EXCEPTIONAL TRAINING COURSES FOR IT PROFESSIONALS
LONDON UK | ONSITE | ONLINE
Our Docker training course will show you how to easily assemble multi platform apps from components in a DevOps environment, such that Developers, Testers and Sys Admins can all work together seamlessly to ensure smooth implementation through Continuous Integration and Delivery.
Linux containers are changing the way companies think about service development and deployment. Containers play a vital role in the modern data-center, and Docker is leading the way.
This course covers all the core features of Docker including: container creation and management, interacting with Docker hub, using Dockerfile to create and manage custom images, advanced Docker networking (how to safely expose container services to the world, and link containers), the use of Docker volumes to manage persistent data, and Docker Compose to build multi-container applications.
Emphasis is placed on best practices and how to secure Docker installations and containers. Course culminates with comprehensive labs where students use Docker, Git, and a continuous integration server to automate the testing of containerized applications.
Application Management Landscape
Container Resource Control & Security
Container Concepts LXC
Container Concepts Systemd
Docker Control Socket
Creating a New Container
Viewing Container Operational Details
Running Commands in an Existing Container
Interacting with a Running Container
Stopping, Starting, and Removing Containers
Configure a docker container to start at boot.
Listing and Removing Images
Searching for Images
ENV and WORKDIR
Getting Files into the Image
Defining Container Executable
Data-Link Layer Details
Network Layer Details
Hostnames and DNS
Local Host <--> Container
Container <--> Container
Container <--> Container: Links
Remote Host <--> Container
Creating and Using Volumes
Changing Data in Volumes
Backing up Volumes
Defining a Service Set
GitLab and GitLab CI Setup
Unit and Functional Tests
Control the Docker daemon
Configure security and TLS
Run applications on multiple containers across multiple host machines
Enable Docker Content Trust
Set up a registry and understand the Docker Trusted Registry
Use Docker Machine, Swarm, and Compose
Build micro service applications
See why people choose JBI
Call our Tech Team : 0800 028 6400 request info
Bring a JBI course to your office
and train a whole team onsite
0800 028 6400 or request quote
Get in touch
0800 028 6400
Nowadays, there is a significant business advantage in being able analyse, process and visualize "big data". While there is no agreed...
A leading Financial Services organisation was keen to get several of its teams working consistently in an "Agile" way. Agile is an...
The BBC, who have a very substantial investment in technology, were keen to improve the quality of software development: to instil developers...
Our inspiring and up-to-date courses gain exceptional feedback
"great tips to help reduce build times"
"we got access to exclusive content"
"intensive course meant less time off"
"what an inspiring trainer !"
"colleagues at 2 sites joined via web"
"I passed my exam the next day"
Traditionally Cyber security has been associated mainly with penetrating networks and infrastructure. Now a more subtle level of attack needs...
Back in March 2014, the Angular team dropped a bomb by announcing Angular 2 and everyone started yelling. Instead of an evolutionary step forward,...