Syllabus
Syllabus
Prerequisite NIL
On completion of the course, the students will be able to BT Mapping
(Highest Level)
CO1 Understand the basics of Container Orchestration and Security K2
Course
Outcome CO2 Identify Kubernetes architecuture and integrating Kubernetes with CI/CD K2
CO3 Overview of Orchestration with Docker Swarm and Other Tools K3
CO4 Identify Security principles, encompassing authentication, authorization (RBAC). K3
CO5 Understand the seucre CI/CD integration with containers, utilizing tools K2
UNIT-I Introduction to Container Orchestration and Security Periods:09
Introduction to Docker- Server virtualization-Advantages of Docker-Docker Setup –Limitations in Docker - CO1
Convergence of containerization and virtualization-Containerization innovations
UNIT-II Kubernetes Concepts Periods:09
Kubernetes Architecture-Overview of Kubernetes architecture-Integrating Kubernetes with CI/CD pipelines-Pod CO2
Lifecycle and Management-Pod states and transitions-Multi-container Pod patterns
UNIT-III Container Orchestration with Docker Swarm and Other Tools Periods:09
Docker Swarm Fundamentals-Overview of Docker Swarm-Setting up a Docker Swarm cluster-Comparison with
Other Orchestration Tools-Docker Swarm vs Kubernetes-Overview of Apache Mesos CO3
UNIT-IV Kubernetes Security Periods:09
Kubernetes Security-Authentication and authorization in Kubernetes (RBAC)-Pod security policies and network CO4
policies-Securing: Kubernetes data store security-Container Security-Securing container images and runtimes
Managing secrets and sensitive data in Kubernetes
UNIT-V Securing and Monitoring Containerized Environments Periods:09
CI/CD Integration-Continuous integration and continuous deployment with containers-CI/CD tools: Jenkins, GitLab
CO5
CI, Tekton-Automating deployments with Kubernetes and Docker-Use cases and scenarios for different
Orchestration tools
LecturePeriods:45 TutorialPeriods: PracticalPeriods:- TotalPeriods:45
TextBooks
1. Up and Running by Brendan Burns, Joe Beda, Kuan-Wei Chiu, et al.
2. The Kubernetes Handbook by Nigel Douglas and Michael Lentczsch.
3. Kubernetes Security by Cole James Fowler. Dive deeper into Kubernetes
ReferenceBooks
1. Learning Kubernetes & Helm by Zia Makhdumi
2. Hands-On Container Security: From Zero to Kubernetes Security
3. Production Kubernetes: Design Patterns for Scaling and Security
4.Security for Containers and Kubernetes by Nigel Poulton
5.Mastering Kubernetes by Nigel Douglas and Michael Lentczsch
Web References(Minimum 5)
1. https://www.cb-india.com/books/operating-systems/unix-and-linux/book-of-kubernetes/
2. https://www.oreilly.com/library/view/python-for-devops/9781492057680/ch12.html
3. https://www.powells.com/book/-9781718502642/1-0
4. https://dl.acm.org/doi/10.5555/3265145
5. https://malaysia.kinokuniya.com/The_Book_of_Kubernetes_:_A_Complete_Guide_to_Container_Orchestration/bw/
9781718502642
COs/POs/PSOs Mapping
Program Specific
Program Outcomes (POs)
COs Outcomes (PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
1 2 1 - - 3 - - - - - - - 3 - 3
2 2 1 - - 3 - - - - - - - 3 - 3
3 3 2 1 1 3 - - - - - - - 3 - 3
4 3 2 1 1 3 - - - - - - - 3 - 3
5 3 2 1 1 3 - - - - - - - 3 - 3
Evaluation Method
Marks 10 5 5 5 75 100
*Application oriented / Problem solving / Design / Analytical in content beyond the syllabus