Defense Infrastructure Delivery Curriculum

Subject: Defense Infrastructure Delivery Curriculum

55 chapters

Chapters

  1. 1 Acquisition Framework Foundations
    samba boom bap, soulful cabaret, koto gnawa · 3:37
    Learn the three primary acquisition pathways available to the Department of Defense for rapidly delivering new capabilities, from traditional multi-year processes to streamlined middle tier and software-specific routes. Discover how to select the right acquisition framework before beginning any defense project to match timeline requirements with operational urgency.
  2. 2 Milestone Reviews — Purpose, Artifacts, and Expectations
    appalachian folk anti-folk, drill and bass balkan brass band · 4:00
    Learn how System Requirements Review and Preliminary Design Review serve as critical checkpoints in defense infrastructure projects, establishing clear traceability from user needs to system specifications while validating operational concepts and interface requirements. These milestone reviews ensure proper documentation, stakeholder alignment, and technical feasibility before moving forward in the development process.
  3. 3 Hybrid Agile + Milestone Delivery
    samba boom bap, soulful cabaret, koto gnawa · 3:26
    Learn how defense contractors can successfully blend Agile sprints with traditional milestone-based delivery requirements, creating a hybrid approach that satisfies both rapid development needs and stringent government oversight processes.
  4. 4 Technical Review Board Dynamics
    bengali acoustic chicago blues, new wave acid trance · 5:15
    Explore the key roles and responsibilities of Technical Review Board members in defense projects, from project managers and engineers to security specialists and user representatives who ensure successful infrastructure delivery.
  5. 1 Architecture and Core Concepts
    bengali acoustic chicago blues, new wave acid trance · 6:35
    Explore the fundamental building blocks of Kubernetes architecture, from the API server's central role to how schedulers and controllers orchestrate containerized applications across distributed infrastructure.
  6. 2 Networking Deep Dive
    alternative rock, southern rock ska · 3:47
    Explore the critical networking technologies that secure defense infrastructure, from CNI plugins like Calico and Cilium to multi-network bridging solutions that ensure both performance and policy enforcement in classified environments.
  7. 3 Storage and State
    bengali acoustic chicago blues, new wave acid trance · 4:58
    Learn how Kubernetes manages persistent data through Volumes, Claims, and Storage Classes, ensuring your containerized applications maintain critical information beyond pod lifecycles.
  8. 4 Cluster Lifecycle and Operations
    alternative rock, southern rock ska · 3:12
    Learn the essential phases of Kubernetes cluster management, from initial planning and platform selection across major cloud providers to deployment strategies for both connected and air-gapped environments. Discover how to choose the right tools like EKS, AKS, GKE, RKE2, and kubeadm based on your specific infrastructure requirements and operational constraints.
  9. 5 Multi-Cluster and Active-Active Patterns
    samba boom bap, soulful cabaret, koto gnawa · 3:59
    Kubernetes engineers discover why multi-cluster deployments require careful application-level design beyond platform capabilities, learning essential patterns for managing shared state and data synchronization across distributed infrastructure.
  10. 1 Core Architecture
    drumstep soul, swamp blues · 3:39
    Explore the fundamental components of Apache Kafka's streaming architecture, learning how brokers, topics, partitions, segments, and offsets work together to manage high-volume data flows in modern defense infrastructure systems.
  11. 2 KRaft — The ZooKeeper Replacement
    bengali acoustic chicago blues, new wave acid trance · 4:56
    Learn how Apache Kafka's new KRaft consensus mechanism revolutionizes cluster management by eliminating the need for external ZooKeeper dependencies. Discover the technical advantages and operational simplifications that come with Kafka's self-managed metadata approach.
  12. 3 Kafka on Kubernetes
    bengali acoustic chicago blues, new wave acid trance · 4:59
    Explore how Apache Kafka integrates with Kubernetes through the Strimzi operator, learning to orchestrate streaming data clusters using custom resources like KafkaTopic, KafkaUser, and KafkaConnect for seamless data flow management.
  13. 4 Kafka Security
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 3:08
    Learn the four essential security pillars of Apache Kafka through an energetic musical journey that breaks down authentication methods, encryption protocols, and data protection strategies. This technical deep-dive transforms complex cybersecurity concepts like mTLS, SASL SCRAM, and OAuth into memorable verses that will stick with infrastructure professionals.
