Microservices, Serverless, OpenShift

About this Course

Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge! The demand for serverless is accelerating as organizations look to scale more quickly and efficiently. With the increase in cloud adoption, Microservices within the serverless stack are becoming more popular with faster deployments and greater flexibility. This intermediate-level course begins with a refresher on Microservices and the advantages of using a Microservices architecture. You will then gain an understanding of how serverless benefits developers, when to use serverless programming and serverless deployment models, and be introduced to serverless technologies. You will discover how serverless supports continuous integration and continuous delivery (CI/CD), and microservices integration. Hands-on labs throughout this course give you the experience to create and deploy Microservices using OpenShift and Istio. For your final project you will put into practice your serverless and microservices skills and create a real-world serverless web application using OpenShift and Cloud Object Storage.

Created by: IBM

Level: Intermediate


Related Online Courses

Building design strongly influences the quantity of heating, cooling and electricity needed during building operation. Therefore, a correct thermal design is essential to achieve low energy and low... more
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
Site Reliability Engineers must have the right tools and strategies to perform in a fast-paced technical environment. Nine competency areas guide the successful practice of IBM Cloud SREs. ● A... more
Within this course, you will explore database architecture, PostgreSQL, and various scalable deployment configurations. You will see how PostgreSQL implements basic CRUD operations and indexes, and... more
Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL