<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="36161" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/google-mswgke" lastchanged="2025-08-13T18:18:46+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Manage Scalable Workloads in GKE Enterprise</title><productcode>MSWGKE</productcode><vendorcode>GO</vendorcode><vendorname>Google</vendorname><fullproductcode>GO-MSWGKE</fullproductcode><version>1.0</version><objective>&lt;ul&gt;
&lt;li&gt;Describe the components and architecture of GKE Enterprise.&lt;/li&gt;&lt;li&gt;Identify and describe the core components of a GKE Enterprise fleet.&lt;/li&gt;&lt;li&gt;Describe how fleets discover and communicate with each other in GKE Enterprise.&lt;/li&gt;&lt;li&gt;Detail the benefits of using Service Mesh and use it to implement advanced routing and traffic management.&lt;/li&gt;&lt;li&gt;Secure traffic between microservices using Cloud Service Mesh.&lt;/li&gt;&lt;li&gt;Create multi-cluster networking architectures with Cloud Service Mesh.&lt;/li&gt;&lt;li&gt;Use authentication to effectively manage identity in GKE Enterprise.&lt;/li&gt;&lt;li&gt;Evaluate and apply various security measures to effectively protect and manage GKE deployments.&lt;/li&gt;&lt;li&gt;Evaluate options and Google Cloud products that allow you to create scalable CI/CD implementations within a GKE Enterprise environment.&lt;/li&gt;&lt;li&gt;Explore how GKE facilitates the deployment and optimization of gen AI models.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;Having completed Google Cloud Platform Fundamentals: Core Infrastructure or having equivalent experience.&lt;/li&gt;&lt;li&gt;Having completed Architecting with GKE or having equivalent experience.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;ul&gt;
&lt;li&gt;Google Cloud practitioners.&lt;/li&gt;&lt;li&gt;Individuals using Google Cloud to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments.&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;h4&gt;&lt;strong&gt;Module 1 - Introduction to GKE Enterprise&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Multi-cloud and multi-cluster overview&lt;/li&gt;&lt;li&gt;GKE Enterprise introduction&lt;/li&gt;&lt;li&gt;Sameness and trust&lt;/li&gt;&lt;li&gt;GKE Enterprise features&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Recognize the challenges of designing and building multi-environment solutions.&lt;/li&gt;&lt;li&gt;Compare and contrast GKE modes of operation.&lt;/li&gt;&lt;li&gt;Describe the concepts of sameness and trust, and use them to manage fleets.&lt;/li&gt;&lt;li&gt;Identify the features and components of the GKE Enterprise technology stack.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 2 - GKE Enterprise architecture&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GKE Enterprise for Centrally Managed Clusters&lt;/li&gt;&lt;li&gt;Deploy an Enterprise Developer Platform with GKE&lt;/li&gt;&lt;li&gt;Create and Manage GKE Enterprise Clusters&lt;/li&gt;&lt;li&gt;Access GKE Enterprise Clusters&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Recognize how GKE Enterprise can be used to centralize cluster management.&lt;/li&gt;&lt;li&gt;Examine the architecture of GKE Enterprise clusters.&lt;/li&gt;&lt;li&gt;Create, connect, and manage GKE Enterprise clusters.&lt;/li&gt;&lt;li&gt;Securely access GKE Enterprise clusters.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 3 - Fleets and teams&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GKE fleets&lt;/li&gt;&lt;li&gt;Example fleet solutions&lt;/li&gt;&lt;li&gt;Fleet team management&lt;/li&gt;&lt;li&gt;Fleet management&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Define GKE fleets.&lt;/li&gt;&lt;li&gt;Describe how GKE fleets can solve common cluster management problems.&lt;/li&gt;&lt;li&gt;Manage fleets and teams in GKE Enterprise.&lt;/li&gt;&lt;li&gt;Detail the elements of fleet management.