1
Docker Certified Associate Course Content
Domain 1: Orchestration (25% • Mount volumes
of exam) • Illustrate running a
replicated vs global service
• Identify the steps needed to
troubleshoot a service not
deploying
• Apply node labels to
demonstrate placement of
tasks
• Sketch how a Dockerized
application communicates
• Complete the setup of a with legacy systems
swarm mode cluster, with • Paraphrase the importance
managers and worker of quorum in a swarm
nodes cluster
• State the differences • Demonstrate the usage
between running a of templates with “docker
container vs running a service create”
service
• Demonstrate steps to lock a Domain 2: Image Creation,
swarm cluster Management, and Registry
• Extend the instructions to (20% of exam)
run individual containers
into running services under
swarm
• Interpret the output of
“docker inspect” commands
• Convert an application
deployment into a stack file
using a YAML compose file
with • Describe Dockerfile options
• “docker stack deploy” [add, copy, volumes, expose,
• Manipulate a running stack entrypoint, etc)
of services • Show the main parts of a
• Increase # of replicas Dockerfile
• Add networks, publish ports • Give examples on how to
2
create an efficient image via deletion works
a Dockerfile • Delete an image from a
• Use CLI commands such as registry
list, delete, prune, rmi, etc to
manage images Domain 3: Installation and
• Inspect images and report Configuration(15%ofexam)
specific attributes using
• Demonstrate the ability to
upgrade the Docker engine
• Complete setup of repo,
select a storage driver, and
complete installation of
Docker
• engine on multiple
platforms
filter and format • Configure logging drivers
• Demonstrate tagging an (splunk, journald, etc)
image • Setup swarm, configure
• Utilize a registry to store an managers, add nodes, and
image setup backup schedule
• Display layers of a Docker • Create and manager user
image and teams
• Apply a file to create a • Interpret errors to
Docker image troubleshoot installation
• Modify an image to a single issues without assistance
layer • Outline the sizing
• Describe how image layers requirements prior to
work installation
• Deploy a registry (not • Understand namespaces,
architect) cgroups, and configuration
• Configure a registry of certificates
• Log into a registry • Use certificate-based client-
• Utilize search in a registry
• Tag an image
• Push an image to a registry
• Sign an image in a registry
• Pull an image from a
registry
• Describe how image
3
server authentication to and use cases for the built-
ensure a Docker daemon in network drivers
has the • Understand the Container
• rights to access images on a Network Model and how it
registry interfaces with the Docker
• Consistently repeat steps to engine
deploy Docker engine, UCP, • and network and IPAM
and DTR on AWS and on drivers
• premises in an HA config • Configure Docker to use
• Complete configuration of external DNS
backups for UCP and DTR • Use Docker to load balance
• Configure the Docker HTTP/HTTPs traffic to an
daemon to start on boot application (Configure L7
load
Domain 4: Networking (15% • balancing with Docker EE)
of exam) • Understand and describe
the types of traffic that flow
between the Docker engine,
• registry, and UCP controllers
• Deploy a service on a
Docker overlay network
• Describe the difference
between “host” and
“ingress” port publishing
mode
• Create a Docker bridge
network for a developer to Domain5:Security(15%of
use for their containers exam)
• Troubleshoot container and
engine logs to understand a • Describe the process of
connectivity issue between signing an image
• containers • Demonstrate that an image
• Publish a port so that an passes a security scan
application is accessible • Enable Docker Content
externally Trust
• Identify which IP and port
a container is externally
accessible on
• Describe the different types
4
• Configure RBAC in UCP OS
• Integrate UCP with LDAP/ • Demonstrate how to
AD configure devicemapper
• Demonstrate creation of • Compare object storage to
UCP client bundles block storage, and explain
• Describe default engine which one is preferable
security when available
• Describe swarm default • Summarize how an
security application is composed
• Describe MTLS of layers and where those
• Identity roles layers reside on
• Describe the difference • the filesystem
between UCP workers and • Describe how volumes
managers are used with Docker for
• Describe process to use persistent storage
external certificates with • Identify the steps you would
UCP and DTR take to clean up unused
images on a filesystem, also
Domain 6: Storage and on
Volumes(10%ofexam) • DTR
• Demonstrate how storage
• State which graph driver can be used across cluster
should be used on which nodes
5
Certified Kubernetes Administrator Course Content
Scheduling Management
• Understand Deployment
sand how to perform rolling
updates and rollbacks.
• Know various ways to
configure applications.
• Know how to scale
• Use label selectors to applications.
schedule Pods. • Understand the primitives
• Understand the role of necessary to create a self-
Daemon Sets. healing application.
• Understand how resource
limits can affect Pod Cluster
scheduling.
• Understand how to run • Understand Kubernetes
multiple schedulers and cluster upgrade process.
how to configure Pods • Facilitate operating system
• to use them.
• Manually schedule a pod
without a scheduler.
• Display scheduler events.
• Know how to configure the
Kubernetes scheduler.
Logging/Monitoring
upgrades.
• Understand how to monitor • Implement backup and
all cluster components. restore methodologies.
• Understand how to monitor
applications. Security
• Manage cluster component
logs. • Know how to configure
• Manage application logs. authentication and
authorization.
Application Lifecycle • Understand Kubernetes
6
security primitives. failure.
• Know to configure network • Trouble shoot networking.
policies.
• Create and manage TLS Core Concepts
certificates for cluster
components.
• Work with images securely.
• Define security contexts.
• Secure persistent keyvalue
store.
Storage • Understand the Kubernetes
API primitives.
• Understand the Kubernetes
cluster architecture.
• Understand Services and
other network primitives.
Networking
• Understand persistent
volumes and know how to • Understand the networking
create them. configuration on the cluster
• Understand access modes nodes.
for volumes. • Understand Pod
• Understand persistent networking concepts.
volume claims primitive. • Understand Service
• Understand Kubernetes networking.
storage objects. • Deploy and configure
• Know how to configure network loadbalancer.
applications with persistent • Know how to use Ingress
storage. rules.
• Know how to configure and
Troubleshooting use the cluster DNS.
• Understand CNI.
• Trouble shoot application
failure.
• Trouble shoot control plane
failure.
• Trouble shoot worker node
7
Installation,Configuration Kubernetes release binaries.
&Validation • Provision underlying
infrastructure to deploy a
• Design a Kubernetes Kubernetes cluster.
cluster. • Choose a network solution.
• Install Kubernetes masters • Choose your Kubernetes
and nodes. infrastructure configuration.
• Configure secure cluster • Run end-to-end tests on
communications. your cluster.
• Configure a Highly-Available • Analyse end-to-end tests
Kubernetes cluster. results.
• Know where to get the • Run Node end-to-end tests.
PUNE | BANGALORE| KERALA | UK
8055223360
8882400500
Training Queries:
training@radicaltechnologies.co.in
www.radicaltechnologies.co.in
Aundh | Kharadi | Hinjewadi | HSR Layout | Kochi | Thrissur | UK