0% found this document useful (0 votes)
4 views8 pages

Docker & Kubernetes Brochure

Uploaded by

Sounak Choudhury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views8 pages

Docker & Kubernetes Brochure

Uploaded by

Sounak Choudhury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

1

Docker Certified Associate Course Content

Domain​ ​1:​ ​Orchestration​ ​(25%​ ​ • Mount volumes


of​ ​exam) • Illustrate running a
replicated vs global service
• Identify the steps needed to
troubleshoot a service not
deploying
• Apply node labels to
demonstrate placement of
tasks
• Sketch how a Dockerized
application communicates
• Complete the setup of a with legacy systems
swarm mode cluster, with • Paraphrase the importance
managers and worker of quorum in a swarm
nodes cluster
• State the differences • Demonstrate the usage
between running a of templates with “docker
container vs running a service create”
service
• Demonstrate steps to lock a Domain​ ​2:​ ​Image​ ​Creation,​ ​
swarm cluster Management,​ ​and​ ​Registry​ ​
• Extend the instructions to (20%​ ​of​ ​exam)
run individual containers
into running services under
swarm
• Interpret the output of
“docker inspect” commands
• Convert an application
deployment into a stack file
using a YAML compose file
with • Describe Dockerfile options
• “docker stack deploy” [add, copy, volumes, expose,
• Manipulate a running stack entrypoint, etc)
of services • Show the main parts of a
• Increase # of replicas Dockerfile
• Add networks, publish ports • Give examples on how to

2
create an efficient image via deletion works
a Dockerfile • Delete an image from a
• Use CLI commands such as registry
list, delete, prune, rmi, etc to
manage images Domain​ ​3:​ ​Installation​ ​and​ ​
• Inspect images and report Configuration​​(15%​​of​​exam)
specific attributes using
• Demonstrate the ability to
upgrade the Docker engine
• Complete setup of repo,
select a storage driver, and
complete installation of
Docker
• engine on multiple
platforms
filter and format • Configure logging drivers
• Demonstrate tagging an (splunk, journald, etc)
image • Setup swarm, configure
• Utilize a registry to store an managers, add nodes, and
image setup backup schedule
• Display layers of a Docker • Create and manager user
image and teams
• Apply a file to create a • Interpret errors to
Docker image troubleshoot installation
• Modify an image to a single issues without assistance
layer • Outline the sizing
• Describe how image layers requirements prior to
work installation
• Deploy a registry (not • Understand namespaces,
architect) cgroups, and configuration
• Configure a registry of certificates
• Log into a registry • Use certificate-based client-
• Utilize search in a registry
• Tag an image
• Push an image to a registry
• Sign an image in a registry
• Pull an image from a
registry
• Describe how image

3
server authentication to and use cases for the built-
ensure a Docker daemon in network drivers
has the • Understand the Container
• rights to access images on a Network Model and how it
registry interfaces with the Docker
• Consistently repeat steps to engine
deploy Docker engine, UCP, • and network and IPAM
and DTR on AWS and on drivers
• premises in an HA config • Configure Docker to use
• Complete configuration of external DNS
backups for UCP and DTR • Use Docker to load balance
• Configure the Docker HTTP/HTTPs traffic to an
daemon to start on boot application (Configure L7
load
Domain​ ​4:​ ​Networking​ ​(15%​ ​ • balancing with Docker EE)
of​ ​exam) • Understand and describe
the types of traffic that flow
between the Docker engine,
• registry, and UCP controllers
• Deploy a service on a
Docker overlay network
• Describe the difference
between “host” and
“ingress” port publishing
mode
• Create a Docker bridge
network for a developer to Domain​​5:​​Security​​(15%​​of​​
use for their containers exam)
• Troubleshoot container and
engine logs to understand a • Describe the process of
connectivity issue between signing an image
• containers • Demonstrate that an image
• Publish a port so that an passes a security scan
application is accessible • Enable Docker Content
externally Trust
• Identify which IP and port
a container is externally
accessible on
• Describe the different types

4
• Configure RBAC in UCP OS
• Integrate UCP with LDAP/ • Demonstrate how to
AD configure devicemapper
• Demonstrate creation of • Compare object storage to
UCP client bundles block storage, and explain
• Describe default engine which one is preferable
security when available
• Describe swarm default • Summarize how an
security application is composed
• Describe MTLS of layers and where those
• Identity roles layers reside on
• Describe the difference • the filesystem
between UCP workers and • Describe how volumes
managers are used with Docker for
• Describe process to use persistent storage
external certificates with • Identify the steps you would
UCP and DTR take to clean up unused
images on a filesystem, also
Domain​ ​6:​ ​Storage​ ​and​ ​ on
Volumes​​(10%​​of​​exam) • DTR
• Demonstrate how storage
• State which graph driver can be used across cluster
should be used on which nodes

5
Certified Kubernetes Administrator Course Content

Scheduling Management

• Understand Deployment
sand how to perform rolling
updates and rollbacks.
• Know various ways to
configure applications.
• Know how to scale
• Use label selectors to applications.
schedule Pods. • Understand the primitives
• Understand the role of necessary to create a self-
Daemon Sets. healing application.
• Understand how resource
limits can affect Pod Cluster
scheduling.
• Understand how to run • Understand Kubernetes
multiple schedulers and cluster upgrade process.
how to configure Pods • Facilitate operating system
• to use them.
• Manually schedule a pod
without a scheduler.
• Display scheduler events.
• Know how to configure the
Kubernetes scheduler.

Logging/Monitoring
upgrades.
• Understand how to monitor • Implement backup and
all cluster components. restore methodologies.
• Understand how to monitor
applications. Security
• Manage cluster component
logs. • Know how to configure
• Manage application logs. authentication and
authorization.
Application Lifecycle • Understand Kubernetes

6
security primitives. failure.
• Know to configure network • Trouble shoot networking.
policies.
• Create and manage TLS Core Concepts
certificates for cluster
components.
• Work with images securely.
• Define security contexts.
• Secure persistent keyvalue
store.

Storage • Understand the Kubernetes


API primitives.
• Understand the Kubernetes
cluster architecture.
• Understand Services and
other network primitives.

Networking
• Understand persistent
volumes and know how to • Understand the networking
create them. configuration on the cluster
• Understand access modes nodes.
for volumes. • Understand Pod
• Understand persistent networking concepts.
volume claims primitive. • Understand Service
• Understand Kubernetes networking.
storage objects. • Deploy and configure
• Know how to configure network loadbalancer.
applications with persistent • Know how to use Ingress
storage. rules.
• Know how to configure and
Troubleshooting use the cluster DNS.
• Understand CNI.
• Trouble shoot application
failure.
• Trouble shoot control plane
failure.
• Trouble shoot worker node

7
Installation,Configuration Kubernetes release binaries.
&Validation • Provision underlying
infrastructure to deploy a
• Design a Kubernetes Kubernetes cluster.
cluster. • Choose a network solution.
• Install Kubernetes masters • Choose your Kubernetes
and nodes. infrastructure configuration.
• Configure secure cluster • Run end-to-end tests on
communications. your cluster.
• Configure a Highly-Available • Analyse end-to-end tests
Kubernetes cluster. results.
• Know where to get the • Run Node end-to-end tests.

PUNE | BANGALORE| KERALA | UK

8055223360
8882400500
Training Queries:
training@radicaltechnologies.co.in

www.radicaltechnologies.co.in

Aundh | Kharadi | Hinjewadi | HSR Layout | Kochi | Thrissur | UK

You might also like