Skills you will learn

  • Docker Container Orchestration with Docker Swarm
  • Setting Up and Managing Swarm Clusters
  • Deploying and Scaling Services in Docker Swarm
  • Docker Compose and Docker Stack Deployments
  • Securing Microservices Using Docker

Who should learn

  • Software Developers
  • DevOps Engineers
  • Cloud Engineers
  • System Administrators
  • Students

What you will learn

  • Master Docker Orchestration, Security & Microservices

    • Lesson 01: Course Introduction

      07:07
      • 1.01 Course Introduction Advanced Docker Orchestration
        02:44
      • 2.01 Advanced Docker Orchestration Case Study
        04:23
    • Lesson 02: Docker Container Orchestration

      02:28:19
      • 2.01 Learning Objectives
        00:55
      • 2.02 Introduction to Orchestration
        06:36
      • 2.03 How Indutries Use Container Orchestration
        03:55
      • 2.04 Docker Swarm
        04:07
      • 2.05 Nodes in a Docker Swarm
        05:38
      • 2.06 Docker Swarm Setup and Node Management
        04:11
      • 2.07 Demo Setting up a Swarm Cluster With Managers and Worker Nodes
        03:35
      • 2.08 Quorum in a Swarm Cluster​
        05:10
      • 2.09 Loss of Quorum Causes and Recovery
        02:32
      • 2.10 Deploying Services in a Docker Swarm
        05:48
      • 2.11 Demo Running Replicated and Global Services
        05:00
      • 2.12 Demo Running a Container Into Services Running Under Swarm
        04:13
      • 2.13 Docker Inspect
        03:53
      • 2.14 Demo Inspecting a Service on Swarn
        03:57
      • 2.15 Understanding Docker Compose Overview Benefits and Configuration
        04:33
      • 2.16 Deploying Applications Using Docker Compose and Docker Stack Deploy
        05:11
      • 2.17 Demo Converting an Application Deployment Into Stack Part 1
        14:39
      • 2.18 Demo Converting an Application Deployment Into Stack Part 2
        08:39
      • 2.19 Volumes and Mounts​
        03:02
      • 2.20 Demo Mounting Volumes via Swarm Services
        08:15
      • 2.21 Overview and Usage of Template
        03:33
      • 2.22 Demo Using Templates with Docker Create Service
        03:34
      • 2.23 Logs Within Docker Containers
        04:30
      • 2.24 Troubleshooting Services in Logs
        04:04
      • 2.25 Demo Troubleshooting an Undeployable Docker Service
        06:28
      • 2.26 Key Takeaways
        02:26
      • 2.27 Lesson End Project Creating a Docker Image and Replicated Service on a Swarm Part 1
        12:48
      • 2.28 Lesson End Project Creating a Docker Image and Replicated Service on a Swarm Part 2
        07:07
    • Lesson 03: Security in Docker

      01:02:47
      • 3.01 Learning Objectives
        00:59
      • 3.02 Docker Security
        01:37
      • 3.03 Enhancing Docker Security with Kernel Namespaces and Control Groups
        04:41
      • 3.04 Docker Daemon and Security Enhancements in Container Environments
        03:38
      • 3.05 Demo Building a Secure Docker Container
        05:05
      • 3.06 Docker Content Trust
        04:00
      • 3.07 Signing a Docker Image
        03:51
      • 3.08 DevSecOps Implementation in Docker
        05:49
      • 3.09 Demo Checking Vulnerabilities Using Trivy
        07:57
      • 3.10 SAST Scanning for Docker Containers Using Snyk
        02:23
      • 3.11 Demo Performing SAST for a Docker Image Using Snyk CLI
        08:18
      • 3.12 DAST Scanning for Docker Containers Using OWASP ZAP
        06:32
      • 3.13 Demo Performing DAST for a Docker Container Using OWASP ZAP
        05:25
      • 3.14 Key Takeaways
        02:32
    • Lesson 04: Microservices Architecture in Docker

