CKA + CKAD + CKS)

Includes:

  1. 6 months access to videos.
  2. Access via Laptop, Tab, Mobile, and Smart TV.
  3. Certificate of Completion.
  4. Official Course-Book
  5. Hands-on labs
  6. 430+ Tests Questions (Qubits)

We do not have video for this course. It will take 48 hours to deliver.


You can also purchase an annual plan for USD 999. For one year, all Flexi Videos will be free for you. Buy Annual Plan

Flexi Video

USD 199

Official Course-Book Instructor Hand-outs

USD 0

Hands-On-Labs

USD 59

Total

USD 199

100% Refund for Flexi Video (Course-Book is non-refundable) if user is not satisfied with the Video and seeks refund within 7 days of purchase.

Download Course Contents
Module 1: Core Concepts
  • Overview of Container Orchestration
  • Introduction to Kubernetes
  • Kubernetes Architecture
  • Design a Kubernetes Cluster
  • Installation of Kubernetes Master and Nodes
  • Choose a Network Solution
  • Verify Installation
  • Managing Pods
  • Managing Labels & Selector
  • Managing Replication Controller & Replica Set
  • Managing Service – ClusterIP, NodePort, LoadBalancer
  • Manual Scheduling
  • Taint and Tolerations
  • Node Selector
  • Node Affinity
  • Overview of Deployment
  • Deployment Strategies
  • Managing Deployment
  • Canary Deployment
  • Blue-Green Deployment
  • Plain Key
  • Config Map
  • Secret
  • Mount Variable as Volume
  • Volumes
  • Persistent Volumes
  • Persistent Volume Claim
  • Introduction to StatefulSET
  • Use cases of StatefulSet
  • Manage StatefulSet
  • Storage in StatefulSet
  • Headless Service
  • Kubernetes Authentication
  • Managing Users in Kubernetes
  • Service Account
  • Managing Roles and Role Binding
  • Managing Cluster Role and Cluster Role Binding
  • Security Context
  • Network Policies
  • OS Upgrade
  • Upgrade Cluster Version
  • Static Pod
  • ETCD Backup
  • Jobs and Cron Job
  • Understand how to Monitor all Cluster Components
  • Understand how to Monitor Applications
  • Manage Cluster Components Logs
  • Manage Application Logs
  • Prometheus Tool
  • Kubernetes Networking
  • Understand CNI
  • Understand Pod Networking Concepts
  • Configure and Manage Ingress Rule
  • Configure Ingress with TLS
  • Namespace
  • Metal Load Balancer
  • Init Container
  • Side Car Container
  • Adaptor Container
  • Ambassador Container
  • Introduction to Helm
  • Work with Helm Charts
  • Create Helm Charts
  • Upgrade and Downgrade Helm Charts
  • Introduction to Dockerfile
  • Dockerfile Instructions
  • Build Image
  • Push Image to Centralized Registry
  • Introduction to Readiness and Liveness Probe
  • Implement Readiness and Liveness in Pod
  • Troubleshoot ETCD Failure
  • Troubleshoot Kubelet Failure
  • Troubleshoot Container Runtime Failure
  • Troubleshoot Scheduler Failure
  • Use CIS Benchmark to Review the Security Configuration of Kubernetes Components
  • Minimize Use of, and Access to, GUI Elements
  • Exercise Caution in Using Service Accounts e.g., Disable Defaults, Minimize Permissions on Newly Created Ones
  • Minimize Host OS Footprint (Reduce Attach Surface)
  • Minimize IAM Roles
  • Minimize External Access to the Network
  • Appropriately Use Kernel Hardening Tools Such as App Armor, Seccomp
  • Setup Appropriate OS Level Security Domains e.g. Using PSP, OPA, Security Contexts
  • Use GVisor
  • Minimize Base Image Footprint
  • Use Static Analysis of User Workloads (e.g. Kubernetes Resources, Docker Files) Scan Images for Known
  • Vulnerabilities
  • Perform Behavioral Analytics of Syscall Process and File Activities at the Host and Container Level to Detect
  • Malicious Activities
  • Detect Threats within Physical Infrastructure, Apps, Networks, Data, Users and Workloads
  • Detect All Phases of Attack Regardless Where It Occurs and How It Works
  • Perform Deep Analytical Investigation and Identification of Bad Actors within Environment Ensure
  • Immutability of Containers at Runtime
  • Use Audit Logs to Monitor Access

Learn more about Koenig. Download Presentation Buy Other Flexi

FAQ's

Yes, you can pay from this web page.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
We use the best standards in Internet security. Any data retained is not shared with third parties.
You will be provided access to LET ( Learning Enhancement Tool), where you will get the links to access all your purchases.
Flexi video for the new version will be provided free of cost.
6 months from the date of delivery.
Yes, contact us for corporate packages.
Yes, Course-Book and Lab are not included in the annual plan. All Flexi videos are included.
It is only for one user.
Videos can only be streamed and not downloaded.
We do not track the pass rate of Flexi students. However, we trust it will be lower than for Live Online.
Presently, Flexi is only available in English.
It’s a unique subscription plan where customers can avail unlimited Flexi courses within a year.
The subscription plan is valid for 1 year from the date of purchase.
No, this is limited to one user and its non-transferable.

Feedbacks from Clients