Colleagues, in the Cloud Native Application Architecture training you will master the skills necessary to become a successful cloud native architect. Use open source tools and projects like ArgoCD, gRPC and Grafana. Experience with HTTP, Python, Git, Linux, Docker is recommended. Training modules and hands-on projects include: 1) Cloud Native Fundamentals - structure, package, and release an application to a Kubernetes cluster, while using an automated CI/CD pipeline. Students will start by applying a suite of good development practices within an application, package it with Docker and distribute it through DockerHub. This will transition to the exploration of Kubernetes resources and how these can be used to deploy an application. Students will learn the fundamentals of Continuous Integration and Continuous Delivery (CI/CD) with GitHub Actions and ArgoCD and completely automate the release process for an application (Project: TechTrends), 2) Message Passing - Learn how to refactor microservice capabilities from a monolithic architecture, and employ different forms of message passing in microservices. To begin, students will create a migration strategy to refactor a service from a monolith to its own microservice and implement the migration (Project:Refactor UdaConnect), 3) Observability - This course covers the fundamentals of observability in distributed systems. Today, Kubernetes has become the de facto standard for Cloud Native applications and is widely used for distributed systems. Visualize data in a dashboard using Grafana (Project: Building a Metrics Dashboard), and 4) Microservices Security - Learn how to harden a Docker and Kubernetes microservices architecture. To begin, students will learn STRIDE to threat model and reason about microservice security. Next, students will dig deep to explore the Docker and Kubernetes attack surface and be introduced to industry open-source tools such as Docker-bench and Kube-bench to evaluate and harden Docker and Kubernetes weaknesses. Students will then learn about software composition analysis with Trivy and Grype to evaluate image layers and common application security vulnerabilities and provide remediation. Then deploy runtime security monitoring to introspect running microservices for security signals and learn how to respond to a security incident (Project: Hardened Microservices Environment).
Enroll today (teams & execs welcome): https://tinyurl.com/yckpzdx4
Much career success, Lawrence E. Wilson - Online Learning Central
No comments:
Post a Comment