Free workshops online
Descriptions and registration
CKA & CKAD Exam Prep Booster
Enhance Your Success in the Kubernetes Exams
23 June 9:00-13:00 CET !date change!
Read More
Obtaining the Certified Kubernetes Administrator (CKA) or Certified Kubernetes Application Developer (CKAD) certification can greatly enhance your CV and significantly increase your prospects of securing your dream job. You have already dedicated considerable time and effort to studying the subjects covered in the CKA & CKAD curriculum. However, if you still lack confidence in your ability to pass these exams, we have the perfect solution for you.
Join our highly interactive and results-driven workshop designed to assist you! Led by our esteemed Kubernetes instructor and renowned course author, the workshop begins with a brief overview of the main domains, exam structure, testing environment, and scoring criteria. Following that, our instructor will address any questions you may have regarding unclear topics and provide valuable tips on effectively managing your exam time.
By the end of the workshop, armed with newfound knowledge and a confident mindset, you will be well-prepared to conquer the CKA and CKAD exams.
Kubernetes security
Users and authorizations
28 June 8:00-12:00 EDT / 14:00-18:00 CET
Read More
Kubernetes security is a critical aspect of maintaining the integrity and protection of containerized applications and infrastructure. One key area of focus is user management and authorizations within Kubernetes. User authentication and authorization mechanisms play a pivotal role in ensuring that only authorized individuals or entities have access to the Kubernetes cluster and its resources. Understanding the various authentication methods, such as certificates, tokens, and external identity providers, is essential for establishing a secure user authentication process. Additionally, configuring role-based access control (RBAC) policies and defining appropriate roles and permissions are vital for managing user authorizations effectively. Overall, a comprehensive understanding of Kubernetes user management and authorizations is crucial for establishing a secure and controlled environment for containerized applications.
In this workshop we will discuss:
- how does Kubernetes establishes the identity of a request
- how can we authenticate identities from different sources into a Kubernetes cluster
- How Role Based Access Control works
Kubernetes and Container Networking
The journey of an IP packet
28 June 9:00-13:00 CET
Read More
Understanding Kubernetes networking is crucial for successful deployment and management of containerized applications. It enables efficient communication and coordination between containers, allowing them to work seamlessly across multiple nodes in a cluster. Without a solid grasp of Kubernetes networking concepts like services, pods, and ingress, it becomes challenging to optimize performance, ensure security, and troubleshoot issues within the cluster.
In this workshop we will first investigate how containers can be connected to the network with the help of the different functionalities provided by the Linux kernel. Next we will dive deep into the service concept, trying to answer the “Why do we need services?”, “What are they doing?” and most importantly “How?” questions.
The registration and the participation in the training(s) does not entail any further obligations.