Kubernetes Advanced Networking (en)

This course provides in-depth training on advanced network configuration and application security in Kubernetes. You will explore the implementation of a powerful CNI such as Cilium and learn how to manage pod connectivity. You will delve into how Kube Proxy works and traffic routing strategies. The course will also cover topics such as internal and external traffic policies, session affinity, inter-cluster communication, DNS configuration, and encryption of data in transit. You will be able to implement advanced solutions to ensure security and optimize the performance of Kubernetes applications.

By participating in this course, you will gain advanced skills to manage complex networks and improve the security of your applications in a Kubernetes environment. You will develop your professional skills as a container and orchestration expert and be ready to tackle the most demanding challenges in the field of distributed systems management.

COD: DSK301
Category : Kubernetes

Container Runtime Essential

Teaching Methodology

The course includes educational laboratories in which each student will be able to work in order to complete training exercises that will provide practical experience in using the instrument, for each of the topics covered during the course.

Prerequisites:

  • Experience configuring Kubernetes: it is preferable to have hands-on experience configuring a Kubernetes cluster, including use of tools such as kubectl and understanding of YAML manifest files.

  • Networking knowledge: it is helpful to have a solid understanding of basic networking principles, including concepts such as IP addressing, subnetting, routing, and network protocols.

  • Familiarity with security policies: it is advisable to have a general understanding of application security policies, such as authentication, authorization, and encryption.

  • Basic knowledge of cybersecurity concepts: it is helpful to have a basic understanding of common security threats and recommended practices to protect applications and data.

  • Familiarity with containerization concepts: it is advisable to have a basic understanding of containerization concepts, such as Docker and resource isolation principles.