Certified Kubernetes Admin (CKA) Training
- Overview
- Course Content
- Drop us a Query
Go for the Certified Kubernetes Admin Training if you want to clear the Certified Kubernetes Admin Certification. Multisoft Systems, a Training, Certification & Consultancy Organization, has become a prominent name in the world of DevOps Training. The CKA certification training is hands-on training based on theory and practical classes. At Multisoft, this course is delivered by highly skilled subject matter experts.
The offered course is designed for Operational Engineers, Software Developers, Architects, and IT Professionals. It will prepare you for the Certified Kubernetes Administrator (CKA) exam by the Cloud Native Computing Foundation. You will also learn the techniques of installing and configuring Kubernetes, the process of working with Putty & Puttygen tools (On Windows OS), working with Networking, Scheduling pods, and deploying applications.
- How to deal with AWS EC2
- How to work with Putty & Puttygen tools (On Windows OS)?
- How to pass the Certified Kubernetes Administrator (CKA) exam?
- How to install and configure Kubernetes?
- How to work with Networking?
- How do deploy applications and Scheduling pods?
- Recorded Videos After Training
- Digital Learning Material
- Course Completion Certificate
- 24x7 After Training Support
- Software Developers
- IT Professionals
- Architects
- Operational Engineers
- Concepts of Virtualization
- Linux & Networking Fundamentals
- Experience with installing and configuring applications
- Good Understanding of Containers and Dockers
- Working experience of using vi or vim editor tools
- Multisoft Systems will provide you with a training completion certificate after completing the Certified Kubernetes Admin – CKA Training.
Certified Kubernetes Admin Course Content
Module 1: Overview of Certified Kubernetes Administrator (CKA) Exam
- Overview of CKA Exam
- Exam Domains and Format
Module 2: Introduction to Kubernetes
- Overview of Dockers and Containers
- What is Container Orchestration?
- Evolution of Kubernetes
- Differences between Kubernetes and Docker Swarm
- What is Kubernetes
- Kubernetes Use Cases
Module 3: Kubernetes Architecture & Components
- Understand Kubernetes Architecture
- Introduction to Kubernetes Master
- Components of Kubernetes Master
- Introduction to Node Components
Module 4: Installing & Configuring Kubernetes
- Overview of Minikube installation
- Installing and Configuring Kubernetes Master and Nodes using kubeadm
- Building a Highly Available Kubernetes Cluster
- List all the nodes of the clusters
- Working with cluster using various kubectl commands
Module 5: Working with Namespaces and Pods
- Overview of Namespaces and creating Namespaces
- Introduction to Pods
- Pods Lifecycle
- Working with YAML files
- Working with Pods to manage multiple containers
- Deploying Pods using kubectl run command
Module 6: Application Lifecycle Management
- Overview of Deployments
- Scale-out deployments using ReplicaSets
- Rolling Updates with Deployments
- Working with Labels and Selectors
- Application Health Checks – Liveness Probes, Readiness Probes
- Working with Jobs
Module 7: Kubernetes Schedulings
- Overview of kube-scheduler
- Scheduling with kube-scheduler
- Scheduler Policies
- Horizontal Pod Autoscaling
- Affinity and Anti-Affinity
Module 8: Storage Management in Kubernetes
- Overview of Kubernetes Volumes
- Volumes Types -emptydir, hostPath, NFS, Cloud Volume
- What are Persistent Volumes
- Working with Persistent Volume Claims
- Persist Volume Access Modes
Module 9: Kubernetes Controllers
- Overview of Replication Controllers
- Working with DaemonSets
- Working with StatefulSets
Module 10: Kubernetes Networking
- Overview of Kubernetes Networking
- Overview of Kubernetes CNI providers – Flannel, Calico and WeaveNet
- Need for Kubernetes Services
- Types of Services- Cluster IP, NodePort and LoadBalancer
- Configuring Services using YAML files
- Ingress Rules & Load Balancers
- Cluster DNS
Module 11: Securing Kubernetes Cluster
- Basics of Kubernetes Security
- Cluster Authentication & Authorization
- Users, Groups and Service Accounts
- Configuring Network Policies
- Creating TLS Certificates
- Secure Images
Module 12: Logging and Monitoring
- Overview of Logging ad Monitoring
- Monitoring the Cluster Components
- Monitoring Application Logs
Module 13: Introduction to Helm
- Overview of Helm Charts
- Helm Charts
- Helm Repository
- Developing Helm Templates
Module 14: Kubernetes Maintenance
- Overview of Node Maintenance
- Drain vs Cordoning Node
- Cluster Upgrade Process
- Backup and Restore Methods
Module 15: Troubleshooting in Kubernetes
- Troubleshooting Application Failure
- Troubleshooting Control Plane Failure
- Troubleshooting Worker Node Failure
- Troubleshooting Networking