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;li&gt;Lab: Manage Workloads at Scale with GKE Fleets and Teams&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 4 - Managing GKE configuration at scale&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Configuration management challenges&lt;/li&gt;&lt;li&gt;Centralized configuration management at scale&lt;/li&gt;&lt;li&gt;Config Sync&lt;/li&gt;&lt;li&gt;Policy Controller&lt;/li&gt;&lt;li&gt;Config Connector&lt;/li&gt;&lt;li&gt;Blueprints&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Recognize the challenges of scaling multi-cluster, multi-tenant configurations.&lt;/li&gt;&lt;li&gt;Configure a centralized configuration management using a GitOps model.&lt;/li&gt;&lt;li&gt;Describe the benefits and architecture of Config Sync.&lt;/li&gt;&lt;li&gt;Use Policy Controller to enforce security and compliance in GKE.&lt;/li&gt;&lt;li&gt;Create a standardized, reusable, and policy-driven foundation for Kubernetes deployments.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;li&gt;Lab: Automate GKE Configuration with Config Sync&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 5 - Fleet networking&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fleet networking communications&lt;/li&gt;&lt;li&gt;Pod discovery in GKE Enterprise&lt;/li&gt;&lt;li&gt;Multi-cluster Services&lt;/li&gt;&lt;li&gt;Configuring multi-cluster Services&lt;/li&gt;&lt;li&gt;Multi-cluster gateway&lt;/li&gt;&lt;li&gt;Configuring multi-cluster gateways&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain how fleet networking works.&lt;/li&gt;&lt;li&gt;Describe how Pods in a Kubernetes cluster communicate with each other.&lt;/li&gt;&lt;li&gt;Enable multi-cluster Services.&lt;/li&gt;&lt;li&gt;Configure multi-cluster Services.&lt;/li&gt;&lt;li&gt;Detail the elements of fleet management.&lt;/li&gt;&lt;li&gt;Outline the role of a multi-cluster gateway.&lt;/li&gt;&lt;li&gt;Configure a multi-cluster gateway.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;li&gt;Lab: Deploying a Multi-Cluster Gateway Across GKE Clusters&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 6 - Cloud Service Mesh&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Introduction to Cloud Service Mesh&lt;/li&gt;&lt;li&gt;Provisioning Cloud Service Mesh&lt;/li&gt;&lt;li&gt;Handling requests&lt;/li&gt;&lt;li&gt;Cloud Service Mesh dashboards and support&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;List and describe the benefits of using Cloud Service Mesh.&lt;/li&gt;&lt;li&gt;Install and configure Cloud Service Mesh on different clusters.&lt;/li&gt;&lt;li&gt;Trace the path of a request through the mesh, correctly identifying and explaining the role of key components like Envoy proxies, Mesh CA, and extensions in handling the request.&lt;/li&gt;&lt;li&gt;Create Service Mesh dashboards from workload telemetry including metrics, traces, and logs.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;li&gt;Lab: Installing Cloud Service Mesh on Google Kubernetes Engine&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 7 - Cloud Service Mesh routing&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Google Cloud APIs for Cloud Service Mesh&lt;/li&gt;&lt;li&gt;Configuring Cloud Service Mesh with Istio API resources&lt;/li&gt;&lt;li&gt;Configuring VirtualService and DestinationRule&lt;/li&gt;&lt;li&gt;Configuring ServiceEntry&lt;/li&gt;&lt;li&gt;Configuring a Gateway&lt;/li&gt;&lt;li&gt;Configuring a WorkloadEntry and WorkloadGroup&lt;/li&gt;&lt;li&gt;Network resilience and testing&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain how Cloud Service Mesh learns the network from Kubernetes.&lt;/li&gt;&lt;li&gt;Deploy mesh API resources such as the VirtualService, DestinationRule, Gateway, ServiceEntry, and the Sidecar to configure the mesh.&lt;/li&gt;&lt;li&gt;Describe how to harden the mesh network by introducing new functionality such as request retries, request timeouts, and circuit breakers.&lt;/li&gt;&lt;li&gt;Explore Service Mesh resilience by creating failures and delays on specific services.