Explore Our Courses

Learn to navigate real-world challenges with confidence. Courses focused on building judgment, reinforcing core principles, and retaining what you learn.

Red Team vs Blue Team: Infiltrating & Defending Kubernetes Clusters

JMJerry Marcellus

Experience Kubernetes security from both attacker and defender perspectives. Practice exploiting common weaknesses, strengthen cluster defenses, and build the judgment needed to lead meaningful security improvements.

Kubernetes
Cybersecurity

Building Secure CI/CD Pipelines

JMJerry Marcellus

Design CI/CD pipelines that balance speed with strong security controls. Integrate automated testing, policy enforcement, and secret management to reduce risk while enabling confident, frequent releases.

CI/CD
Cybersecurity
Containers
Pipelines

Troubleshooting Naughty Kubernetes Clusters

JMJerry Marcellus

Investigate real-world Kubernetes failures and sharpen your diagnostic instincts. Apply structured troubleshooting techniques to restore reliability quickly and guide teams through high-pressure incidents.

Kubernetes
SRE
Containers

Pod Wrangler: Mastering Pod Config in Kubernetes

JMJerry Marcellus

Shape Kubernetes pods to meet real production demands. Configure resources, security contexts, and runtime behavior to improve resilience, performance, and operational consistency.

Kubernetes

Pod Patrol: Realtime Monitoring of Kubernetes Pods

JMJerry Marcellus

Build visibility into Kubernetes workloads through effective monitoring and alerting. Interpret metrics and signals to catch issues early, improve uptime, and make informed operational decisions.

Kubernetes
Monitoring

Kubernetes Beyond Hello World

JMJerry Marcellus

Go beyond basic deployments and design Kubernetes environments for real production workloads. Architect scalable, secure, and observable systems that support long-term growth and evolving business needs.

Kubernetes