      02:04:00
      • 4.01 Learning Objectives
        00:45
      • 4.02 Introduction to Microservices Architecture and Its Benefits
        04:18
      • 4.03 Challenges in Deploying Microservices Architecture​
        01:38
      • 4.04 Use Cases of Microservices in Docker​
        02:42
      • 4.05 Microservices with Containers
        06:10
      • 4.06 Demo Creating a Simple Microservices Architecture Design
        12:42
      • 4.07 Docker Networking for Microservices
        06:15
      • 4.08 Demo Configuring Docker Networking for a Microservices Environment
        12:58
      • 4.09 Demo Scaling Microservices with Docker Swarm
        06:27
      • 4.10 Monitoring Microservices
        03:40
      • 4.11 Demo Applying Health Checks and Monitoring to Microservices Part 1
        12:40
      • 4.12 Demo Applying Health Checks and Monitoring to Microservices Part 2
        06:54
      • 4.13 Microservice Security
        02:50
      • 4.14 Demo Securing Microservices Using Docker Part 1
        11:20
      • 4.15 Demo Securing Microservices Using Docker Part 2
        07:13
      • 4.16 Key Takeaways
        01:51
      • 4.17 Lesson End Project Implementing Microservice Architecture with Docker Part 1
        08:34
      • 4.18 Lesson End Project Implementing Microservice Architecture with Docker Part 2
        15:03
About the course:

This course covers advanced Docker topics, including orchestration, container security, and microservices architecture. You’ll get practical experience by setting up and managing Docker Swarm clusters. You’ll also learn how to deploy and scale services, secure Docker environments using tools like Trivy, Snyk, and OWASP ZAP, and work through hands-on demos and projects to build real-world DevOps and cloud-native skills.

Topics Covered:

For Business

Get your team a Digital Skilling Library with
unlimited access to live classes.

People Frame

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

FAQs

  • Is this course free?

    Yes, this course is completely free of charge. You can access all lessons and demos for free and still receive a professional certificate upon successful completion.

  • Is this course suitable for beginners?

    This course is best suited for learners who have a basic understanding of Docker. It covers intermediate to advanced topics, so some prior familiarity with containerization concepts will help you get the most out of the course.

  • Are there any prerequisites for this course?

    A basic understanding of Docker, containers, and Linux command line usage is recommended before taking this course, as it covers advanced orchestration, security, and microservices topics.

  • What topics are covered in this course?

    This course covers Docker Swarm orchestration, node management, service deployment, Docker Compose, Docker Stack, container security, vulnerability scanning, DevSecOps, microservices architecture, Docker networking, scaling, monitoring, and microservice security.

  • Does this course include hands-on demos?

    Yes, the course includes an extensive collection of hands-on demos covering Swarm cluster setup, service deployment, volume mounting, troubleshooting, building secure containers, vulnerability scanning, configuring networking, scaling microservices, and securing microservices.

  • What is Docker Swarm, and is it covered in this course?

    Docker Swarm allows you to manage a group of Docker hosts as a single virtual system. Yes, Lesson 02 is fully dedicated to Docker Swarm, covering setup, node management, service deployment, and troubleshooting.

  • What security tools will I learn in this course?

    The course covers Trivy for vulnerability scanning, Snyk CLI for SAST scanning, OWASP ZAP for DAST scanning, Docker Content Trust, image signing, and DevSecOps implementation practices in Docker environments.

  • What is the difference between SAST and DAST scanning?

    SAST, or Static Application Security Testing, analyzes source code or container images for vulnerabilities without running them. DAST, or Dynamic Application Security Testing, tests a running application or container for vulnerabilities. Both approaches are covered in Lesson 03 with practical demos.

  • Does this course cover microservices architecture?

    Yes, Lesson 04 is fully dedicated to covering design, deployment, networking, scaling, monitoring, health checks, and security of microservices using Docker.

  • Does this course include practical projects?

    Yes, the course includes two comprehensive end-of-lesson projects — one on creating a Docker image and replicated service on a Swarm cluster, and another on implementing a full microservices architecture with Docker.

  • Is Docker Content Trust covered in this course?

    Yes, Lesson 03 covers Docker Content Trust and image signing in detail, explaining how they protect your Docker environment from tampered or unauthorized images.

  • How long will it take to complete this course?

    This course has a total duration of approximately 6 hours and is fully self-paced, meaning you can complete it at your own schedule and convenience.

  • Is a certificate provided upon completion of this course?

    Yes, you will receive a free professional certificate that you can add to your resume or LinkedIn profile to demonstrate your advanced Docker skills to potential employers.

  • Can I access this course on my mobile device?

    Yes, you can access this course on both desktop and mobile devices, so you can learn anytime, anywhere, at your own pace.

  • Can I add this certificate to my LinkedIn profile?

    Yes, once you complete the course and receive your certificate, you can easily add it to your LinkedIn profile under the Licenses and Certifications section to showcase your Docker orchestration, security, and microservices expertise to recruiters and employers.

  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.
  • *All trademarks are the property of their respective owners and their inclusion does not imply endorsement or affiliation.
  • Career Impact Results vary based on experience and numerous factors.