Hands-On Kubernetes, Service Mesh and Zero-Trust

Upskill like a boss. Break, fix, and master Kubernetes before your competition even starts reading docs on zero-trust architecture. 

(KUBERNETES.AW1) / ISBN : 978-1-64459-674-6
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Master Kubernetes, Istio, and Zero Trust security hands-on because deploying resilient, secure apps shouldn’t feel like solving a mystery. 

In this course, you’ll explore Kubernetes fundamentals, from Pods to scaling. Then lock it down with Zero Trust principles. Later, harness Istio’s power for traffic control, observability, and ironclad security. 

Break things, fix them, and own the cloud with labs on service mesh, monitoring, and disaster recovery. By the end, you’ll deploy like a professional and outmaneuver production nightmares before they happen.

Future-proof your tech stack. Get your hands dirty. 

Skills You’ll Get

  • Deploy and manage containerized applications using Kubernetes.
  • Master Kubernetes core concepts like Pods, Deployments, ReplicaSets, DaemonSets, and StatefulSets. 
  • Implement load balancing and traffic routing with Ingress controllers and API gateways. 
  • Secure applications with ConfigMaps, Secrets, RBAC, and Zero Trust Architecture. 
  • Configure persistent storage and handle disaster recovery in Kubernetes. 
  • Optimize service discovery for scalable microservices architectures. 
  • Set up monitoring, logging, and observability with Prometheus, Grafana, and distributed tracing
  • Auto-scaling applications efficiently to handle dynamic workloads. 
  • Deploy and manage Istio Service Mesh for advanced traffic control, security, and observability. 
  • Enforce authentication, authorization, and mTLS with Istio for secure service communication. 
  • Troubleshoot and enhance reliability using SRE principles and best practices. 
  • Simulate and mitigate failures with circuit breaking, retries, and fault injection.
  • Visualize service dependencies and performance with Kiali. 
  • Balance performance, security, and cost in real-world Kubernetes environments. 

1

Preface

2

Docker and Kubernetes 101

  • Introduction
  • Introduction to Docker
  • Introduction to Kubernetes
  • Installing Kubernetes
  • Kubernetes client
  • Strategies to validate cluster quality
  • Conclusion
  • Points to remember
3

PODs

  • Introduction
  • Concept of Pods
  • CRUD operations on Pods
  • Accessing PODs
  • Managing resources
  • Data persistence
  • Health checks
  • POD security
  • Conclusion
  • Points to remember
  • Questions
4

HTTP Load Balancing with Ingress

  • Introduction
  • Networking 101
  • Ingress specifications and Ingress controller
  • Effective Ingress usage
  • Advanced Ingress
  • Alternate implementations
  • API gateways
  • Securing network
  • Best practices for securing a network
  • Conclusion
  • Points to remember
  • Questions
5

Kubernetes Workload Resources

  • Introduction
  • ReplicaSets
  • Deployments
  • DaemonSets
  • Kubernetes Jobs
  • Conclusion
  • Points to remember
  • Questions
6

ConfigMap, Secrets, and Labels

  • Introduction
  • ConfigMap
  • Secrets
  • Managing ConfigMaps and Secrets
  • Applying and modifying labels
  • Labels selectors
  • Defining annotations
  • Conclusion
  • Points to remember
  • Questions
7

Configuring Storage with Kubernetes

  • Introduction
  • Storage provisioning in Kubernetes
  • StatefulSets
  • Installing MongoDB on Kubernetes using StatefulSets
  • Disaster recovery
  • Container storage interface
  • Conclusion
  • Points to remember
  • Questions
8

Introduction to Service Discovery

  • Introduction
  • What is service discovery?
  • Service registry
  • Registration patterns
  • Service discovery in Kubernetes
  • Advance details
  • Conclusion
  • Points to remember
  • Questions
9

Zero Trust Using Kubernetes

  • Introduction
  • Kubernetes security challenges
  • Role-based access control (RBAC)
  • Introduction to Zero Trust Architecture
  • Zero trust in Kubernetes
  • Conclusion
  • Points to remember
  • Questions
10

Monitoring, Logging and Observability

  • Introduction
  • Kubernetes observability deep dive
  • Exploring metrics using Prometheus and Grafana
  • Logging and tracing
  • Defining a typical SRE process
  • Responsibilities of SRE
  • Selecting monitoring, metrics and visualization tools
  • Conclusion
  • Points to remember
  • Questions
11

Effective Scaling

  • Introduction
  • Needs of scaling microservices individually
  • Principles of scaling
  • Challenges of scaling
  • Introduction to auto scaling
  • Types of scaling in K8s
  • Best practices of scaling
  • Conclusion
  • Points to remember
  • Questions
12

Introduction to Service Mesh and Istio

  • Introduction
  • Why do you need a Service Mesh?
  • What is a Service Mesh?
  • What is Istio?
  • Istio architecture
  • Installing Istio
  • Cost of using a Service Mesh
  • Customizing the Istio setup
  • Conclusion
  • Points to remember
  • Questions
13

Traffic Management Using Istio

  • Introduction
  • Traffic management via gateways
  • Controlling Ingress and Egress traffic
  • Shifting traffic between versions
  • Injecting faults for testing
  • Timeouts and retries
  • Circuit breaking
  • Conclusion
  • Points to remember
  • Questions
14

Observability Using Istio

  • Introduction
  • Understanding the telemetry flow
  • Sample application and proxy logs
  • Visualizing Service Mesh with Kiali
  • Querying Istio Metrics with Prometheus
  • Monitoring dashboards with Grafana
  • Distributed tracing
  • Conclusion
  • Points to remember
  • Questions
15

Securing Your Services Using Istio

  • Introduction
  • Identity Management with Istio
  • Authentication with Istio
  • Authorization with Istio
  • Security architecture of Istio
  • Conclusion
  • Points to remember
  • Questions

Any questions?
Check out the FAQs

  Want to Learn More?

Contact Us Now

Kubernetes manages container orchestration, while Istio (a service mesh) handles advanced networking, security, and observability for microservices. 

You'll learn how to use both in this DevOps course along with zero-trust training. 

  • CKA (Certified Kubernetes Administrator): Best for cluster management.
  • CKAD (Certified Kubernetes Application Developer): Best for developers.
  • CKS (Certified Kubernetes Security Specialist): Best for security-focused roles.

This DevOps Kubernetes online course helps build real-world skills beyond just certification prep. 

A DevOps engineer earns around 100k-160k in the U.S. depending on experience and location. Kubernetes and Istio expertise can push salaries higher. 

This Kubernetes and Istio training is self-paced and the completion time is dependent on your knowledge and experience. 

  • Beginners: ~3–6 months with hands-on practice.
  • Experienced DevOps pros: ~1–2 months to specialize in Istio.

Yes. Docker is the foundation for containers, and Kubernetes manages them at a large scale. 

Learn Kubernetes + Istio

  Obtain the skills that make recruiters and servers obey you. 

$239.99

Buy Now

Related Courses

All Course
scroll to top