Docker basics - course RUB 27,500. from IBS Training Center, training 16 hours, Date: December 7, 2023.
Miscellaneous / / November 30, 2023
Assessment and training of IT specialists in key areas of software development. Courses from expert practitioners in programming languages, system and business analysis, software architecture, manual and automated software testing, Big Data and machine learning, project management and Agile. There is a 10% discount on training for individuals.
He has been working in the field of information security and information technology for more than 15 years, from the position of an engineer to the head of a department. Has extensive experience in designing and implementing infrastructure solutions based on Linux, FreeBSD, Windows, and active network equipment. In the field of information security, the main areas are SIEM/SOAR, IRP, PAM, EDR, implementation of network security tools, virtualization environment protection tools and others.
About projects:
He has been teaching since 2019. During this time, he developed several proprietary courses on information security: “Practical protection in process control systems”, “Incident management of information security”, “Reverse engineering of software for Windows”. Nowadays, he teaches courses both offline and online.Topics covered:
1. Containers and VMS.
2. Docker Dictionary.
3. Installing Docker.
4. Docker Basics.
5. Data sharing.
6. Network resources.
7. Creation of images.
8. Swarm.
9. Services and stack.
10. Using Docker, useful scripts and tips.
In this course you will gain all the necessary knowledge to work with Kubernetes. You'll learn what Kubernetes is, its architecture, and the core components and services to get your project off the ground. You'll set up a training Kubernetes cluster, define and launch Kubernetes entities such as pods, replica sets, and deployments. You will learn how networking is organized in Kubernetes, what types of services are available, and when it is best to use them. You'll configure the application using ConfigMaps and use Secrets entities to store sensitive data. The course ends with a discussion of volumes for long-term data storage. In addition to fundamental knowledge, you will learn how to troubleshoot in case something goes wrong.
4,2