Training & Certifications

The Docker training program offered by Multimatics is a comprehensive and hands-on learning experience designed to equip participants with essential knowledge and practical skills in containerization using Docker technology. The training material is prepared based on the latest edition of Docker, accompanied by discussions and exercises to work on the questions. Join our Docker training program to embark on a journey toward mastering containerization technology and revolutionizing your approach to application deployment and management!

By the end of the program, participants will be able to:

  1. Run containerized applications from pre-existing images stored in a centralized registry
  2. Deploy images across the cluster
  3. Triage and resolve issue reports from stakeholders
  4. Standup up on Enterprise clusters with one UCP manager, one DTR replica, and one worker node
  5. Migrate traditional applications to containers
  6. Configure and troubleshoot Docker engine
  7. Perform general maintenance and configuration 

This program is suitable for beginners and intermediate-level IT professionals, developers, system administrators, and anyone interested in understanding and utilizing containerization to streamline application deployment and management

This program is a 5-day of intensive training class.

There is no specific requirement to join this program. However, the basic knowledge, skills and experience of the following are recommended:

  • Container security
  • Experience with at least one cloud provider
  • Configuration management tools
  • Linux and/or Windows Server

There is no certification exam for this program.

  1. Complete the setup of a swarm mode cluster, with managers and worker nodes
  2. State the differences between running a container vs running a service
  3. Demonstrate steps to lock a swarm cluster
  4. Extend the instructions to run individual containers into running services under swarm
  5. Interpret the output of “docker inspect” commands
  6. Convert an application deployment into a stack file using a YAML compose file with “docker stack deploy”
  7. Manipulate a running stack of services
  8. Increase number of replicas
  9. Illustrate running a replicated vs global service
  10. Mount volumes
  11. Add networks, publish ports
  12. Identify the steps needed to troubleshoot a service not deploying
  13. Apply node labels to demonstrate placement of tasks
  14. Sketch how a Dockerized application communicates with legacy systems
  15. Paraphrase the importance of quorum in a swarm cluster
  16. Demonstrate the usage of templates with "docker service create"
  1. Describe Dockerfile options(add, copy, volumes, expose, entrypoint, etc)
  2. Show the main parts of a Dockerfile
  3. Give examples on how to create an efficient image via a Dockerfile
  4. Use CLI commands such as list, delete, prune, rmi, etc to manage images
  5. Inspect images and report specific attributes using filter and format
  6. Demonstrate tagging an image
  7. Utilize a registry to store an image
  8. Display layers of a Docker image
  9. Apply a file to create a Docker image
  10. Modify an image to a single layer
  11. Describe how image layers work
  12. Deploy a registry (not architect)
  13. Configure a registry
  14. Log into a registry
  15. Utilize search in a registry
  16. Tag an image
  17. Push an image to a registry
  18. Sign an image in a registry
  19. Describe how image deletion works
  20. Delete an image from a registry
  1. Demonstrate the ability to upgrade the Docker engine
  2. Complete setup of repo, select a storage driver, and complete installation of Docker engine on multiple platforms
  3. Configure logging drivers (splunk, journald, etc)
  4. Setup swarm, configure managers, add nodes, and setup backup schedule
  5. Create and manager user and teams
  6. Interpret errors to troubleshoot installation issues without assistance
  7. Outline the sizing requirements prior to installation
  8. Understand namespaces, cgroups, and configuration of certificates
  9. Use certificate-based client-server authentication to ensure a Docker daemon has the rights to access images on a registry
  10. Consistently repeat steps to deploy Docker engine, UCP, and DTR on AWS and on premises in an HA config 1, 2, 3
  11. Complete configuration of backups for UCP and DTR
  12. Configure the Docker daemon to start on boot
  1. Create a Docker bridge network for a developer to use for their containers
  2. Troubleshoot container and engine logs to understand a connectivity issue between containers
  3. Publish a port so that an application is accessible externally
  4. Identify which IP and port a container is externally accessible on
  5. Describe the different types and use cases for the built-in network drivers
  6. Understand the Container Network Model and how it interfaces with the Docker engine and network and IPAM drivers
  7. Configure Docker to use external DNS
  8. Use Docker to load balance HTTP/HTTPs traffic to an application (Configure L7 load balancing with Docker EE)
  9. Understand and describe the types of traffic that flow between the Docker engine, registry, and UCP controllers
  10. Deploy a service on a Docker overlay network
  11. Describe the difference between “host” and “ingress” port publishing mode (Host, Ingress)
  1. Describe the process of signing an image
  2. Demonstrate that an image passes a security scan
  3. Enable Docker Content Trust
  4. Configure RBAC in UCP
  5. Integrate UCP with LDAP/AD
  6. Demonstrate creation of UCP client bundles
  7. Describe default engine security
  8. Describe swarm default security
  9. Describe MTLS
  1. State which graph driver should be used on which OS
  2. Demonstrate how to configure devicemapper
  3. Compare object storage to block storage, and explain which one is preferable when available
  4. Summarize how an application is composed of layers and where those layers reside on the filesystem
  5. Describe how volumes are used with Docker for persistent storage
  6. Identify the steps you would take to clean up unused images on a filesystem, also on DTR
  7. Demonstrate how storage can be used across cluster nodes
  8. Identity roles
  9. Describe the difference between UCP workers and managers
  10. Describe process to use external certificates with UCP and DTR (UCP from cli, from GUI, print the public certificates), DTR

Scroll to Top