  14. 5 Cross-Cluster Replication and Active-Active
    drumstep soul, swamp blues · 3:30
    Learn how MirrorMaker Two enables cross-cluster replication through its three-connector architecture, covering source connectors, checkpoint tracking, and heartbeat monitoring to maintain synchronized distributed systems across multiple Kafka clusters.
  15. 1 NIST 800-171 and CMMC Level 2
    samba boom bap, soulful cabaret, koto gnawa · 3:34
    Learn the fundamentals of NIST 800-171's 110 security controls and discover how CMMC Level 2 compliance creates the foundation for protecting defense infrastructure through self-assessment or third-party evaluation pathways.
  16. 2 CPCSC (Canadian Program for Cyber Security Certification)
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 2:50
    Learn how Canada's CPCSC Level 2 certification mirrors the US CMMC framework, exploring the ITSG-33 controls that defense contractors must implement to secure critical infrastructure while maintaining sovereign cybersecurity standards.
  17. 3 STIG Hardening
    appalachian folk anti-folk, drill and bass balkan brass band · 3:08
    Learn how Security Technical Implementation Guides (STIGs) provide structured rules and severity categorizations to harden defense infrastructure against cyber threats. Discover the difference between critical CAT One findings that demand immediate attention and lower-priority CAT Two and Three vulnerabilities in automated compliance workflows.
  18. 4 FIPS 140-2/140-3 Cryptography
    bengali acoustic chicago blues, new wave acid trance · 5:25
    Learn the critical distinction between FIPS validation, compliance, and operational modes for cryptographic modules in defense systems, discovering why certified validation trumps mere spec compliance when security stakes are highest.
  19. 5 FedRAMP and Cloud Authorization
    alternative rock, southern rock ska · 4:04
    Learn how FedRAMP's three-tiered authorization framework (Low, Moderate, and High) aligns with DoD security levels to ensure proper cloud compliance for defense systems handling everything from public data to national security information.
  20. 6 Container Supply Chain Security
    bengali acoustic chicago blues, new wave acid trance · 4:33
    Learn how to secure containerized applications in defense environments by sourcing vetted images from trusted repositories and building custom containers from hardened foundations when standard solutions won't meet mission requirements.
  21. 1 System Security Plan (SSP)
    alternative rock, southern rock ska · 3:01
    Learn how to create a comprehensive System Security Plan by documenting system descriptions, drawing boundary diagrams, and establishing authorization limits that form the foundation of cybersecurity infrastructure. Master the essential SSP components of structure, boundaries, and controls that protect defense systems from threats.
  22. 2 Authorization Boundary Definition
    alternative rock, southern rock ska · 3:38
    Learn how to define authorization boundaries by mapping which security components you inherit from trusted platforms versus what you must protect within your own deployment zone.
  23. 3 Continuous Monitoring and Continuous ATO
    appalachian folk anti-folk, drill and bass balkan brass band · 3:34
    Learn how modern DevSecOps practices revolutionize defense infrastructure security by replacing lengthy traditional Authorization to Operate processes with real-time automated monitoring and continuous compliance validation. Discover the shift from years-long clearance waits to instant security checks that trigger with every code commit across defense systems.
  24. 4 Risk Management
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 3:14
    Learn to systematically identify, assess, and mitigate project risks using a four-column register system that maps likelihood against impact. Master the essential framework for building comprehensive risk management strategies that protect defense infrastructure projects from hidden threats and unforeseen complications.
  25. 1 Defining Active-Active
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 3:19
    Learn how active-active architecture revolutionizes system reliability by running multiple instances simultaneously, eliminating the traditional backup-waits-in-standby approach that leaves critical defense infrastructure vulnerable during failover periods.
  26. 2 Stateless Workloads
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 3:14
    Learn how stateless workloads enable global application deployment through clean server separation and intelligent load balancing that automatically redirects traffic when clusters fail.
  27. 3 Stateful Workloads
    appalachian folk anti-folk, drill and bass balkan brass band · 3:11
    Learn about three powerful distributed database solutions—CockroachDB, YugabyteDB, and Vitess—that enable global data resilience and multi-region scalability for mission-critical defense infrastructure workloads.
