Kubernetes Networking with Calico Training Course
Project Calico is a networking solution for containers and virtual machines. Originally created for OpenStack to simplify data transmission across the network, today it supports Kubernetes, OpenShift, Docker EE, OpenStack, bare metal services, and others. Calico uses IP routing instead of switching, virtual networks, overlay networks, and other complicated workarounds to enable efficient and secure networking.
This instructor-led, live training (online or onsite) is aimed at engineers who wish to network Kubernetes clusters using a simplified IP routing based approach.
By the end of this training, participants will be able to:
- Install and configure Calico.
- Use Calico to create a container networking solution for Kubernetes clusters.
- Understand how Calico differs from traditional overlay networks.
- Understand how Calico combines internet routing protocols with consensus-based data stores.
- Use Calico to provide a secure network policy for Kubernetes.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about Project Calico, please visit: https://www.projectcalico.org/
Course Outline
Introduction
- Layer 3 networking vs overlay networks
Installing and Configuring Calico
Overview of Calico Features and Architecture
The Problem with Traditional Overlay Networks
Understanding L3 Connectivity and IP Routing
Overview of Calico Components
Setting up a Kubernetes Network Policy with Calico
Setting up IP Routes on Each Host
Deploying an Application
Creating an Advanced Network Policy
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of cloud computing concepts
- Networking experience
Audience
- Network engineers
- System administrators
- DevOps engineers
- Developers
Open Training Courses require 5+ participants.
Kubernetes Networking with Calico Training Course - Booking
Kubernetes Networking with Calico Training Course - Enquiry
Kubernetes Networking with Calico - Consultancy Enquiry
Testimonials (1)
he was patience and understood that we fall behind
Albertina - REGNOLOGY ROMANIA S.R.L.
Course - Deploying Kubernetes Applications with Helm
Upcoming Courses
Related Courses
Introduction to Minikube and Kubernetes
21 HoursThis instructor-led, live training in the US (online or onsite) is aimed at beginner-level to intermediate-level software developers and DevOps professionals who wish to learn how to set up and manage a local Kubernetes environment using Minikube.
By the end of this training, participants will be able to:
- Install and configure Minikube on their local machine.
- Understand the basic concepts and architecture of Kubernetes.
- Deploy and manage containers using kubectl and the Minikube dashboard.
- Set up persistent storage and networking solutions for Kubernetes.
- Utilize Minikube for developing, testing, and debugging applications.
Minikube for Developers
14 HoursThis instructor-led, live training in the US (online or onsite) is aimed at intermediate-level developers and DevOps engineers who wish to use Minikube as a part of their development workflow.
By the end of this training, participants will be able to:
- Set up and manage a local Kubernetes environment using Minikube.
- Understand how to deploy, manage, and debug applications on Minikube.
- Integrate Minikube into their continuous integration and deployment pipelines.
- Optimize their development process using Minikube's advanced features.
- Apply best practices for local Kubernetes development.
Deploying Kubernetes Applications with Helm
7 HoursThis instructor-led, live training in the US (online or onsite) is aimed at engineers who wish to use Helm to streamline the process of installing and managing Kubernetes applications.
By the end of this training, participants will be able to:
- Install and configure Helm.
- Create reproducible builds of Kubernetes applications.
- Share applications as Helm charts.
- Run third-party applications saved as Helm charts.
- Manage releases of Helm packages.
Running Containers Directly from Kubernetes with CRI-O
14 HoursThis instructor-led, live training (online or onsite) is aimed at engineers wishing to run containerized applications using the CRI-O container runtime.
By the end of this training, participants will be able to:
- Install and configure the CRI-O container runtime.
- Pull images from a variety of OCI-compliant registries.
- Run, test and manage containerized applications using CRI-O.
Format of the Course
- Interactive lecture and discussion
- Lots of exercises and practice
- Hands-on implementation in a live-lab environment
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CRI-O, please visit: http://cri-o.io/.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in the US (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
ONAP for Automating Telecommunication Systems and Operations
21 HoursThis instructor-led, live training in the US (online or onsite) is aimed at telecom engineers, developers, and IT personnel who wish to use ONAP and optimize telecommunication network functions.
By the end of this training, participants will be able to:
- Install Open Network Automation Platform and configure the necessary frameworks.
- Understand the components and concepts foundational to the ONAP environment.
- Build and automate physical and virtual telecommunication network functions.
- Manage and optimize the life cycles of systems and operations executed through ONAP.
