Kubernetes Fundamentals (LFS258)

Kubernetes Fundamentals (LFS258)

Overview

The Kubernetes Fundamentals (LFS258) course offers a comprehensive introduction to Kubernetes, the leading container orchestration platform. Participants will gain hands-on experience in deploying containerized applications and managing resources via the Kubernetes API.

Objectives

By the end of this course, leaner will be able to:

  • Understand the architecture and components of Kubernetes.
  • Deploy and manage containerized applications in a Kubernetes cluster.
  • Utilize Kubernetes networking, storage, and security features.
  • Interact with Kubernetes using command-line tools and the API.
  • Prepare for the Certified Kubernetes Administrator (CKA) exam.

Prerequisites

  • Basic knowledge of Linux concepts and the command line (recommended: free Introduction to Linux course)

  • Familiarity with package managers

  • Understanding of Git and GitHub

  • Introductory knowledge of Kubernetes (recommended: free Introduction to Kubernetes course)

Course Outline

Module 1: Core Concepts of Kubernetes2025-06-05T09:25:30+05:30

 

  • Introduction to Kubernetes and container orchestration
  • Kubernetes architecture: master and worker components
  • Using kubectl and accessing the Kubernetes API
Module 2: Configuration and Workloads2025-06-05T09:35:48+05:30

 

  • Pod lifecycle and deployment strategies
  • Labels, selectors, and namespaces
  • ReplicaSets, Deployments, and rolling updates
  • Configuration using ConfigMaps and Secrets
Module 3: Networking and Storage2025-06-05T09:39:56+05:30

 

  • Service types and Ingress controllers
  • Network policies and DNS in Kubernetes
  • Volumes, Persistent Volumes (PV), and Claims (PVC)
Module 4: Scheduling and Monitoring2025-06-05T10:14:16+05:30

 

  • Affinity/anti-affinity rules and taints/tolerations
  • Probes (liveness/readiness) and resource limits
  • Monitoring using metrics-server and logging tools
Module 5: Security and Cluster Maintenance2025-06-05T10:16:42+05:30

 

  • Role-Based Access Control (RBAC) and service accounts
  • Cluster upgrades and maintenance best practices
  • Troubleshooting and backup/restore strategies
  • Preparing for the CKA exam with practical scenarios
2025-06-09T09:57:30+05:30
Go to Top