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;li&gt;Lab: Managing Traffic Flow with Cloud Service Mesh&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 8 - Service Mesh security&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Authentication and encryption&lt;/li&gt;&lt;li&gt;Service authentication in the mesh&lt;/li&gt;&lt;li&gt;End-user authentication in Cloud Service Mesh&lt;/li&gt;&lt;li&gt;Authorization in Cloud Service Mesh&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Encrypt traffic between microservices to prevent anyone in the network from gaining access to private information.&lt;/li&gt;&lt;li&gt;Authorize services and requests, ensuring that services only access the information that is allowed access from other services.&lt;/li&gt;&lt;li&gt;Authenticate and authorize services and requests to verify trust among services in the mesh and among end users.&lt;/li&gt;&lt;li&gt;Limit service access in the network so that granular controls over the communication can be established.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;li&gt;Lab: Secure Cloud Service Mesh with Policy Controller and mTLS&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 9 - Multi-cluster networking with Cloud Service Mesh&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Single network east-west routing&lt;/li&gt;&lt;li&gt;Multiple network east-west routing&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Set up a multi-cluster mesh with a single subnet in a single VPC network. Account for variations like multi-region clusters, multiple projects, shared VPC, and private clusters.&lt;/li&gt;&lt;li&gt;Enable communication between GKE clusters on different networks using an east-west gateway and attached clusters.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;li&gt;Lab: Manage and Secure Distributed Services with GKE Managed Service Mesh&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 10 - Managing identity for GKE Enterprise using GKE Identity Service&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Introduction to GKE Identity Service&lt;/li&gt;&lt;li&gt;Connect gateway overview&lt;/li&gt;&lt;li&gt;Configuring connect gateway for authentication and authorization&lt;/li&gt;&lt;li&gt;Accessing clusters with GKE Identity Service&lt;/li&gt;&lt;li&gt;Authenticating third-party identities with GKE Identity Service&lt;/li&gt;&lt;li&gt;Fleet Workload Identity&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain the differences between authentication methods for GKE clusters.&lt;/li&gt;&lt;li&gt;Summarize the key features of Connect gateway. Explain how it simplifies and secures connections to GKE Enterprise fleet member clusters.&lt;/li&gt;&lt;li&gt;Configure Connect gateway for authentication and authorization.&lt;/li&gt;&lt;li&gt;Securely access clusters using OpenID Connect (OIDC) and third-party identity providers (IdPs).&lt;/li&gt;&lt;li&gt;Configure GKE Identity Service to enable authentication and authorization for users using a third-party identity provider (IdP).&lt;/li&gt;&lt;li&gt;Differentiate between Workload Identity and Workload Identity Federation, and explain when to use each.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;li&gt;Lab: Managing Identity in GKE Enterprise with Connect Gateway&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 11 - Security posture, compliance, and preventative controls&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GKE security posture overview&lt;/li&gt;&lt;li&gt;Security posture dashboard&lt;/li&gt;&lt;li&gt;Implementing node security&lt;/li&gt;&lt;li&gt;Vulnerability scanning&lt;/li&gt;&lt;li&gt;Additional security services&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe GKE security posture.&lt;/li&gt;&lt;li&gt;Navigate and interpret the GKE security posture dashboard to identify security issues.&lt;/li&gt;&lt;li&gt;Analyze methods for hardening the GKE control plane, and evaluate their effectiveness in mitigating specific security risks.