DevSecOps Pipelines
- Description
- Curriculum
- FAQ
- Notice
- Reviews

Harness Kubernetes’ extensibility to deploy modern patterns and learn to effectively handle production issues
Key Features
- Build and run efficient cloud-native applications on Kubernetes using industry best practices
- Operate Kubernetes in a production environment, troubleshoot clusters, and address security concerns
- Deploy cutting-edge Kubernetes patterns such as service mesh and serverless to your cluster
Description
Kubernetes is a modern cloud native container orchestration tool and one of the most popular open source projects worldwide. In addition to the technology being powerful and highly flexible, Kubernetes engineers are in high demand across the industry.
This course is a comprehensive guide to deploying, securing, and operating modern cloud native applications on Kubernetes. From the fundamentals to Kubernetes best practices, this training covers essential aspects of configuring applications. You’ll even explore real-world techniques for running clusters in production, tips for setting up observability for cluster resources, and valuable troubleshooting techniques. Finally, you’ll learn how to extend and customize Kubernetes, as well as gaining tips for deploying service meshes, serverless tooling, and more on your cluster.
By the end of this Kubernetes course, you’ll be equipped with the tools you need to confidently run and extend modern applications on Kubernetes.
What you will learn
- Set up Kubernetes and configure its authentication
- Deploy your applications to Kubernetes
- Configure and provide storage to Kubernetes applications
- Expose Kubernetes applications outside the cluster
- Control where and how applications are run on Kubernetes
- Set up observability for Kubernetes
- Build a continuous integration and continuous deployment (CI/CD) pipeline for Kubernetes
- Extend Kubernetes with service meshes, serverless, and more
Intended Audience
This Learning Path is intended specifically for Docker and Kubernetes application developers. Anyone interested in learning how to work with Kubernetes will also benefit from this Learning Path.
Prerequisites
A solid understanding of containers, and Docker in particular, will be of value. If you are not comfortable with Docker and Kubernetes , you are encouraged to complete the Docker and Kubernetes Learning Path.This Learning path helps you to learn from fundamentals to advanced Docker and Kubernetes running on Linux machines. You should be comfortable working with basic Linux commands.
Additional Documentation
-
23Logging in to the Amazon Web Services Console
-
24Connecting to the Virtual Machine using SSH
-
25Launch Jenkins and SonarQube Docker Containers
-
26Login to SonarQube and Generate Security Token
-
27Log in to Jenkins and Complete the Default Installation
-
28Install and Configure SonarQube and Gradle Plugins
-
29Create and Execute Jenkins Pipeline Gradle Job
-
30Review SonarQube Static Analysis Report
-
31Validate AWS Lab
-
32Logging in to the Amazon Web Services Console
-
33Opening the AWS Cloud9 IDE
-
34Inspecting the Sample Application Code
-
35Demonstrating the Application's Vulnerability
-
36Preventing the Vulnerability With Static Analysis in the CI/CD Pipeline
-
37Fixing the Vulnerability Detected By Static Analysis
-
38Verifying the Application Vulnerability is Fixed
-
39Validate AWS Lab
-
40Logging in to the Amazon Web Services Console
-
41Opening the AWS Cloud9 IDE
-
42Understanding the Infrastructure as Code Project
-
43Using Terraform's Built-In Analysis Capabilities
-
44Working with TFLint
-
45Working With Terrascan
-
46Configuring the Jenkins Automation Server
-
47Triggering Jenkins Builds
-
48Creating and Subscribing to an SNS Topic
-
49Receiving Build Alerts
-
124Logging in to the Amazon Web Services Console
-
125Opening the AWS Cloud9 IDE
-
126Installing HashiCorp Vault
-
127Starting the Vault Sever in Development Mode
-
128Understanding the LDAP Directory
-
129Creating Vault Policies for the Organization
-
130Configuring Vault LDAP Authentication
-
131Testing the LDAP Authentication and Access Policies
-
132Validate AWS Lab