ποΈ Platform Engineering / IaC Track
Currently available in Islamabad
Platform Engineering is the discipline of building the internal infrastructure, tooling, and automated workflows that let development teams ship software reliably and at speed β without becoming DevOps experts themselves. It sits at the intersection of cloud infrastructure, automation, developer experience, and security.
This track is designed for engineers who want to move beyond basic server management and CI/CD scripts into the world of Infrastructure as Code, Kubernetes-native deployments, GitOps, and internal developer platforms. These are the skills that command the highest salaries in cloud infrastructure roles β and the ones most underrepresented in Pakistan's training market.
π‘ Why Platform Engineering
Modern engineering organisations have split "DevOps" into two distinct roles: application-side engineers who own CI/CD and deployments, and platform engineers who own the infrastructure, Kubernetes clusters, IaC codebases, and the internal tooling that everyone else depends on. Platform engineers are:
- Among the highest-paid infrastructure specialists in the market
- In demand at every company running Kubernetes or multi-cloud infrastructure
- Increasingly required for senior cloud and SRE roles even at Pakistani IT firms and remote teams
- Building the foundations that let 10 developers ship as fast as 50 used to
π Module Breakdown
Week 1 β Phase 0: Foundations & Linux / Networking Essentials
Platform engineering sits on top of networking and Linux fundamentals. This phase ensures every student has the baseline before touching any cloud or IaC tooling.
- Linux deep dive: process management, systemd, file system, permissions, and shell scripting
- Bash scripting for automation: writing production-grade shell scripts
- Networking fundamentals: TCP/IP, DNS, subnets, VPCs, load balancers, and firewalls
- TLS/SSL certificates: how they work, Let's Encrypt, and certificate management at scale
- SSH hardening, key management, and bastion host patterns
- Git advanced workflows: branching strategies, rebasing, signed commits, and monorepo patterns
- YAML and JSON mastery β the universal language of infrastructure configuration
Week 1β2 β Phase 1: Containers & Docker in Depth
Kubernetes runs containers. Before orchestrating them, you need to understand them at the level a platform engineer needs β not just "how to run docker run".
- Docker architecture: daemon, images, layers, registries, and the build cache
- Writing production-quality Dockerfiles: multi-stage builds, minimal base images, security scanning
- Docker Compose for local development environments
- Container registries: AWS ECR, Docker Hub, and GitHub Container Registry
- Image tagging strategies, versioning, and promotion workflows
- Container security: running as non-root, read-only filesystems, and vulnerability scanning with Trivy
- Docker networking: bridge, host, overlay, and inter-container communication
- Volumes and persistent storage patterns for stateful containers
Week 2β3 β Phase 2: Infrastructure as Code β Terraform
Terraform is the most widely adopted IaC tool in the industry. This phase covers it from fundamentals through enterprise-scale patterns.
- Terraform core concepts: providers, resources, data sources, state, and the plan/apply lifecycle
- HCL language deep dive: variables, locals, outputs, expressions, and functions
- Terraform state management: local vs remote state, S3 + DynamoDB locking, state isolation
- Modules: writing reusable, versioned Terraform modules for your organisation
- Workspaces and environment promotion: dev β staging β production patterns
- Provisioning AWS infrastructure with Terraform: VPC, subnets, security groups, EC2, RDS, S3, IAM
- Provisioning EKS (managed Kubernetes) clusters with Terraform
- Terraform with GitHub Actions: automated plan on PR, apply on merge
- Terraform Cloud / Atlantis for team-based IaC workflows
- Drift detection: identifying and reconciling infrastructure that has diverged from code
- Importing existing infrastructure into Terraform state
- Testing Terraform with Terratest and checkov for policy compliance
Week 3 β Phase 3: Infrastructure as Code β Pulumi & AWS CDK
Pulumi and AWS CDK let you define infrastructure in real programming languages (TypeScript, Python, Go) β a major shift for teams that prefer code over DSLs.
- Pulumi vs Terraform: when to use which and why they coexist in real organisations
- Pulumi with TypeScript: provisioning AWS resources using real programming constructs
- Pulumi stacks, state backends, and secrets management
- AWS CDK fundamentals: constructs, stacks, apps, and the CDK toolkit
- Writing CDK stacks in TypeScript: VPC, ECS, RDS, Lambda, and API Gateway
- CDK Constructs Library: using L1, L2, and L3 constructs effectively
- CDK Pipelines: self-mutating CI/CD pipelines for infrastructure
- Comparing Terraform, Pulumi, and CDK on a real infrastructure project
Week 3β4 β Phase 4: Kubernetes in Depth
The core of platform engineering. This phase moves far beyond "how to deploy a pod" into the cluster-level thinking platform engineers need.