  28. 4 Kafka-Specific Active-Active Patterns
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 2:44
    Learn four essential Kafka patterns for keeping distributed clusters synchronized in active-active configurations, including topic ownership, mirroring strategies, and data aggregation techniques. Master the architectural approaches that ensure seamless data flow and consistency across multiple Kafka deployments.
  29. 5 Network Architecture
    alternative rock, southern rock ska · 2:55
    Learn how to architect robust network connections across cloud platforms using VPC peering, Transit Gateways, and direct physical connections like AWS Direct Connect and Azure ExpressRoute. Master the essential components that bridge cloud regions and create seamless data flow in modern defense infrastructure.
  30. 6 Failure Mode Analysis
    drumstep soul, swamp blues · 4:32
    Learn to identify and prepare for the six critical failure modes that can cripple defense infrastructure systems, from single node crashes to network partitions that split operational bases.
  31. 1 IaC Foundations
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 3:29
    Learn the essential building blocks of Infrastructure as Code (IaC) including cloud providers, Terraform modules, and OpenTofu as your foundation for automated infrastructure deployment. Master the core concepts that transform manual server management into efficient, reusable code-based solutions.
  32. 2 GitOps
    bengali acoustic chicago blues, new wave acid trance · 4:52
    Explore GitOps methodology as a revolutionary approach to infrastructure deployment, where Git repositories become the authoritative source for managing and auditing all system changes through automated tools like ArgoCD.
  33. 3 CI/CD Pipeline for Regulated Environments
    bengali acoustic chicago blues, new wave acid trance · 5:02
    Explore the six critical stages of secure CI/CD pipelines designed for defense environments, learning how multi-stage Docker builds and hardened security practices protect sensitive infrastructure from development through production deployment.
  34. 4 Dual-Environment Workflow
    samba boom bap, soulful cabaret, koto gnawa · 3:29
    Learn how defense infrastructure projects seamlessly transition between open development environments for rapid prototyping and secure production systems for classified implementation. This workflow methodology balances innovation freedom with stringent security requirements essential for military applications.
  35. 1 Team Structure and Role Design
    samba boom bap, soulful cabaret, koto gnawa · 3:17
    Learn how to structure defense infrastructure teams using the proven P-D-S model, where Platform, Data, and Security engineers work in specialized yet integrated roles. Discover the specific responsibilities and domain expertise each role brings to building robust, scalable defense systems.
  36. 2 Communication Cadence
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 3:08
    Learn how effective daily standup meetings can eliminate project roadblocks by focusing on obstacles rather than status updates, establishing a disciplined 15-minute communication rhythm that keeps defense infrastructure projects moving forward.
  37. 3 Documentation Strategy
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 2:50
    Learn why documentation should be treated as a first-class citizen in defense infrastructure projects, growing organically with each development sprint rather than being relegated to an afterthought. Discover strategies for creating living documentation that serves as "written gold" for future teams and stakeholders.
  38. 4 Managing Engineers in Restricted Environments
    appalachian folk anti-folk, drill and bass balkan brass band · 3:45
    Learn how to effectively lead engineering teams in secure, air-gapped environments where internet access, AI tools, and standard development resources are unavailable. Discover realistic productivity expectations and management strategies for maintaining mission-critical defense projects under strict security constraints.
  39. 5 Client Relationship Management
    bengali acoustic chicago blues, new wave acid trance · 4:35
    Learn essential strategies for building strong, transparent relationships with Information Systems Security Managers (ISSMs) through open communication, proactive risk sharing, and trust-building techniques that prevent costly surprises in defense infrastructure projects.
  40. 6 Subcontractor and Supporting Group Coordination
    alternative rock, southern rock ska · 3:04
    Learn essential strategies for managing subcontractors and supporting groups in defense infrastructure projects, including mapping dependencies, planning for network changes, and navigating approval processes to keep timelines on track.
  41. 1 Test Planning for CDR
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 3:07
    Learn the essential SATER framework for defense infrastructure test planning, covering how to structure comprehensive testing protocols with proper scope, approach, and environment setup for Critical Design Review phases.
