Juniper Course

course overview

Click to View dates & book now


This four-day course is designed to provide students with the background knowledge required to work with the Juniper Cloud products. 

Students will gain in-depth knowledge of how to use Linux Kernel-based Virtual Machines (KVM), Red Hat OpenStack Platform, Docker, Kubernetes, and Red Hat OpenShift. 

Through demonstrations and hands-on labs, students will gain experience with the features of each of these technologies. 

It should be noted that this course does not cover Contrail Networking. 

This course is based on Red Hat Linux version 7.8, RHOSP version 13, Docker version 3:19.03.12-3.el7, Kubernetes version 1.18.6-0, and Red Hat OpenShift version 3.11.

The Red Hat, OpenShift, Kubernetes, Docker in Juniper Cloud Deployments (ROKD) course is a beginner-to-intermediate-level course.


Individuals responsible for working with software-defined networking solutions in data center, service provider, and enterprise network environments. It is beneficial for learning and applying the foundational knowledge of cloud technologies prior to working Contrail Networking.

Skills Gained

• List the various open source technologies and their basic differences. 

• Describe how each open source technology plays a role in a Contrail solution. 

• Describe the basic architecture of Red Hat Linux and other distributions.

• Configure namespaces and virtual networking using Linux and OVS bridges. 

• Describe the function of libvirt.

• Instantiate virtual machines using Virtual Machine Manager.

• Create and import and OVS bridge into libvirt. 

• Instantiate a VXLAN tunnel between OVS bridges. 

• Instantiate virtual machines using virsh. 

• Describe the purpose of OpenStack.

• Identify the function of each of the main OpenStack projects. 

• Use the OpenStack CLI. 

• Describe the OpenStack networking features available to workloads. 

• Describe traditional OpenStack block and object storage. 

• Describe how Ceph can be integrated with OpenStack. 

• Use Ceph storage to better scale an RHOSP deployment. 

• Describe the usage of TripleO in a RHOSP deployment. 

• Describe the functions of the undercloud. 

• Describe the functions of the overcloud. 

• Describe the networks used in an RHOSP deployment. 

• Describe how to deploy the undercloud. 

• Describe how to deploy the overcloud while using YAML files. 

• Describe the benefits of containers.

• Describe the reasons to use Docker.

• Describe the basic CLI commands for Docker. 

• Describe how to run a container in Docker. 

• Describe the difference between attached and detached mode. 

• Describe how to interact with Dockerhub.

• Describe how to network a Docker container.

• Describe how to inspect and view the logs of a Docker container.

• Describe how to build and image using a Dockerfile. 

• Describe the difference between CMD and ENTRYPOINT. 

• Describe how to compose a Docker container.

• Describe how to build a private registry. 

• Describe the k8s architecture.

• Describe the usage of k8s pods. 

• Describe the basic usage of the k8s CLI. 

• Instantiate a pod using YAML. 

• Describe the function replication controllers and sets. 

• Describe how to create a deployment.

• Describe networking in k8s. 

• Describe how to use namespaces with k8s. 

• Describe the basic differences between k8s and OpenShift. 

• Describe the basic CLI commands of OpenShift. 

• Describe the basic functionality of the OpenShift web UI.


• Basic TCP/IP skills

• General understanding of data center virtualization


What is Juniper? Suppliers of high performance, secure and reliable IP networks and products, Juniper Networks provides small, medium and large enterprises with a complete array of networking solutions, from devices to data centres and from consumers to cloud providers.

Running from a single operating (OS) system - JUNOS, Juniper's main products include the Juniper M-Series, Juniper T- Series, Juniper E-Series, Juniper J-Series, Juniper NetScreen, Ethernet Routers, Ethernet switches and firewall security which includes the award winning IDP Series Intrusion Detection and Prevention Appliances.

Juniper currently have 4 main certification tracks: Juniper Networks Certified Internet Expert (JNCIE), Juniper Neworks Certified Internet Professional (JNCIP), Juniper Networks Certified Internet Specialist (JNCIS) and Juniper Networks Certified Internet Associate (JNCIA) and some non-Junos certifications; E Series, Firewall/VPN, SSL, Intrusion Detection and Prevention (IDP), WX Series, Unified Access Control (UAC).

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.