- Leverage the features of ONAP and overcome the challenges to telecommunication applications.
System and Network Security with FortiGate
21 HoursThis instructor-led, live training in the US (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats.
By the end of this training, participants will be able to:
- Install and configure the preferred FortiGate NGFW software and hardware model.
- Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
- Manage various forms of external and internal threats using FortiGate features.
- Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
- Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
- Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
- Implement Fortinet security solutions in other enterprise applications.
Introduction to FortiGate 1100E
14 HoursThis instructor-led, live training in the US (online or onsite) is aimed at beginner-level network administrators who wish to use FortiGate 1100E to manage and secure their network environments effectively.
By the end of this training, participants will be able to:
- Understand the basic architecture and features of FortiGate 1100E.
- Learn how to deploy FortiGate 1100E in various network environments.
- Gain hands-on experience with basic configuration and management tasks.
- Understand security policies, NAT, and VPNs.
- Learn to monitor and maintain FortiGate 1100E.
Fortigate 600E Security Administration and Operations
14 HoursThis instructor-led, live training in the US (online or onsite) is aimed at intermediate-level network and security professionals who wish to effectively manage and secure networks using Fortigate 600E equipment, with a specific focus on HA configurations for enhanced reliability and performance.
By the end of this training, participants will be able to:
- Understand the features, specifications, and operating principles of the Fortigate 600E firewall.
- Perform the initial setup of the Fortigate 600E, including basic configuration tasks like setting up interfaces, routing, and initial firewall policies.
- Configure and manage advanced security features such as SSL VPN, user authentication, antivirus, IPS, web filtering, and anti-malware capabilities to protect against a variety of network threats.
- Troubleshoot common issues in HA setups and effectively manage HA environments.
FortiGate 7.4 Administration
21 HoursThis instructor-led, live training in the US (online or onsite) is aimed at intermediate-level network administrators who wish to manage and secure their networks using FortiGate firewalls.
By the end of this training, participants will be able to:
- Understand Fortigate features and functionalities, particularly those introduced or enhanced in version 7.4.
- Configure and manage FortiGate devices and implement advanced security features.
- Deploy and manage advanced security measures like IPS, antivirus, web filtering, and threat management.
- Monitor network activities, analyze logs, and generate reports for auditing and compliance.
Fortinet NSE1
7 HoursThis instructor-led, live training in the US (online or onsite) is aimed at beginner-level network security professionals who wish to learn the concept of cybersecurity and the current global threat landscape.
By the end of this training, participants will be able to:
- Understand the current global threat landscape and identify the main types of cyber adversaries.
- Recognize the primary types of malware and the mechanics of cyber attacks.
- Understand the basics of network security and the importance of a layered security approach.
- Learn about Fortinet's Security Fabric and how it addresses modern cybersecurity challenges.
Fortinet NSE2
14 HoursThis instructor-led, live training in the US (online or onsite) is aimed at beginner-level technical professionals who wish to learn the concept of the Security Fabric and how it evolved to address the cybersecurity needs of organizations.
By the end of this training, participants will be able to:
- Learn the evolution of cybersecurity and how it has shaped current security technologies.
- Use Fortinet products to protect against specific types of cyber threats and attacks.
- Understand the integration and automation capabilities of Fortinet solutions in providing a coordinated response to cyber incidents.
Fortinet NSE3
14 HoursThis instructor-led, live training in the US (online or onsite) is aimed at intermediate-level technical professionals who wish to delve deeper into the technical aspects and functionalities of Fortinet’s product line to effectively recommend, sell, and implement Fortinet security solutions.
By the end of this training, participants will be able to:
- Gain in-depth knowledge of Fortinet’s advanced security solutions and products.
- Understand the technical features, benefits, and deployment scenarios for each core Fortinet product.
- Configure, manage, and troubleshoot Fortinet solutions in diverse environments.
- Apply Fortinet products to address complex security challenges and requirements.
Fortinet NSE4 - FortiOS
14 HoursThis instructor-led, live training in the US (online or onsite) is aimed at experienced network security managers who wish to gain the knowledge and skills needed to deploy, manage, and troubleshoot Fortinet's FortiGate security appliances running on FortiOS 7.2 as an NSE4 Network Security Professional.
By the end of this training, participants will be able to:
- Understand Fortinet's product portfolio and the role of FortiOS in network security.
- Implement effective firewall policies, security profiles, and Network Address Translation (NAT).
- Utilize security services and ensure network redundancy and failover.
- Implement security best practices and optimize security policies for compliance and threat mitigation.