Alta3 Research

Certified Kubernetes Application Developer Training

CKAD
CKAD Logo

Certified Kubernetes Application Developer

This class prepares students for the Certified Kubernetes Application Developer (CKAD) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container  orchestration.

Training at a glance

Level

Beginner

Duration

5 Days

Experience

1 year: Linux

Average Salary

$120,000

Labs

Yes

Level

Beginner

Duration

5 Days

Experience

1 year: Linux

Average Salary

$120,000

Labs

Yes

Training Details

We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability  Kubernetes environment (and later, build your own) capable of demonstrating all “K8s’’ features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. 

All topics required by the CKAD exam, including: 

  • Deploy applications to a Kubernetes cluster 
  • Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) 
  • Define, build and modify container images 
  • Implement probes and health checks 
  • Understand multi-container Pod design patterns (e.g. sidecar, init, and others)
  • Understand ConfigMaps 
  • Create & consume Secrets 
  • Troubleshooting and debugging tools 
  • Provide and troubleshoot access to applications via services 
  • Use Ingress rules to expose applications 
Lesson 1: From Containers to Kubernetes 
  • Kubernetes Architecture
  • Define, build, and modify container images
  • Pods and the Control Plane
  • Deploy Kubernetes using Ansible

Lesson 2: Cluster Basics 
  • Namespaces and Fundamental Kubectl Commands
  • Isolating Resources with Kubernetes Namespaces
  • Contexts
  • Cluster Access with Kubernetes Context
  • Kubectl get and sorting
  • Listing Resources with kubectl get
  • Examining Resources with kubectl describe

Lesson 3: Pod Basics 
  • YAML and how to read it
  • Manifests for Pods
  • Create and Configure Basic Pods
  • API Versioning and Deprecations

Lesson 4: Container Health, Security, and Observability 
  • Kubectl port-forward
  • Debugging via kubectl port-forward
  • Imperative vs. Declarative Resource Creation
  • Kubectl exec and cp
  • Performing Commands inside a Pod
  • Readiness and Liveness Probes
  • Implement Probes and Health Checks
  • Security Contexts for Pods
  • Understanding Security Contexts

Lesson 5: Resource Management 
  • Limits, Requests, and Namespace ResourceQuotas
  • Understanding and Defining Resource Requirements, Limits, and Quotas
  • Kubectl Top and Application Monitoring
  • Admission Controller
  • Create a LimitRange AdmissionController

Lesson 6: RBAC 
  • LEC: Role Based Access Control
  • LAB-S1: Role Based Access Control
  • LAB-S2: RBAC Distributing Access

Lesson 7: Logging 
  • Logging with kubectl log
  • Advanced Logging Techniques
  • Advanced Logging Techniques

Lesson 8: Ephemeral Storage 
  • Creating Ephemeral Storage For Fluentd Logging Sidecar
  • Best Practices for Container Customization
  • ConfigMaps and Volume Mounting
  • Persistent Configuration with ConfigMaps
  • Secrets
  • Create and Consume Secrets

Lesson 9: Persistent Storage 
  • Persistent Volumes, Claims, and StorageClasses
  • Using PersistentVolumeClaims for Storage
  • Stateful Containers for Testing
  • Persistent Storage with NFS

Lesson 10: Multi-Container Pod Design 
  • Multi-Container Pods
  • Understand the Sidecar Multi-Container Pod Design Pattern
  • Init Containers
  • Understand the Init Container Multi-Container Pod Design Pattern

Lesson 11: Deployments 
  • Labels
  • Understanding Labels and Selectors
  • Annotations
  • Insert an Annotation
  • ReplicaSets
  • Create and Configure a ReplicaSet
  • DaemonSets
  • Deployments- Purpose and Advantages
  • Writing a Deployment Manifest
  • Deployments- Version Control
  • Performing Rolling Updates and Rollbacks with Deployments
  • Blue/Green and Canary Deployment Strategies
  • Advanced Deployment Strategies
  • Deployments- Horizontal Scaling
  • Horizontal Scaling with kubectl scale
  • Horizontal Pod Autoscaling
  • Kubectl patch
  • Patching Deployments and Nodes

Lesson 12: Jobs and CronJobs 
  • Jobs and CronJobs
  • Understand Jobs and CronJobs

Lesson 13: Affinity and Anti-Affinity 
  • Taints, Tolerations, and Pod Affinity
  • Tainted Nodes and Tolerations

Lesson 14: NetworkPolicy 
  • NetworkPolicy
  • Deploy a NetworkPolicy

Lesson 15: Services and Ingress 
  • Services- LoadBalancer, NodePort, and ClusterIP
  • Provide and troubleshoot access to applications via services
  • Networking Plugins
  • Ingress Controllers
  • Use Ingress Rules to Expose Applications

Lesson 16: DNS 
  • LEC: Hostnames and FQDNs
  • Hostnames and FQDNs

Lesson 17: The Helm Package Manager 
  • Helm
  • Using the Helm Package Manager to Deploy Existing Packages
  • CHALLENGE LAB: Setting up a single tier service mesh
  • A Completed Project

Lesson 18: Extending Kubernetes 
  • Custom Resource Definitions
  • Custom Resource Definitions (CRDs)

Lesson 19: Troubleshooting 
  • Troubleshooting

Lesson 20: CKAD 
  • Tips to Pass your CKAD Exam
  • CKAD Practice Drill
  • CKAD Exam Bookmarks

Lesson 21: Bonus Labs 
  • Calicoctl
  • Deploy a Kubernetes Cluster using Kubeadm
  • Create ServiceAccounts for use with the Kubernetes Dashboard
  • Sourcing Secrets from HashiCorp Vault
  • VNC Desktop
  • Saving Your Progress With GitHub
  • Create a Cluster Docker Registry
  • Advanced Kubernetes Challenge – Build an Application
  • Comfortable with an OCI-compliant container runtime, such as Docker or rkt
  • Cloud native application concepts and architectures
  • Fluent in a programming language
  • Basic Linux skills are helpful
  • Familiarity with a text editor like vi, vim, or nano is helpful

Upcoming Classes

We Offer More Than Just Alta3 Research Trainings

Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.

Strategic Planning & Project Management

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.

IT & Cybersecurity

ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.

Leadership & Management

Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.