Kubernetes for App Developers
Learning to build Kubernetes applications will open up career opportunities in high-demand roles in DevOps, cloud engineering & containerization roles. Using Python, this course teaches how to define application resources & use core primitives to build, monitor & troubleshoot scalable applications in Kubernetes — including working with network plugins, security & cloud storage to deploy applications in a production environment. This course prepares you for the Certified Kubernetes Application Developer (CKAD) exam.
Happy New Year 2026
Start 2026 right with exceptional rates on our Linux Foundation Kubernetes training. Train your teams for CKA, CKAD, and CKS certifications at a reduced price.
What you will learn
- Define application resources in Kubernetes.
- Use core primitives to build, monitor, and troubleshoot scalable applications.
- Work with network plugins, security, and cloud storage.
- Deploy applications in a production environment.
- Gain key knowledge & skills related to the Certified Kubernetes Application Developer (CKAD).
Prerequisites
- Basic Linux command line and file editing skills and familiarity with a programming language (such as Python, Node.js, Go).
- Knowledge of Cloud Native application concepts and architectures.
Target audience
- Experienced application developers who need to containerize, host, deploy, and configure an application in a multi-node cluster.
Training Program
9 modules to master the fundamentals
Topics covered
- →Objectives
- →Who You Are
- →The Linux Foundation
- →Linux Foundation Training
- →Certification Programs and Digital Badging
- →Platform Details
Topics covered
- →What Is Kubernetes?
- →Components of Kubernetes
- →Challenges
- →The Borg Heritage
- →Kubernetes Architecture
- →Terminology
- →Control Plane Node
- →Worker Nodes
- →Pods
- →Services
- →Operators
- →Single IP per Pod
- →Networking Setup
- →CNI Network Configuration File
- →Pod-to-Pod Communication
- →Cloud Native Computing Foundation
- →Resource Recommendations
- →Labs
Topics covered
- →Container Options
- →Containerizing an Application
- →Creating the Dockerfile
- →Hosting a Local Repository
- →Creating a Deployment
- →Running Commands in a Container
- →Multi-Container Pod
- →readinessProbe
- →livenessProbe
- →startupProbe
- →Testing
- →Helm
- →Kustomize
- →Labs
Topics covered
- →Traditional Applications: Considerations
- →Decoupled Resources
- →Transience
- →Flexible Framework
- →Managing Resource Usage
- →Using Label Selectors
- →Multi-Container Pods
- →Sidecar Container
- →Adapter Container
- →Ambassador
- →initContainer
- →Custom Resource Definitions
- →Points to Ponder
- →Jobs
- →Labs
Topics covered
- →Volumes Overview
- →Introducing Volumes
- →Volume Spec
- →Volume Types
- →Shared Volume Example
- →Persistent Volumes and Claims
- →Persistent Volume
- →Persistent Volume Claim
- →Dynamic Provisioning
- →Secrets
- →Using Secrets via Environment Variables
- →Mounting Secrets as Volumes
- →Portable Data with ConfigMaps
- →Using ConfigMaps
- →Deployment Configuration Status
- →Scaling and Rolling Updates
- →Deployment Rollbacks
- →Labs
Topics covered
- →Security Overview
- →Accessing the API
- →Authentication
- →Authorization
- →RBAC
- →RBAC Process Overview
- →Admission Controller
- →Security Contexts
- →Pod Security Standards
- →Network Policies
- →Network Policy Example
- →Default Policy Example
- →Labs
Topics covered
- →Service Types
- →Services Diagram
- →Service Update Pattern
- →Accessing an Application with a Service
- →Service without a Selector
- →ClusterIP
- →NodePort
- →LoadBalancer
- →ExternalName
- →Ingress Resource
- →Ingress Controller
- →Service Mesh
- →Labs
Topics covered
- →Troubleshooting Overview
- →Basic Troubleshooting Steps
- →Ongoing (Constant) Change
- →Basic Troubleshooting Flow: Pods
- →Basic Troubleshooting Flow: Node and Security
- →Basic Troubleshooting Flow: Agents
- →Monitoring
- →Logging Tools
- →Monitoring Applications
- →System and Agent Logs
- →Conformance Testing
- →More Resource
- →Labs
Topics covered
- →Evaluation Survey
Quality Process
SFEIR Institute's commitment: an excellence approach to ensure the quality and success of all our training programs. Learn more about our quality approach
- Lectures / Theoretical Slides — Presentation of concepts using visual aids (PowerPoint, PDF).
- Technical Demonstration (Demos) — The instructor performs a task or procedure while students observe.
- Guided Labs — Guided practical exercises on software, hardware, or technical environments.
The achievement of training objectives is evaluated at multiple levels to ensure quality:
- Continuous Knowledge Assessment : Verification of knowledge throughout the training via participatory methods (quizzes, practical exercises, case studies) under instructor supervision.
- Progress Measurement : Comparative self-assessment system including an initial diagnostic to determine the starting level, followed by a final evaluation to validate skills development.
- Quality Evaluation : End-of-session satisfaction questionnaire to measure the relevance and effectiveness of the training as perceived by participants.
Upcoming sessions
Train multiple employees
- Volume discounts (multiple seats)
- Private or custom session
- On-site or remote