&lt;/li&gt;&lt;li&gt;Implement node security measures to protect GKE worker nodes from potential threats.&lt;/li&gt;&lt;li&gt;Describe the process of vulnerability scanning in GKE.&lt;/li&gt;&lt;li&gt;Apply the insights from the GKE security posture dashboard to prioritize and remediate vulnerabilities in GKE deployments.&lt;/li&gt;&lt;li&gt;Explain the roles and capabilities of Google Cloud&amp;#039;s Artifact Analysis and Security Command Center in enhancing GKE security.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 12 - CI/CD at scale in GKE&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CI/CD in Google Cloud&lt;/li&gt;&lt;li&gt;Cloud Deploy and GKE&lt;/li&gt;&lt;li&gt;Cloud Run and Knative serving&lt;/li&gt;&lt;li&gt;CI/CD in a private network&lt;/li&gt;&lt;li&gt;Securing the software supply chain&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the core components of Google Cloud&amp;#039;s CI/CD pipeline and how they address common challenges in application modernization.&lt;/li&gt;&lt;li&gt;Analyze how Google Cloud Deploy integrates with GKE to manage Kubernetes manifests and control deployments.&lt;/li&gt;&lt;li&gt;Compare and contrast the deployment strategies for Cloud Run services and jobs within GKE Enterprise.&lt;/li&gt;&lt;li&gt;Explain the steps required to establish a peered VPC connection for secure CI/CD in a private network.&lt;/li&gt;&lt;li&gt;Evaluate the various security measures and tools available within Google Cloud for securing the software supply chain.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;li&gt;Lab: Creating CI/CD Pipelines for GKE Enterprise Clusters&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 13 - Generative AI for GKE Enterprise&lt;/strong&gt;&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Topics:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AI and GKE overview&lt;/li&gt;&lt;li&gt;AI model training on GKE&lt;/li&gt;&lt;li&gt;AI model serving on GKE&lt;/li&gt;&lt;li&gt;AI cost management on GKE&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Objectives:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain how GKE serves as a suitable platform for large language models and the increasing demand for hardware accelerators.&lt;/li&gt;&lt;li&gt;Describe the high-level architecture of a GKE-based training platform for AI models.&lt;/li&gt;&lt;li&gt;Outline the architecture for a GKE-based model serving platform.&lt;/li&gt;&lt;li&gt;Outline different cost management strategies available when using GKE for AI/ML workloads.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Activities:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quiz&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Describe the components and architecture of GKE Enterprise.
- Identify and describe the core components of a GKE Enterprise fleet.
- Describe how fleets discover and communicate with each other in GKE Enterprise.
- Detail the benefits of using Service Mesh and use it to implement advanced routing and traffic management.
- Secure traffic between microservices using Cloud Service Mesh.
- Create multi-cluster networking architectures with Cloud Service Mesh.
- Use authentication to effectively manage identity in GKE Enterprise.
- Evaluate and apply various security measures to effectively protect and manage GKE deployments.
- Evaluate options and Google Cloud products that allow you to create scalable CI/CD implementations within a GKE Enterprise environment.
- Explore how GKE facilitates the deployment and optimization of gen AI models.</objective_plain><essentials_plain>- Having completed Google Cloud Platform Fundamentals: Core Infrastructure or having equivalent experience.
- Having completed Architecting with GKE or having equivalent experience.</essentials_plain><audience_plain>- Google Cloud practitioners.
- Individuals using Google Cloud to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments.</audience_plain><outline_plain>Module 1 - Introduction to GKE Enterprise


