Kubernetes fundamentals

Discover Kubernetes and learn how to manage containerized workloads and services on Kubernetes clusters

K8S100 v1
1 day (7 hours)

Course overview

Discover the world of containers and Kubernetes in one day. You will learn how to boost your business by deploying secure, resilient and scalable services. This course offers many practical workshops, including the deployment of a production grade application.

Learning outcomes

This course teaches participants the following skills:

  • Understand how containers work
  • Understanding the architecture of Kubernetes
  • Manage a Kubernetes cluster using the kubectl command
  • Understand the main resources offered by Kubernetes
  • Manage access control and isolate sensitive information using Secrets and RBAC


No prerequisite is necessary to make the most of this course.

Target audience

This course is intended for the following participants:

Consultants, developers, cloud architects, administrators and SysOps / DevOps staff, IT managers and all participants wishing to discover Kubernetes.

Course Outline

Module 1: Docker and containers

  • Why use containers?
  • What is an image and a container?
  • Build your own image

Module 2: Kubernetes Architecture

  • Understanding the components of the Kubernetes control plane
  • Understand the architecture of Kubernetes: pods, namespaces, labels
  • Understand that Kubernetes is a big API

Module 3: Kubernetes Operations

  • Working with the kubectl command
  • Inspect the cluster and pods
  • View Pods console output
  • Connect to a pod interactively


  • Manipulate the kubectl command line

Module 4: Deployments and ReplicaSet

  • Create and use Deployments
  • Scaling your workload thanks to the scheduler and ReplicaSet


  • Deploy an Nginx proxy
  • Downscale and upscale our proxy

Module 5: Service

  • Learn to expose applications within the cluster


  • Exhibiting a Nginx through a service

Module 6: Persistence and Storage

  • Reserve storage space with PersistentVolume
  • ConfigMap to centralize configuration artifacts
  • Use Secret to isolate sensitive data


  • Use ConfigMap to configure a Spring application

Module 7: Access control and security in Kubernetes

  • Understanding authentication and authorization to the Kubernetes cluster
  • Define Kubernetes RBAC roles and role bindings to access resources in namespaces


  • Prohibit access to sensitive data

€600 ex. VAT

Suggested courses

Kubernetes Administration (LFS458)
This course covers the core concepts typically used to build and administer a Kubernetes cluster in production, using vendor-independent tools. We build a cluster, determine network configuration, grow the cluster, deploy applications and configure the storage, security and other objects necessary for typical use. This course offers exposure to the many skills necessary to administer Kubernetes in a production environment and is excellent preparation for the Certified Kubernetes Administrator (CKA) exam. This course does not focus on one vendor’s tools. Most courses are vendor-locked. We use kubeadm to deploy the cluster and focus on tools that would work on anyone’s Kubernetes cluster.
Kubernetes for App Developers (LFD459)
This course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster. Starting with a simple Python script, you will define application resources and use core primitives to build, monitor and troubleshoot scalable applications in Kubernetes. Working with network plugins, security and cloud storage, you will be exposed to many of the features needed to deploy an application in a production environment. The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

Contact us

You can unsubscribe from our communications at any time.

In order to take into account your request, we must store and process your personal data. If you authorize us to store your personal data for this purpose, check the box below.

By clicking on « Send » below, you authorize SFEIR to store and process the personal data submitted above so that it can provide you with the requested content.