Home
Blog
Contact Us
FAQs
Register
Login
✕
Home
All Courses
Kubernetes
Kubernetes
Kubernetes
Curriculum
15 Sections
84 Lessons
10 Weeks
Expand all sections
Collapse all sections
Introduction to Kubernetes
3
1.1
Overview of Kubernetes
1.2
Kubernetes history
1.3
Key Concepts and Terminology
Kubernetes Architecture and Components
4
2.0
Overview of Kubernetes architecture
2.1
Master Components
2.2
Node Components
2.2
Understanding the Kubernetes Control Plane
Setting Up a Kubernetes Cluster
3
3.0
Cluster Setup with Minikube kubeadm
3.1
Verifying Cluster Setup
3.1
Accessing the cluster with kubectl
Kubernetes Objects and Resource Management
17
4.0
Overview of Pod lifecycle
4.1
Multi-container pods
4.2
Pod communication
4.3
Overview of ReplicaSets
4.4
Scaling Pods
4.5
Ensuring high availability
4.6
Overview of Deployments
4.7
Rolling updates and rollbacks
4.8
Canary deployments and blue-green deployments
4.9
Overview of DaemonSets
4.10
Running pods on every node in a cluster
4.11
Overview of Jobs and CronJobs
4.12
Batch processing in Kubernetes
4.13
Scheduling tasks using CronJobs
4.14
Overview of ConfigMaps and Secrets
4.14
Managing environment-specific configurations
4.15
Storing sensitive data securely
Networking in Kubernetes
9
5.0
Kubernetes Networking Model
5.1
Pod-to-Pod communication
5.2
Cluster IP and Service discovery
5.3
Overview of Kubernetes Services
5.4
Types of Kubernetes Services
5.5
Overview of ClusterIP, NodePort, LoadBalancer, Headless services
5.6
Overview of Network Policies
5.6
Controlling traffic flow between pods
5.7
Implementing Network Policies for security
Storage in Kubernetes
7
6.0
Volumes and Persistent Volumes
6.1
Volume types (emptyDir, hostPath, etc.)
6.2
PersistentVolume (PV) and PersistentVolumeClaim (PVC)
6.3
Storage classes for dynamic provisioning
6.4
Overview of StatefulSets
6.5
Managing stateful applications (e.g., databases)
6.5
Pod persistence in StatefulSets
Security in Kubernetes
8
7.0
RBAC (Role-Based Access Control)
7.1
Service accounts and user accounts
7.2
Securing API access
7.3
Pod Security Policies
7.4
Network Policies for Security
7.5
Secrets Management
7.6
Handling sensitive information (e.g., passwords, keys)
7.6
Integrating with external secret managers
Scaling and Load Balancing
4
8.1
Horizontal Pod Autoscaling
8.2
CPU and memory-based autoscaling
8.3
Cluster Autoscaling
8.4
Load Balancing in Kubernetes
Monitoring, Logging, and Debugging
6
9.1
Monitoring Kubernetes Clusters
9.2
Metrics Server
9.3
Prometheus and Grafana for monitoring and visualization
9.4
Kubernetes Dashboard
9.5
Logging in Kubernetes
9.6
Debugging and Troubleshooting
Helm and Package Management
5
10.0
Introduction to Helm
10.1
Helm charts and repositories
10.2
Deploying applications using Helm
10.3
Helm upgrades and rollbacks
10.4
Customizing Helm Charts
Kubernetes Networking with Ingress
3
11.0
Overview of Ingress Controllers
11.1
Ingress rules and host-based routing
11.1
Advanced Ingress Features
CI/CD with Kubernetes
4
12.0
Building CI/CD Pipelines
12.0
Blue-Green and Canary Deployments
12.1
Continuous Deployment
12.2
Rollbacks and Rollouts
Kubernetes Operators and Custom Resources
4
13.0
Introduction to Operators
13.1
Building custom operators using the Operator SDK
13.1
Managing Kubernetes applications with Operators
13.2
Custom Resource Definitions (CRDs)
Advanced Kubernetes Topics
4
14.0
Service Mesh with Istio or Linkerd
14.0
Kubernetes Federation
14.0
Kubernetes in Production
14.1
Container Runtime Interfaces (CRI)
Kubernetes on the Cloud
3
15.0
Managed Kubernetes Services
15.1
Best Practices for Managed Kubernetes
15.3
Overview of EKS, GKE, AKS
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content