{"id":28314,"date":"2026-05-12T11:30:23","date_gmt":"2026-05-12T11:30:23","guid":{"rendered":"https:\/\/www.cloudthat.com\/training\/?post_type=stm-courses&#038;p=28314"},"modified":"2026-05-12T11:34:38","modified_gmt":"2026-05-12T11:34:38","slug":"manage-scalable-workloads-in-gke","status":"publish","type":"stm-courses","link":"https:\/\/www.cloudthat.com\/training\/google-cloud-certification\/manage-scalable-workloads-in-gke","title":{"rendered":"Manage Scalable Workloads in GKE"},"content":{"rendered":"<p><span data-contrast=\"auto\">This instructor-led course provides an in-depth understanding of managing scalable workloads using Google Kubernetes Engine (GKE). Participants will explore advanced Kubernetes concepts including multi-cluster architectures, GKE fleets, Cloud Service Mesh, fleet networking, centralized configuration management, workload identity, security posture management, and CI\/CD automation.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Through hands-on labs and real-world implementation scenarios, learners will gain practical experience deploying, managing,\u00a0observing, and securing applications across distributed Kubernetes environments using Google Cloud-native services and modern DevOps practices. The course also covers scalable networking, traffic management,\u00a0GitOps-based configuration management, compliance controls, and AI\/ML workload deployment on Kubernetes infrastructure.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This instructor-led course provides an in-depth understanding of managing scalable workloads using Google Kubernetes Engine (GKE). Participants will explore advanced Kubernetes concepts including multi-cluster architectures, GKE fleets, Cloud Service Mesh, fleet networking, centralized configuration management, workload identity, security posture management, and CI\/CD automation.\u00a0 Through hands-on labs and real-world implementation scenarios, learners will gain practical experience [&hellip;]<\/p>\n","protected":false},"author":6436,"featured_media":12394,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[58],"metadata":{"stm_lms_product_id":["28315"],"_edit_lock":["1778585604:5091"],"_edit_last":["5091"],"permalink_customizer":["google-cloud-certification\/manage-scalable-workloads-in-gke"],"permalink_customizer_regenerate_status":["1"],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"banner_image":[""],"_banner_image":["field_621873548f922"],"banner_description":["Learn how to design, deploy, secure, and manage scalable applications using Google Kubernetes Engine (GKE), multi-cluster architectures, service mesh, CI\/CD pipelines, and modern cloud-native operational practices. "],"_banner_description":["field_612c733ed3564"],"overview_section_heading":[""],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After completing GKE, students will be able to: "],"_after_completing_course_heading":["field_645c78ade3f50"],"after_completing_course":["12"],"_after_completing_course":["field_6103aae828228"],"key_features_heading":["Key Features of GKE"],"_key_features_heading":["field_645388ceffdd1"],"key_features":["8"],"_key_features":["field_6103aaff28229"],"who_should_attend_heading":["Who should Attend Google Kubernetes Engine (GKE) Course?"],"_who_should_attend_heading":["field_645388faffdd2"],"who_should_attend":["9"],"_who_should_attend":["field_6103ab0d2822a"],"prerequisites_heading":["Prerequisites of Google Kubernetes Engine"],"_prerequisites_heading":["field_64538a51ffdd3"],"prerequisites_text":["<li>Google Cloud Fundamentals or equivalent cloud experience <li\\>\r\n<li>Prior experience with Kubernetes concepts and administration (recommended)<li\\>\r\n<li>Familiarity with containerized applications and Docker<li\\>\r\n<li>Basic understanding of networking and DevOps concepts<li\\>\r\n<li>Understanding of CI\/CD fundamentals is beneficial<li\\>"],"_prerequisites_text":["field_612c7498c4b84"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":["Learning Objective of Google Kubernetes Engine"],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list":["11"],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":["a:1:{i:0;s:4:\"blue\";}"],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features":["2"],"_course_features":["field_644a0fa10e67d"],"certification_heading":["Certification Details of GKE"],"_certification_heading":["field_64538bffffdd5"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":[""],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"course_outline_heading":["Course Outline for GKE"],"_course_outline_heading":["field_64538a8effdd4"],"course_section":["13"],"_course_section":["field_612f4f27b0276"],"note_section":[""],"_note_section":["field_616d3ed46bbd2"],"popular_sort":[""],"_popular_sort":["field_6172496402af3"],"related_courses":[""],"_related_courses":["field_61c453ca6b2dd"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":["1789"],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":["4.7"],"_average_review_count":["field_62b00367d2de6"],"faq_heading":["FAQs for Google Kubernetes Engine Course"],"_faq_heading":["field_64538c59ffdd8"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"curriculum":[""],"featured":[""],"views":["14"],"level":["advanced"],"current_students":["0"],"duration_info":["3 Days"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"price":["29900"],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":["[{\"question\":\"Who is this course for?\",\"answer\":\"This course is designed for cloud engineers, DevOps professionals, Kubernetes administrators, architects, and platform engineers working with scalable Kubernetes environments. \"},{\"question\":\"What topics are covered in this course?\",\"answer\":\"The course covers GKE fleets, multi-cluster architecture, service mesh, networking, security, identity management, CI\/CD, GitOps, and AI workloads on Kubernetes.\"},{\"question\":\" Is prior Kubernetes knowledge required?\",\"answer\":\"Yes, basic to intermediate Kubernetes knowledge is recommended. \"},{\"question\":\"What is the duration of the course? \",\"answer\":\"The course duration is approximately 3 days instructor-led training. \"},{\"question\":\"Are hands-on labs included?\",\"answer\":\"Yes, the course includes multiple hands-on labs covering real-world Kubernetes and GKE implementation scenarios. \"},{\"question\":\"Does the course include security topics? \",\"answer\":\"Yes, the course covers authentication, authorization, mTLS, workload identity, compliance, and security posture management. \"},{\"question\":\" Will CI\/CD concepts be covered?\",\"answer\":\"Yes, the course includes Cloud Build, Cloud Deploy, supply chain security, and automated deployment pipelines. \"},{\"question\":\" Does the course include service mesh implementation? \",\"answer\":\"Yes, learners will deploy and manage Cloud Service Mesh, traffic routing, and secure microservices communication. \"},{\"question\":\" Will AI and ML workloads on Kubernetes be covered? \",\"answer\":\"Yes, the course includes deployment and optimization of AI\/ML workloads on GKE. \"},{\"question\":\"What Google Cloud services are used in this course? \",\"answer\":\"The course includes GKE, GKE Fleets, Cloud Service Mesh, Config Sync, Policy Controller, Cloud Build, Cloud Deploy, Security Command Center, and workload identity services. \"}]"],"course_files_pack":[""],"course_certificate":[""],"type":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video":[""],"lesson_video_poster":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"duration":[""],"preview":[""],"lesson_excerpt":[""],"lesson_files_pack":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"question_view_type":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_password":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"wpdocs-meta-bdt":["29900"],"wpdocs-meta-gbp":["1199"],"wpdocs-meta-rand":["23073"],"wpdocs-meta-aed":["5199"],"wpdocs-meta-usd":["1399"],"offline_price":[""],"offline-bdt":[""],"offline-gbp":["4699"],"offline-rand":[""],"offline-aed":["20599"],"offline-usd":["5596"],"_yoast_wpseo_primary_stm_lms_course_taxonomy":["58"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"course_section_0_module_title":[" Introduction to GKE at Scale"],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section":["1"],"_course_section_0_section":["field_612f51e6b0277"],"after_completing_course_0_desciption":["Design and manage multi-cluster GKE architectures."],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":[" Understand and implement GKE fleets and fleet management."],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Configure centralized Kubernetes configuration management using GitOps. "],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Implement fleet networking and multi-cluster communication"],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"after_completing_course_4_desciption":[" Deploy and manage Cloud Service Mesh. "],"_after_completing_course_4_desciption":["field_6103ad2f9f5b2"],"after_completing_course_5_desciption":["Configure advanced traffic management and routing strategies."],"_after_completing_course_5_desciption":["field_6103ad2f9f5b2"],"after_completing_course_6_desciption":[" Secure microservices using authentication, authorization, and mTLS. "],"_after_completing_course_6_desciption":["field_6103ad2f9f5b2"],"after_completing_course_7_desciption":[" Implement workload identity and identity federation in GKE."],"_after_completing_course_7_desciption":["field_6103ad2f9f5b2"],"after_completing_course_8_desciption":["Apply security posture and compliance best practices. "],"_after_completing_course_8_desciption":["field_6103ad2f9f5b2"],"after_completing_course_9_desciption":["Build secure CI\/CD pipelines for Kubernetes workloads"],"_after_completing_course_9_desciption":["field_6103ad2f9f5b2"],"key_features_0_lists":["<b><span data-contrast=\"auto\">Advanced Kubernetes and GKE Architecture<\/span><\/b>\r\n<ul>\r\n \t<li>Multi-cluster Kubernetes architecture design<\/li>\r\n \t<li><span data-contrast=\"auto\">GKE fleet management concepts<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Distributed Kubernetes