| 1 | Introduction to Kubernetes |
| 2 | Kubernetes (K8s) architecture |
| 3 | Deployments and replica sets in AKS |
| 4 | Introduction to services (ClusterIP, NodePort) |
| 5 | LoadBalancer service in AKS |
| 6 | Configuring YAML for deployments and services |
| 7 | Practice: Deploy and expose a simple web app on AKS |
| 8 | Containers and Docker basics |
| 9 | Using ACR with AKS |
| 10 | Namespaces in AKS |
| 11 | Labels and selectors in AKS |
| 12 | Introduction to PV and PVC |
| 13 | Azure Files in AKS |
| 14 | Practice: Deploy an app using PVC from Azure Files |
| 15 | Deploying an AKS cluster with CLI |
| 16 | Scaling and autoscaling in AKS |
| 17 | AKS network basics and Azure VNET |
| 18 | Network policies in AKS |
| 19 | Ingress basics (NGINX Ingress Controller) |
| 20 | Internal and external load balancing |
| 21 | Practice: Deploy a multi-tier app with network policies and ingress |
| 22 | Persistent Volumes (PV) in AKS |
| 23 | Persistent Volume Claims (PVC) |
| 24 | Azure Disks for storage in AKS |
| 25 | Using ConfigMaps for configuration |
| 26 | Using Secrets for sensitive data |
| 27 | RBAC basics and user roles in AKS |
| 28 | Practice: Deploy a secure app using ConfigMaps, Secrets, and RBAC |
| 29 | AAD integration for secure authentication |
| 30 | Azure Active Directory roles and AKS RBAC |
| 31 | Introduction to logging in AKS |
| 32 | Monitoring with Azure Monitor and Container Insights |
| 33 | Scaling with Horizontal Pod Autoscaler (HPA) |
| 34 | Vertical Pod Autoscaler (VPA) and Cluster Autoscaler |
| 35 | Practice: Deploy an app with monitoring and autoscaling |
| 36 | Introduction to CI/CD in AKS |
| 37 | Setting up Azure DevOps pipelines |
| 38 | Using Helm for package management |
| 39 | Helm Chart management and customization |
| 40 | Automating deployments with Helm and pipelines |
| 41 | Configuring advanced Azure DevOps CI/CD pipelines |
| 42 | Practice: Deploy an end-to-end CI/CD pipeline |
| 43 | Kubernetes best practices for reliability and scaling |
| 44 | Security best practices in AKS |
| 45 | Resource management and cost optimization |
| 46 | Managing updates and maintenance for AKS |
| 47 | AKS troubleshooting and debugging |
| 48 | Handling secrets and credentials securely |
| 49 | Practice: Apply best practices for security, scaling, and cost management |
| 50 | Running multi-region AKS deployments |
| 51 | Disaster recovery and backup strategies for AKS |
| 52 | Kubernetes upgrade and versioning in AKS |
| 53 | Implementing AKS operational monitoring |
| 54 | Managing resource limits and quotas |
| 55 | Creating multi-tenant applications in AKS |
| 56 | Final Project Part 1: Design a multi-tier app with best practices |
| 57 | Final Project Part 2: Deploy a secure, scalable app with CI/CD, monitoring, and storage |
| 58 | Final Review and Assessment |
| 59 | Roles and Responsibilities |
| 60 | CKA and CKAD Certification |
Comments
Post a Comment