SKILL BENCHMARK

Kubernetes Proficiency (Advanced Level)

  • 35m
  • 35 questions
The Kubernetes Proficiency benchmark measures whether a developer learning persona has experience with typical and common Kubernetes terminology, tools, and technologies. A learner who scores high on this benchmark demonstrates a high level of skill of commonly used Kubernetes services and tools.

Topics covered

  • configure a Kubernetes cluster
  • configure Multus CNI to allow Kubernetes pods to be created with multiple network interfaces
  • define what a cluster and nodes are and understand the motivation behind clustering
  • describe Azure Kubernetes Service (AKS) and outline how it's managed for continuous delivery
  • describe features and benefits of Amazon Elastic Kubernetes Services (EKS) and how it's managed for continuous delivery
  • describe how Amazon Elastic Kubernetes Services (EKS) handles logging and monitoring
  • describe how Google Cloud Operations for Google Kubernetes Engine (GKE) handles logging and monitoring
  • describe how Microsoft Azure Kubernetes Services (AKS) handles logging and monitoring
  • describe Kubernetes objects and their purpose
  • describe operators in Kubernetes and the operator pattern
  • describe several types of infrastructure extensions that are available in Kubernetes
  • describe some of the methods for extending Kubernetes on the client side
  • describe some of the methods for extending Kubernetes on the server side
  • describe the authentication and authorization process for using the Kubernetes API
  • describe the features and benefits of Kubernetes load balancing
  • describe the process for securing a Kubernetes cluster
  • describe the use of iptables and routing tables with Kubernetes, how they're implemented, and how traffic is routed between nodes
  • describe the YAML templating language
  • describe what Google Kubernetes Engine (GKE) is and outline how it's managed for continuous delivery
  • describe what makes Kubernetes networking different than other platform networking considerations with reference to the history of enterprise networked applications and services
  • explain how Kubernetes was designed for distributed computing and that it is clustering software
  • identify several key features of Kubernetes
  • identify some of the main Kubernetes cluster security concerns that make Kubernetes vulnerable to attacks
  • identify the phases of a pod's life and describe a pod's lifecycle
  • identify what a DaemonSet is in Kubernetes and why they are used
  • identify what a pod is, and explain its crucial role in Kubernetes
  • identify what a ReplicaSet is in Kubernetes and recognize its role
  • outline how cloud computing helps accelerate scalable solutions
  • outline how security contexts are normally applied to Pods in Kubernetes
  • outline the 4C's of cloud-native security and how cloud providers, such as AWS and Azure, implement this security
  • recognize some of the main security concerns and vulnerabilities faced when migrating to the cloud
  • recognize the benefits of containerized applications
  • recognize why it is beneficial to extend Kubernetes and the tools involved in this operation
  • summarize common security issues and exploits when using Kubernetes
  • summarize the basics of Kubernetes networking, including IP address management

RECENTLY ADDED COURSES