Security is key. Learn the concepts and tools needed to secure Kubernetes for applications. Click here to get started.

for

No results found.

Lesson 30:35

The Top Takeaways From the Course

Before moving onto the next course, let’s take some time to reflect on what we learned. During this course, you got hands-on experience building a container image for an application, pushed the image to a container registry, and deployed that application to a Kubernetes cluster.

Instructor

Hart Hoover

Hart Hoover is a Senior Field Engineer at Kong. His expertise lies in technical training, consulting, community building, Linux-based operating systems, computing automation, and cloud application architecture.

View Profile

Have questions about the material in this lesson? We’ve got answers!

Post your questions in the Kubernetes community Slack. Questions about this lesson are best suited for the #kubernetes-novice channel.

Not yet a part of the Kubernetes Slack community? Join the discussion here.

Have feedback about this course or lesson? We want to hear it!

Send your thoughts to KubeAcademy@VMware.com.

Share Lesson