Online workshops
Descriptions and registration
CKA & CKAD Exam Prep Booster – 50 EUR
Enhance Your Success in the Kubernetes Exams
23 June 9:00-13:00 CET !date change!
Read More
Obtaining the Certified Kubernetes Administrator (CKA) or Certified Kubernetes Application Developer certification can greatly enhance your CV and significantly increase your prospects of securing your dream job. You have already dedicated considerable time and effort to studying the subjects covered in the CKA & CKAD curriculum. However, if you still lack confidence in your ability to pass these exams, we have the perfect solution for you.
Join our highly interactive and results-driven workshop designed to assist you! Led by our esteemed Kubernetes instructor and renowned course author, the workshop begins with a brief overview of the main domains, exam structure, testing environment, and scoring criteria. Following that, our instructor will address any questions you may have regarding unclear topics and provide valuable tips on effectively managing your exam time.
By the end of the workshop, armed with newfound knowledge and a confident mindset, you will be well-prepared to conquer the CKA and CKAD exams.
Kubernetes security – 50 EUR
Users and authorizations
28 June 8:00-12:00 EDT / 14:00-18:00 CET
Read More
Kubernetes security is a critical aspect of maintaining the integrity and protection of containerized applications and infrastructure. One key area of focus is user management and authorizations within Kubernetes. User authentication and authorization mechanisms play a pivotal role in ensuring that only authorized individuals or entities have access to the Kubernetes cluster and its resources. Understanding the various authentication methods, such as certificates, tokens, and external identity providers, is essential for establishing a secure user authentication process. Additionally, configuring role-based access control (RBAC) policies and defining appropriate roles and permissions are vital for managing user authorizations effectively. Overall, a comprehensive understanding of Kubernetes user management and authorizations is crucial for establishing a secure and controlled environment for containerized applications.
In this workshop we will discuss:
- how does Kubernetes establishes the identity of a request
- how can we authenticate identities from different sources into a Kubernetes cluster
- How Role Based Access Control works
Kubernetes troubleshooting – 50 EUR
Can we fix it? Yes we can!
29 June 8:00-12:00 EDT / 14:00-18:00 CET
Read More
In this interactive session, we will dive into the world of Kubernetes and equip you with essential tools and techniques to effectively troubleshoot issues that may arise in your Kubernetes clusters.
Throughout the workshop, we will explore common challenges and provide practical solutions for resolving them. You will learn about powerful troubleshooting tools and utilities that can help you identify and diagnose problems of workloads in Kubernetes.
This workshop includes a hands-on lab where you can apply the troubleshooting techniques you’ve learned to real-world scenarios. This practical experience will enhance your understanding and confidence in tackling Kubernetes issues head-on.
Whether you are a developer, a system administrator, or a Kubernetes enthusiast, this workshop will provide you with valuable insights and skills to effectively troubleshoot and resolve problems in your Kubernetes environment.
Kubernetes and Container Networking – 50 EUR
The journey of an IP packet
28 June 9:00-13:00 CET
Read More
Understanding Kubernetes networking is crucial for successful deployment and management of containerized applications. It enables efficient communication and coordination between containers, allowing them to work seamlessly across multiple nodes in a cluster. Without a solid grasp of Kubernetes networking concepts like services, pods, and ingress, it becomes challenging to optimize performance, ensure security, and troubleshoot issues within the cluster.
In this workshop we will first investigate how containers can be connected to the network with the help of the different functionalities provided by the Linux kernel. Next we will dive deep into the service concept, trying to answer the “Why do we need services?”, “What are they doing?” and most importantly “How?” questions.
Securing communication with Istio – 50 EUR
Encrypt your traffic without pain
29 June 9:00-13:00 CET
Read More
In today’s digital landscape securing communication within microservices architecture is of utmost importance. Istio offers robust capabilities to enhance the security of your distributed applications.
In this workshop, we will explore the various features and functionalities of Istio that enable secure communication between microservices. From mutual TLS authentication to fine-grained access control policies, Istio provides a comprehensive toolkit for securing service-to-service communication within your Kubernetes clusters.
Throughout the workshop, we will delve into practical demonstrations and hands-on exercises to help you understand how to configure and deploy Istio to strengthen the security posture of your applications. You will learn how to implement mTLS encryption, enforce access control policies.
Whether you are a developer, an operations engineer, or a security professional, this workshop will equip you with the knowledge and skills to confidently implement secure communication using Istio.