administration<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Scalable application deployment strategies<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>"],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["<b><span data-contrast=\"auto\">Hands-On Learning Experience<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span>\r\n<ul>\r\n \t<li><span data-contrast=\"auto\"> Real-world Kubernetes implementation labs<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Guided deployment and troubleshooting exercises<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Enterprise-grade Kubernetes use cases<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Practical DevOps and GitOps workflows<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<span class=\"LineBreakBlob BlobObject DragDrop SCXW263371810 BCX8\">\u00a0<\/span>"],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["<b><span data-contrast=\"auto\">Multi-Cluster and Fleet Management<\/span><\/b>\r\n<ul>\r\n \t<li>GKE fleet concepts and implementation<\/li>\r\n \t<li><span data-contrast=\"auto\">Centralized cluster management<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Cross-cluster communication and connectivity<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Multi-cluster workload orchestration<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>"],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["<b><span data-contrast=\"auto\">GitOps\u00a0and Configuration Management<\/span><\/b>\r\n<ul>\r\n \t<li>Config Sync and Policy Controller<\/li>\r\n \t<li><span data-contrast=\"auto\">Infrastructure as Code concepts<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Kubernetes configuration automation<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Config Connector and Blueprints<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>"],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["<b><span data-contrast=\"auto\">\u00a0Cloud Service Mesh and Networking<\/span><\/b>\r\n<ul>\r\n \t<li>Cloud Service Mesh architecture and deployment<\/li>\r\n \t<li><span data-contrast=\"auto\">Service-to-service communication<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Advanced traffic routing and resiliency<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">East-west and north-south traffic management<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>"],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features_5_lists":["<b><span data-contrast=\"auto\">Kubernetes Security and Identity<\/span><\/b>\r\n<ul>\r\n \t<li>Authentication and authorization in GKE<\/li>\r\n \t<li><span data-contrast=\"auto\">Workload Identity and identity federation<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">mTLS implementation and secure communication<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Security posture and compliance controls<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>"],"_key_features_5_lists":["field_6103ad559f5b3"],"key_features_6_lists":["<b><span data-contrast=\"auto\">\u00a0CI\/CD and DevOps Automation<\/span><\/b>\r\n<ul>\r\n \t<li>Cloud Build and Cloud Deploy integration<\/li>\r\n \t<li><span data-contrast=\"auto\">Secure software supply chain practices<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Automated deployment pipelines<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Progressive delivery strategies<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>"],"_key_features_6_lists":["field_6103ad559f5b3"],"course_section_0_section_0_title":["Lecture Content "],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Multi-Cluster Kubernetes Overview"],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":[" Introduction to GKE Fleets"],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Sameness and Trust Concepts"],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_3_lession_title":["Fleet Management Architecture"],"_course_section_0_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["5"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_module_title":["Multi-cluster GKE Architecture"],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":["Lecture Content"],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Centralized Cluster Management"],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Multi-Cluster Architecture Design"],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Cluster Connectivity and Access Patterns"],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["5"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["1"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["Fleets and Teams"],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":["Lecture Content"],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Deep Dive into GKE Fleets "],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["Fleet Management Use Cases "],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Team and Resource Isolation Strategies"],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["5"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section_1_title":["Lab