- Kubernetes architecture: control plane, worker nodes, etcd, API server, scheduler, and kubelet
- Core objects: Pods, Deployments, ReplicaSets, StatefulSets, DaemonSets, Jobs, and CronJobs
- Services, Ingress, and Ingress Controllers (NGINX, AWS ALB Ingress)
- ConfigMaps and Secrets: managing application configuration and sensitive data
- Persistent Volumes, Persistent Volume Claims, and Storage Classes
- Namespaces, RBAC, and multi-tenancy: isolating teams and workloads on shared clusters
- Resource requests, limits, LimitRanges, and ResourceQuotas
- Horizontal Pod Autoscaler (HPA) and Vertical Pod Autoscaler (VPA)
- Node selectors, taints, tolerations, and affinity rules for workload placement
- Kubernetes networking: CNI plugins, kube-proxy, CoreDNS, and network policies
- Health checks: liveness, readiness, and startup probes
- EKS in production: managed node groups, Fargate profiles, and cluster add-ons
- GKE Autopilot: hands-off cluster management on Google Cloud
- Cluster upgrades, node pool management, and zero-downtime maintenance
Week 4 β Phase 5: GitOps β ArgoCD & FluxCD
GitOps is the operating model where Git is the single source of truth for both application code and infrastructure state. ArgoCD and FluxCD are the two dominant tools that enforce it.
- GitOps principles: declarative infrastructure, version control as the control plane, and reconciliation loops
- ArgoCD architecture: application controller, repo server, API server, and Redis
- Deploying ArgoCD to a cluster and connecting it to a Git repository
- ArgoCD Applications, ApplicationSets, and the App of Apps pattern
- Sync policies: manual vs automated sync, self-healing, and pruning
- Managing multiple clusters and environments with ArgoCD
- FluxCD: the CNCF-native alternative β source controller, kustomize controller, helm controller
- Kustomize: environment-specific overlays without duplicating manifests
- Helm: packaging Kubernetes applications, writing custom charts, and using Helm with ArgoCD/Flux
- Secrets in GitOps: Sealed Secrets and External Secrets Operator (ESO) with AWS Secrets Manager
- Progressive delivery: blue/green and canary deployments with Argo Rollouts
- Image update automation: automatically promoting new container images through environments
Week 4β5 β Phase 6: Observability & Platform Security
A platform is only production-ready when you can see what it's doing and trust that it's secure. This phase covers the full observability stack and cloud security fundamentals.
- The three pillars of observability: metrics, logs, and traces
- Prometheus: scraping metrics, writing PromQL queries, and configuring alerting rules
- Grafana: building dashboards for cluster health, application performance, and cost
- Loki: log aggregation for Kubernetes workloads without indexing overhead
- OpenTelemetry: instrumenting applications for distributed tracing (language-agnostic)
- Alerting pipelines: Alertmanager routing to PagerDuty, Slack, and email
- AWS CloudWatch: metrics, log groups, container insights, and CloudWatch alarms
- IAM security hardening: least privilege, permission boundaries, and service control policies
- Kubernetes security: Pod Security Standards, OPA/Gatekeeper policy enforcement
- Secrets management at scale: AWS Secrets Manager, HashiCorp Vault basics
- Supply chain security: signing container images with Cosign, SBOM generation
- FinOps: cloud cost visibility, rightsizing, Reserved Instances, and Savings Plans
Week 5 β Phase 7: Internal Developer Platform (IDP) Design
The capstone phase. You will design and build a minimal but real Internal Developer Platform β the infrastructure product that platform teams build for their engineering organisations.
- What is an Internal Developer Platform: golden paths, self-service, and developer experience
- Backstage (by Spotify): setting up a developer portal with a service catalogue and TechDocs
- Scaffolding templates: letting developers create new services from standardised templates via Backstage
- Platform team topology: how to structure a platform team and define its SLOs
- Capstone project: provision a full environment (VPC, EKS, monitoring stack, GitOps pipeline) from scratch using Terraform + ArgoCD, and expose it to a development team via a Backstage portal
π Schedule & Timings
Choose one group only based on your availability. Max 5 candidates per group to ensure individual attention and hands-on lab support.
Weekday Groups:
- Group 1: MonβWed, 10 AM β 1 PM
- Group 2: MonβWed, 4 PM β 7 PM
Weekend Groups:
- Group 3: Sat & Sun, 10 AM β 2 PM
- Group 4: Sat & Sun, 4 PM β 8 PM
π Location: In-house training in Islamabad
π± Online option may be arranged for out-of-city participants
βοΈ Cloud Platforms Covered
- AWS β primary platform (EKS, EC2, RDS, S3, IAM, Secrets Manager, CloudWatch)
- Google Cloud β GKE Autopilot, Cloud Build, Artifact Registry
- Azure β AKS and Bicep covered as supplementary references
π οΈ Tools Covered
- IaC: Terraform, Pulumi, AWS CDK
- Containers: Docker, Docker Compose, AWS ECR, Trivy
- Kubernetes: kubectl, Helm, Kustomize, EKS, GKE Autopilot
- GitOps: ArgoCD, FluxCD, Argo Rollouts, Sealed Secrets, ESO
- Observability: Prometheus, Grafana, Loki, OpenTelemetry, Alertmanager
- Security: OPA/Gatekeeper, Cosign, HashiCorp Vault, AWS Secrets Manager
- IDP: Backstage
- CI/CD: GitHub Actions, Atlantis, CDK Pipelines
β Prerequisites
- Comfortable with Linux command line and basic shell scripting
- Familiarity with at least one programming language (any)
- Basic understanding of how web applications and APIs work
- No prior Kubernetes or Terraform experience required
π― Who This Is For
- Backend or full-stack developers who want to own infrastructure
- DevOps engineers looking to specialise in platform and IaC roles
- Cloud engineers targeting senior AWS / GCP / Azure positions
- Engineers preparing for remote roles at international companies
π³ Course Fee & Booking
- β Duration: 5 Weeks
- π Seats: 5 only per group