Kata Containers Training Course


14 hours (usually 2 days including breaks)


  • An understanding of containers and virtual machine concepts (Docker, Kubernetes, KVM, etc.).
  • Experience with the Linux command line.


  • Developers


This instructor-led, live training (online or onsite) is aimed at developers who wish to build lightweight virtual machines that perform like containers.

By the end of this training, participants will be able to:

  • Install and configure Kata Containers.
  • Create virtual machines (VMs) that plug into a container ecosystem.
  • Overcome the shortcomings of standalone containers and virtual machines.
  • Deploy applications on top of lightweight VMs that perform like containers, but provide the workload isolation and security of VMs.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.
  • To learn more about Kata Containers, please visit: https://katacontainers.io/

Course Outline


  • The marriage of containers and hypervisors

Container Shortcomings

  • Application workload isolation

Virtual Machine Shortcomings

  • Speed
  • Resource Consumption

Kata Containers Use Cases

Preparing the Development Environment

Overview of Kata Containers Features and Architecture

  • Leveraging Intel Clear Containers and Hyper.sh runV
  • Compliance: OCI for Docker and CRI for Kubernetes.

Kata Container Components

  • Agent, Runtime, Proxy, Shim, Kernel and QEMU.

Building a Kata Container


  • Overview of VM and container security
  • Enabling workload isolation


  • Kubernetes Overlay Network


  • How the VM and storage interact

Kata Containers APIs

  • Supporting legacy VMs.
  • Supporting bare-metal infrastructure.


  • Deploying applications to production


  • Multi-tenant Kubernetes

Kata Containers and Continuous Integration

  • Integrating with CI tools and processes


Summary and Conclusion

Leave a Reply

Your email address will not be published. Required fields are marked *