Content"],"_course_section_2_section_1_title":["field_612f5233b0278"],"course_section_2_section_1_lesson_list_0_lession_title":["Managing Workloads at Scale with GKE Fleets"],"_course_section_2_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list":["1"],"_course_section_2_section_1_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["2"],"_course_section_2_section":["field_612f51e6b0277"],"course_section_3_module_title":["Managing GKE Configuration at Scale"],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":[""],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":["Lecture Content "],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Configuration Management Challenges "],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["GitOps Concepts and Workflows"],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Config Sync Architecture "],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_3_lession_title":["Policy Controller and Governance"],"_course_section_3_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["6"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section_1_title":["Lab Content"],"_course_section_3_section_1_title":["field_612f5233b0278"],"course_section_3_section_1_lesson_list_0_lession_title":["Automating Configuration with Config Sync "],"_course_section_3_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list":["1"],"_course_section_3_section_1_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["2"],"_course_section_3_section":["field_612f51e6b0277"],"course_section_4_module_title":["Fleet Networking"],"_course_section_4_module_title":["field_612f5535940c3"],"course_section_4_module_description":[""],"_course_section_4_module_description":["field_612f564c921af"],"course_section_4_section_0_title":["Lecture Content "],"_course_section_4_section_0_title":["field_612f5233b0278"],"course_section_4_section_0_lesson_list_0_lession_title":["Fleet Networking Architectur"],"_course_section_4_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_1_lession_title":["Pod-to-Pod Communication"],"_course_section_4_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_2_lession_title":["Multi-Cluster Services "],"_course_section_4_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_3_lession_title":["Multi-Cluster Gateway Concepts "],"_course_section_4_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list":["5"],"_course_section_4_section_0_lesson_list":["field_612f530a0ac40"],"course_section_4_section_1_title":["Lab Content"],"_course_section_4_section_1_title":["field_612f5233b0278"],"course_section_4_section_1_lesson_list_0_lession_title":["Deploying Multi-Cluster Gateway"],"_course_section_4_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_1_lesson_list":["1"],"_course_section_4_section_1_lesson_list":["field_612f530a0ac40"],"course_section_4_section":["2"],"_course_section_4_section":["field_612f51e6b0277"],"course_section_5_module_title":["Cloud Service Mesh"],"_course_section_5_module_title":["field_612f5535940c3"],"course_section_5_module_description":[""],"_course_section_5_module_description":["field_612f564c921af"],"course_section_5_section_0_title":["Lecture Content"],"_course_section_5_section_0_title":["field_612f5233b0278"],"course_section_5_section_0_lesson_list_0_lession_title":[" Introduction to Cloud Service Mesh"],"_course_section_5_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_1_lession_title":[" Service Mesh Architecture and ComponentsArchitecture"],"_course_section_5_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_2_lession_title":["Service Discovery Concepts"],"_course_section_5_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list":["5"],"_course_section_5_section_0_lesson_list":["field_612f530a0ac40"],"course_section_5_section_1_title":["Lab Content"],"_course_section_5_section_1_title":["field_612f5233b0278"],"course_section_5_section_1_lesson_list_0_lession_title":["Installing Cloud Service Mesh "],"_course_section_5_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list":["1"],"_course_section_5_section_1_lesson_list":["field_612f530a0ac40"],"course_section_5_section":["2"],"_course_section_5_section":["field_612f51e6b0277"],"course_section_6_module_title":["Cloud Service Mesh Routing"],"_course_section_6_module_title":["field_612f5535940c3"],"course_section_6_module_description":[""],"_course_section_6_module_description":["field_612f564c921af"],"course_section_6_section_0_title":["Lecture Content "],"_course_section_6_section_0_title":["field_612f5233b0278"],"course_section_6_section_0_lesson_list_0_lession_title":["VirtualService and DestinationRule "],"_course_section_6_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_1_lession_title":["Gateway Configuration and Ingress"],"_course_section_6_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_2_lession_title":["Traffic Routing and Load Balancing"],"_course_section_6_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list":["5"],"_course_section_6_section_0_lesson_list":["field_612f530a0ac40"],"course_section_6_section_1_title":["Lab Content "],"_course_section_6_section_1_title":["field_612f5233b0278"],"course_section_6_section_1_lesson_list_0_lession_title":["Managing Traffic Flow "],"_course_section_6_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_6_section_1_lesson_list":["1"],"_course_section_6_section_1_lesson_list":["field_612f530a0ac40"],"course_section_6_section":["2"],"_course_section_6_section":["field_612f51e6b0277"],"course_section_7_module_title":["Service Mesh Security"],"_course_section_7_module_title":["field_612f5535940c3"],"course_section_7_module_description":[""],"_course_section_7_module_description":["field_612f564c921af"],"course_section_7_section_0_title":["Lecture Content "],"_course_section_7_section_0_title":["field_612f5233b0278"],"course_section_7_section_0_lesson_list_0_lession_title":["Authentication and Authorization Concepts "],"_course_section_7_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_1_lession_title":["Mutual TLS (mTLS) Encryption"],"_course_section_7_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_2_lession_title":["Access Control Policies "],"_course_section_7_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list":["5"],"_course_section_7_section_0_lesson_list":["field_612f530a0ac40"],"course_section_7_section_1_title":["Lab Content"],"_course_section_7_section_1_title":["field_612f5233b0278"],"course_section_7_section_1_lesson_list_0_lession_title":["Securing Service Mesh"],"_course_section_7_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_7_section_1_lesson_list":["1"],"_course_section_7_section_1_lesson_list":["field_612f530a0ac40"],"course_section_7_section":["2"],"_course_section_7_section":["field_612f51e6b0277"],"course_section_8_module_title":["Multi-cluster Networking with Service Mesh"],"_course_section_8_module_title":["field_612f5535940c3"],"course_section_8_module_description":[""],"_course_section_8_module_description":["field_612f564c921af"],"course_section_8_section_0_title":["Lecture Content "],"_course_section_8_section_0_title":["field_612f5233b0278"],"course_section_8_section_0_lesson_list_0_lession_title":["East-West Traffic Routing "],"_course_section_8_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list_1_lession_title":["Multi-Network Communication "],"_course_section_8_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list_2_lession_title":["Cross-Cluster Connectivity"],"_course_section_8_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list":["5"],"_course_section_8_section_0_lesson_list":["field_612f530a0ac40"],"course_section_8_section_1_title":["Lab Content "],"_course_section_8_section_1_title":["field_612f5233b0278"],"course_section_8_section_1_lesson_list_0_lession_title":["Managing Distributed Services"],"_course_section_8_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_8_section_1_lesson_list":["1"],"_course_section_8_section_1_lesson_list":["field_612f530a0ac40"],"course_section_8_section":["2"],"_course_section_8_section":["field_612f51e6b0277"],"course_section_9_module_title":[" Identity Management in GKE"],"_course_section_9_module_title":["field_612f5535940c3"],"course_section_9_module_description":[""],"_course_section_9_module_description":["field_612f564c921af"],"course_section_9_section_0_title":["Lecture Content"],"_course_section_9_section_0_title":["field_612f5233b0278"],"course_section_9_section_0_lesson_list_0_lession_title":["GKE Identity Service "],"_course_section_9_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list_1_lession_title":["Connect Gateway Architecture"],"_course_section_9_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list_2_lession_title":[" Third-Party Identity Providers"],"_course_section_9_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list_3_lession_title":["Workload Identity Concepts"],"_course_section_9_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list":["5"],"_course_section_9_section_0_lesson_list":["field_612f530a0ac40"],"course_section_9_section_1_title":["Lab Content "],"_course_section_9_section_1_title":["field_612f5233b0278"],"course_section_9_section_1_lesson_list_0_lession_title":["Managing Authentication at Scale "],"_course_section_9_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_9_section_1_lesson_list":["1"],"_course_section_9_section_1_lesson_list":["field_612f530a0ac40"],"course_section_9_section":["2"],"_course_section_9_section":["field_612f51e6b0277"],"course_section_10_module_title":["Security Posture and Compliance"],"_course_section_10_module_title":["field_612f5535940c3"],"course_section_10_module_description":[""],"_course_section_10_module_description":["field_612f564c921af"],"course_section_10_section_0_title":["Lecture Content "],"_course_section_10_section_0_title":["field_612f5233b0278"],"course_section_10_section_0_lesson_list_0_lession_title":["Security Posture Dashboard"],"_course_section_10_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list_1_lession_title":["Node Security Best Practices"],"_course_section_10_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list_2_lession_title":[" Vulnerability Scanning Concepts"],"_course_section_10_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list_3_lession_title":["Security Command Center Integration"],"_course_section_10_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list":["5"],"_course_section_10_section_0_lesson_list":["field_612f530a0ac40"],"course_section_10_section":["1"],"_course_section_10_section":["field_612f51e6b0277"],"course_section_11_module_title":["CI\/CD at Scale in GKE"],"_course_section_11_module_title":["field_612f5535940c3"],"course_section_11_module_description":[""],"_course_section_11_module_description":["field_612f564c921af"],"course_section_11_section_0_title":["Lecture Content"],"_course_section_11_section_0_title":["field_612f5233b0278"],"course_section_11_section_0_lesson_list_0_lession_title":["Cloud Build and Cloud Deploy "],"_course_section_11_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_11_section_0_lesson_list_1_lession_title":["CI\/CD Pipeline Architectures "],"_course_section_11_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_11_section_0_lesson_list_2_lession_title":["Deployment Strategies and Automation"],"_course_section_11_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_11_section_0_lesson_list_3_lession_title":[" Private CI\/CD Pipelines"],"_course_section_11_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_11_section_0_lesson_list":["6"],"_course_section_11_section_0_lesson_list":["field_612f530a0ac40"],"course_section_11_section":["2"],"_course_section_11_section":["field_612f51e6b0277"],"course_section_11_section_1_title":["Lab Content "],"_course_section_11_section_1_title":["field_612f5233b0278"],"course_section_11_section_1_lesson_list_0_lession_title":["Creating CI\/CD Pipelines "],"_course_section_11_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_11_section_1_lesson_list":["1"],"_course_section_11_section_1_lesson_list":["field_612f530a0ac40"],"course_section_12_module_title":[" GKE and AI Workloads"],"_course_section_12_module_title":["field_612f5535940c3"],"course_section_12_module_description":[""],"_course_section_12_module_description":["field_612f564c921af"],"course_section_12_section_0_title":["Lecture Content"],"_course_section_12_section_0_title":["field_612f5233b0278"],"course_section_12_section_0_lesson_list_0_lession_title":["AI and ML Workloads on Kubernetes"],"_course_section_12_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_12_section_0_lesson_list_1_lession_title":["Model Training and Distributed Computing"],"_course_section_12_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_12_section_0_lesson_list_2_lession_title":["Model Serving Architectures"],"_course_section_12_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_12_section_0_lesson_list":["6"],"_course_section_12_section_0_lesson_list":["field_612f530a0ac40"],"course_section_12_section":["1"],"_course_section_12_section":["field_612f51e6b0277"],"course_features_0_features_list_0_list":["<span class=\"TextRun SCXW258582529 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258582529 BCX8\">Understand scalable Kubernetes and GKE architecture concepts<\/span><\/span>"],"_course_features_0_features_list_0_list":["field_644a0fc80e680"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":["Course Completion Certificate "],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":["17714"],"_certification_0_image":["field_6103ab5b2822e"],"after_completing_course_10_desciption":[" Deploy and optimize AI and ML workloads on GKE. "],"_after_completing_course_10_desciption":["field_6103ad2f9f5b2"],"after_completing_course_11_desciption":["Implement observability and operational best practices for Kubernetes environments. "],"_after_completing_course_11_desciption":["field_6103ad2f9f5b2"],"key_features_7_lists":["<b><span data-contrast=\"auto\">AI and ML Workloads on Kubernetes<\/span><\/b>\r\n<ul>\r\n \t<li>Running AI\/ML workloads on GKE<\/li>\r\n \t<li><span data-contrast=\"auto\">Model training and serving architectures<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">GPU and scalable workload optimization<\/span><\/li>\r\n \t<li><span data-contrast=\"auto\">Cost optimization strategies for AI workloads<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n<\/ul>"],"_key_features_7_lists":["field_6103ad559f5b3"],"course_section_0_section_0_lesson_list_4_lession_title":["Scaling Kubernetes Environments"],"_course_section_0_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Hybrid and Distributed Kubernetes Architectures"],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_4_lession_title":["Operational Considerations for Large-Scale Clusters"],"_course_section_1_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":[" Managing Shared Kubernetes Infrastructure"],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_4_lession_title":["Fleet Governance Concepts"],"_course_section_2_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_4_lession_title":["Config Connector and Blueprints"],"_course_section_3_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_5_lession_title":["Infrastructure Standardization Strategies "],"_course_section_3_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_4_lession_title":["Kubernetes