Topics:



- Multi-cloud and multi-cluster overview
- GKE Enterprise introduction
- Sameness and trust
- GKE Enterprise features

Objectives:



- Recognize the challenges of designing and building multi-environment solutions.
- Compare and contrast GKE modes of operation.
- Describe the concepts of sameness and trust, and use them to manage fleets.
- Identify the features and components of the GKE Enterprise technology stack.

Activities:



- Quiz
Module 2 - GKE Enterprise architecture


Topics:



- GKE Enterprise for Centrally Managed Clusters
- Deploy an Enterprise Developer Platform with GKE
- Create and Manage GKE Enterprise Clusters
- Access GKE Enterprise Clusters

Objectives:



- Recognize how GKE Enterprise can be used to centralize cluster management.
- Examine the architecture of GKE Enterprise clusters.
- Create, connect, and manage GKE Enterprise clusters.
- Securely access GKE Enterprise clusters.

Activities:



- Quiz
Module 3 - Fleets and teams


Topics:



- GKE fleets
- Example fleet solutions
- Fleet team management
- Fleet management

Objectives:



- Define GKE fleets.
- Describe how GKE fleets can solve common cluster management problems.
- Manage fleets and teams in GKE Enterprise.
- Detail the elements of fleet management.

Activities:



- Quiz
- Lab: Manage Workloads at Scale with GKE Fleets and Teams
Module 4 - Managing GKE configuration at scale


Topics:



- Configuration management challenges
- Centralized configuration management at scale
- Config Sync
- Policy Controller
- Config Connector
- Blueprints

Objectives:



- Recognize the challenges of scaling multi-cluster, multi-tenant configurations.
- Configure a centralized configuration management using a GitOps model.
- Describe the benefits and architecture of Config Sync.
- Use Policy Controller to enforce security and compliance in GKE.
- Create a standardized, reusable, and policy-driven foundation for Kubernetes deployments.

Activities:



- Quiz
- Lab: Automate GKE Configuration with Config Sync
Module 5 - Fleet networking


Topics:



- Fleet networking communications
- Pod discovery in GKE Enterprise
- Multi-cluster Services
- Configuring multi-cluster Services
- Multi-cluster gateway
- Configuring multi-cluster gateways

Objectives:



- Explain how fleet networking works.
- Describe how Pods in a Kubernetes cluster communicate with each other.
- Enable multi-cluster Services.
- Configure multi-cluster Services.
- Detail the elements of fleet management.
- Outline the role of a multi-cluster gateway.
- Configure a multi-cluster gateway.

Activities:



- Quiz
- Lab: Deploying a Multi-Cluster Gateway Across GKE Clusters
Module 6 - Cloud Service Mesh


Topics:



- Introduction to Cloud Service Mesh
- Provisioning Cloud Service Mesh
- Handling requests
- Cloud Service Mesh dashboards and support

Objectives:



- List and describe the benefits of using Cloud Service Mesh.
- Install and configure Cloud Service Mesh on different clusters.
- Trace the path of a request through the mesh, correctly identifying and explaining the role of key components like Envoy proxies, Mesh CA, and extensions in handling the request.
- Create Service Mesh dashboards from workload telemetry including metrics, traces, and logs.

Activities:



- Quiz
- Lab: Installing Cloud Service Mesh on Google Kubernetes Engine
Module 7 - Cloud Service Mesh routing


Topics:



- Google Cloud APIs for Cloud Service Mesh
- Configuring Cloud Service Mesh with Istio API resources
- Configuring VirtualService and DestinationRule
- Configuring ServiceEntry
- Configuring a Gateway
- Configuring a WorkloadEntry and WorkloadGroup
- Network resilience and testing

Objectives:



- Explain how Cloud Service Mesh learns the network from Kubernetes.
- Deploy mesh API resources such as the VirtualService, DestinationRule, Gateway, ServiceEntry, and the Sidecar to configure the mesh.
- Describe how to harden the mesh network by introducing new functionality such as request retries, request timeouts, and circuit breakers.
- Explore Service Mesh resilience by creating failures and delays on specific services.

Activities:



- Quiz
- Lab: Managing Traffic Flow with Cloud Service Mesh
Module 8 - Service Mesh security


Topics:



- Authentication and encryption
- Service authentication in the mesh
- End-user authentication in Cloud Service Mesh
- Authorization in Cloud Service Mesh

Objectives:



- Encrypt traffic between microservices to prevent anyone in the network from gaining access to private information.
- Authorize services and requests, ensuring that services only access the information that is allowed access from other services.
- Authenticate and authorize services and requests to verify trust among services in the mesh and among end users.
- Limit service access in the network so that granular controls over the communication can be established.