  42. 2 Functional Testing
    appalachian folk anti-folk, drill and bass balkan brass band · 2:45
    Learn how to verify that your defense infrastructure systems work as intended by testing data flows from Kafka message producers through Kubernetes deployments to consumer endpoints. Discover essential techniques for validating each layer of your distributed architecture to ensure reliable end-to-end functionality.
  43. 3 Failover and Resilience Testing
    samba boom bap, soulful cabaret, koto gnawa · 3:34
    Learn how to systematically test system failures and network partitions while building resilient defense infrastructure that can automatically recover when critical components go down. This technical deep-dive covers failover strategies, quorum loss scenarios, and active-active architectures set to an unexpectedly groovy samba-cabaret fusion.
  44. 4 Performance Testing
    alternative rock, southern rock ska · 2:53
    Learn how to conduct performance testing on Kafka clusters and messaging systems, discovering how to measure throughput, assess scalability, and understand the performance impact of FIPS encryption through proper benchmarking techniques.
  45. 5 Security Testing
    drumstep soul, swamp blues · 4:10
    Learn essential security testing practices for defense infrastructure, including automated STIG compliance scanning with OSCAP and InSpec tools, plus critical manual verification techniques to ensure your systems meet rigorous security standards.
  46. 1 CDR to TRR
    appalachian folk anti-folk, drill and bass balkan brass band · 3:22
    Learn how defense projects transition from the Critical Design Review milestone to Test Readiness Review, exploring the formal processes and strict change controls that govern moving from approved designs into production phases.
  47. 2 Authorization Package
    drumstep soul, swamp blues · 3:04
    Learn the four essential components of a defense system authorization package - the System Security Plan (SSP), Security Assessment Report (SAR), Plan of Action and Milestones (POA&M), and risk assessment - through a soulful breakdown of how these documents work together to achieve security authorization.
  48. 3 Transition to Operations
    alternative rock, southern rock ska · 4:02
    Learn the critical handoff process from development to operations teams, covering essential documentation, knowledge transfer sessions, and monitoring systems needed to successfully transition defense infrastructure projects into production.
  49. 1 Kubernetes Ecosystem
    bengali acoustic chicago blues, new wave acid trance · 5:37
    Explore the essential Kubernetes platforms and tools used in defense infrastructure, learning how cloud-native solutions like EKS and AKS compare to secure, air-gapped alternatives like RKE2 and K3s for military deployments.
  50. 2 Kafka Ecosystem
    appalachian folk anti-folk, drill and bass balkan brass band · 3:41
    Learn how Apache Kafka forms the backbone of defense data infrastructure through an exploration of essential ecosystem tools like Strimzi and Confluent that enable scalable, reliable message streaming in Kubernetes environments. Discover the declarative approaches and operational strategies needed to build robust, mission-critical data pipelines for defense networks.
  51. 3 Compliance and Security
    appalachian folk anti-folk, drill and bass balkan brass band · 2:44
    Learn how automated security scanning tools like OSCAP and InSpec help maintain STIG compliance standards while building robust defense infrastructure systems. Discover the essential processes for systematic security verification and compliance management that keep military and government systems properly secured.
  52. Phase 1: Foundations (Weeks 1–3)
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 3:45
    Learn the fundamental building blocks of Kubernetes infrastructure through an exploration of API servers, etcd storage, controller managers, and pod scheduling that establishes the essential knowledge needed for secure defense system deployment.
  53. Phase 2: Hands-On (Weeks 4–6)
    appalachian folk anti-folk, drill and bass balkan brass band · 3:13
    Dive into the practical implementation of defense infrastructure as you learn to deploy and manage dual Kubernetes clusters using EKS or RKE2, mastering multi-cluster operations and kubectl context switching for robust military-grade systems.
  54. Phase 3: Integration (Weeks 7–9)
    alternative rock, southern rock ska · 3:54
    GitOps pipelines and ArgoCD automation take center stage as defense infrastructure teams learn to synchronize configurations across multiple clusters and implement automated healing mechanisms during the critical integration phase.
  55. Phase 4: Program Execution (Weeks 10–12)
    tokyo acid breaks, tango reggae, r&b gospel, rap dirty south · 3:14
    The final execution phase walks through critical design review presentations, lab environment setup, and stakeholder demonstrations that bring defense infrastructure projects from planning to successful implementation.