Networking Best Practices"],"_course_section_4_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_3_lession_title":["Observability within Service Mesh"],"_course_section_5_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_4_lession_title":["Benefits of Service Mesh in Kubernetes"],"_course_section_5_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_3_lession_title":["Traffic Resilience and Fault Tolerance"],"_course_section_6_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_4_lession_title":["Canary and Progressive Deployment Concepts"],"_course_section_6_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_3_lession_title":["Zero Trust Security Concepts "],"_course_section_7_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_4_lession_title":["Secure Microservices Communication "],"_course_section_7_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list_3_lession_title":["Distributed Service Communication"],"_course_section_8_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list_4_lession_title":["Hybrid Networking Considerations "],"_course_section_8_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list_4_lession_title":["Identity Federation Strategies"],"_course_section_9_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list_4_lession_title":["Compliance and Governance Controls"],"_course_section_10_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_11_section_0_lesson_list_4_lession_title":["Software Supply Chain Security"],"_course_section_11_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_11_section_0_lesson_list_5_lession_title":["DevSecOps Best Practices"],"_course_section_11_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_12_section_0_lesson_list_3_lession_title":["GPU and Resource Optimization"],"_course_section_12_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_12_section_0_lesson_list_4_lession_title":["Cost Optimization Strategies"],"_course_section_12_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_12_section_0_lesson_list_5_lession_title":["Scalable AI Infrastructure Patterns"],"_course_section_12_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"who_should_attend_0_attend_lists":["Cloud Engineers "],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_1_attend_lists":["DevOps Engineers  "],"_who_should_attend_1_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_2_attend_lists":["Platform Engineers "],"_who_should_attend_2_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_3_attend_lists":[" Kubernetes Administrators "],"_who_should_attend_3_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_4_attend_lists":["Cloud Architects "],"_who_should_attend_4_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_5_attend_lists":["Site Reliability Engineers (SREs)  "],"_who_should_attend_5_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_6_attend_lists":[" Infrastructure Engineers "],"_who_should_attend_6_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_7_attend_lists":["AI\/ML Infrastructure Engineers  "],"_who_should_attend_7_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_8_attend_lists":["Professionals managing scalable Kubernetes environments "],"_who_should_attend_8_attend_lists":["field_6103adfb3f3e4"],"course_features_0_features_list_1_list":["<span class=\"TextRun SCXW258582529 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258582529 BCX8\">Design and manage multi-cluster GKE environments<\/span><\/span>"],"_course_features_0_features_list_1_list":["field_644a0fc80e680"],"course_features_0_features_list_2_list":["<span class=\"TextRun SCXW258582529 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258582529 BCX8\"> Implement GKE fleets and centralized cluster management<\/span><\/span>"],"_course_features_0_features_list_2_list":["field_644a0fc80e680"],"course_features_0_features_list_3_list":["<span class=\"NormalTextRun SCXW258582529 BCX8\">Configure\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW258582529 BCX8\">GitOps<\/span><span class=\"NormalTextRun SCXW258582529 BCX8\">\u00a0workflows using Config Sync and Policy Controller<\/span>"],"_course_features_0_features_list_3_list":["field_644a0fc80e680"],"course_features_0_features_list_4_list":["<span class=\"TextRun SCXW258582529 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258582529 BCX8\">Deploy and manage Cloud Service Mesh<\/span><\/span>"],"_course_features_0_features_list_4_list":["field_644a0fc80e680"],"course_features_0_features_list_5_list":["<span class=\"TextRun SCXW258582529 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258582529 BCX8\"> Implement advanced networking and traffic management strategies<\/span><\/span>"],"_course_features_0_features_list_5_list":["field_644a0fc80e680"],"course_features_0_features_list_6_list":["<span class=\"NormalTextRun SCXW258582529 BCX8\">Secure Kubernetes workloads using\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW258582529 BCX8\">mTLS<\/span><span class=\"NormalTextRun SCXW258582529 BCX8\">\u00a0and identity