Activities:



- Quiz
- Lab: Secure Cloud Service Mesh with Policy Controller and mTLS
Module 9 - Multi-cluster networking with Cloud Service Mesh


Topics:



- Single network east-west routing
- Multiple network east-west routing

Objectives:



- Set up a multi-cluster mesh with a single subnet in a single VPC network. Account for variations like multi-region clusters, multiple projects, shared VPC, and private clusters.
- Enable communication between GKE clusters on different networks using an east-west gateway and attached clusters.

Activities:



- Quiz
- Lab: Manage and Secure Distributed Services with GKE Managed Service Mesh
Module 10 - Managing identity for GKE Enterprise using GKE Identity Service


Topics:



- Introduction to GKE Identity Service
- Connect gateway overview
- Configuring connect gateway for authentication and authorization
- Accessing clusters with GKE Identity Service
- Authenticating third-party identities with GKE Identity Service
- Fleet Workload Identity

Objectives:



- Explain the differences between authentication methods for GKE clusters.
- Summarize the key features of Connect gateway. Explain how it simplifies and secures connections to GKE Enterprise fleet member clusters.
- Configure Connect gateway for authentication and authorization.
- Securely access clusters using OpenID Connect (OIDC) and third-party identity providers (IdPs).
- Configure GKE Identity Service to enable authentication and authorization for users using a third-party identity provider (IdP).
- Differentiate between Workload Identity and Workload Identity Federation, and explain when to use each.

Activities:



- Quiz
- Lab: Managing Identity in GKE Enterprise with Connect Gateway
Module 11 - Security posture, compliance, and preventative controls


Topics:



- GKE security posture overview
- Security posture dashboard
- Implementing node security
- Vulnerability scanning
- Additional security services

Objectives:



- Describe GKE security posture.
- Navigate and interpret the GKE security posture dashboard to identify security issues.
- Analyze methods for hardening the GKE control plane, and evaluate their effectiveness in mitigating specific security risks.
- Implement node security measures to protect GKE worker nodes from potential threats.
- Describe the process of vulnerability scanning in GKE.
- Apply the insights from the GKE security posture dashboard to prioritize and remediate vulnerabilities in GKE deployments.
- Explain the roles and capabilities of Google Cloud's Artifact Analysis and Security Command Center in enhancing GKE security.

Activities:



- Quiz
Module 12 - CI/CD at scale in GKE


Topics:



- CI/CD in Google Cloud
- Cloud Deploy and GKE
- Cloud Run and Knative serving
- CI/CD in a private network
- Securing the software supply chain

Objectives:



- Describe the core components of Google Cloud's CI/CD pipeline and how they address common challenges in application modernization.
- Analyze how Google Cloud Deploy integrates with GKE to manage Kubernetes manifests and control deployments.
- Compare and contrast the deployment strategies for Cloud Run services and jobs within GKE Enterprise.
- Explain the steps required to establish a peered VPC connection for secure CI/CD in a private network.
- Evaluate the various security measures and tools available within Google Cloud for securing the software supply chain.

Activities:



- Quiz
- Lab: Creating CI/CD Pipelines for GKE Enterprise Clusters
Module 13 - Generative AI for GKE Enterprise


Topics:



- AI and GKE overview
- AI model training on GKE
- AI model serving on GKE
- AI cost management on GKE

Objectives:



- Explain how GKE serves as a suitable platform for large language models and the increasing demand for hardware accelerators.
- Describe the high-level architecture of a GKE-based training platform for AI models.
- Outline the architecture for a GKE-based model serving platform.
- Outline different cost management strategies available when using GKE for AI/ML workloads.

Activities:



- Quiz</outline_plain><duration unit="d" days="3">3 jours</duration><pricelist><price country="US" currency="USD">1995.00</price><price country="CA" currency="CAD">2753.00</price><price country="DE" currency="EUR">1995.00</price><price country="IT" currency="EUR">1950.00</price><price country="AT" currency="EUR">1995.00</price><price country="SE" currency="EUR">1995.00</price><price country="SI" currency="EUR">1995.00</price><price country="CH" currency="CHF">1995.00</price></pricelist><miles/></course>