management<\/span>"],"_course_features_0_features_list_6_list":["field_644a0fc80e680"],"course_features_0_features_list_7_list":["<span class=\"TextRun SCXW258582529 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258582529 BCX8\">Apply compliance and security posture best practices<\/span><\/span>"],"_course_features_0_features_list_7_list":["field_644a0fc80e680"],"course_features_0_features_list_8_list":["<span class=\"TextRun SCXW258582529 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258582529 BCX8\"> Build CI\/CD pipelines for Kubernetes applications<\/span><\/span>"],"_course_features_0_features_list_8_list":["field_644a0fc80e680"],"course_features_0_features_list_9_list":["<span class=\"TextRun SCXW258582529 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258582529 BCX8\">Deploy and optimize AI and ML workloads on GKE<\/span><\/span>"],"_course_features_0_features_list_9_list":["field_644a0fc80e680"],"course_features_0_features_list_10_list":["<span class=\"TextRun SCXW153717834 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW153717834 BCX8\">Apply operational best practices for scalable Kubernetes infrastructure<\/span><\/span>"],"_course_features_0_features_list_10_list":["field_644a0fc80e680"],"course_features_1_heading":["Why choose CloudThat as your training partner? "],"_course_features_1_heading":["field_644a0fae0e67e"],"course_features_1_features_list_0_list":["Specialized Google Cloud and Kubernetes Expertise\u00a0 -<span data-contrast=\"auto\">CloudThat\u00a0specializes in cloud-native technologies, Kubernetes, DevOps, and Google Cloud solutions with a strong focus on enterprise implementation practices.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span>"],"_course_features_1_features_list_0_list":["field_644a0fc80e680"],"course_features_1_features_list_1_list":["Industry-Recognized Trainers -<span data-contrast=\"auto\">Our trainers are certified Google Cloud and Kubernetes experts with practical experience in scalable cloud-native architectures and production-grade Kubernetes deployments.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span>"],"_course_features_1_features_list_1_list":["field_644a0fc80e680"],"course_features_1_features_list_2_list":["Hands-On Learning Approach - <span data-contrast=\"auto\">CloudThat emphasizes practical learning through labs, real-world scenarios, troubleshooting exercises, and implementation-focused demonstrations.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span>"],"_course_features_1_features_list_2_list":["field_644a0fc80e680"],"course_features_1_features_list_3_list":["Customized Learning Paths - <span data-contrast=\"auto\">Training paths are designed for DevOps engineers, cloud architects, Kubernetes administrators, and platform engineering teams with varying experience levels.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span>"],"_course_features_1_features_list_3_list":["field_644a0fc80e680"],"course_features_1_features_list_4_list":["Interactive and Enterprise-Focused Sessions - <span data-contrast=\"auto\">Sessions include architecture discussions, deployment walkthroughs, live demonstrations, and operational best practices.<\/span>"],"_course_features_1_features_list_4_list":["field_644a0fc80e680"],"course_features_1_features_list_5_list":["Career and Certification Support - <span data-contrast=\"auto\">CloudThat\u00a0supports learners with project guidance, interview preparation, and cloud-native career learning paths.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span>"],"_course_features_1_features_list_5_list":["field_644a0fc80e680"],"course_features_1_features_list_6_list":["Updated Industry-Relevant Content - <span data-contrast=\"auto\">Course materials are continuously updated to align with the latest GKE, Kubernetes, service mesh, CI\/CD, and AI infrastructure advancements.<\/span>"],"_course_features_1_features_list_6_list":["field_644a0fc80e680"],"course_features_1_features_list_7_list":["Trusted by Global Enterprises - <span data-contrast=\"auto\">Thousands of professionals and enterprise customers trust\u00a0CloudThat\u00a0for advanced cloud-native and Kubernetes training programs.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span>"],"_course_features_1_features_list_7_list":["field_644a0fc80e680"],"course_features_1_features_list":["8"],"_course_features_1_features_list":["field_644a0fb70e67f"],"course_features_1_background_color":["a:1:{i:0;s:5:\"white\";}"],"_course_features_1_background_color":["field_644a0fde0e681"],"_thumbnail_id":["12394"]},"acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/28314"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/6436"}],"version-history":[{"count":18,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/28314\/revisions"}],"predecessor-version":[{"id":28503,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/28314\/revisions\/28503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/12394"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=28314"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=28314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}