Infrastructure as Code
Terraform & OpenTofu Field Manual
Author modules, enforce policy checks, and document drift responses for infrastructure definitions that scale.
- 4 weeks · live
- Live online
- Starts 2026-05-27
- KRW 980,000 tuition reference
Program narrative
Participants build a multi-environment pipeline with policy-as-code gates and human-readable module contracts. You will practice importing legacy resources, documenting state ownership, and communicating changes to application teams without burying them in diffs.
What is included
- Module design patterns with explicit interfaces
- Remote state strategies and locking etiquette
- Policy checks that catch risky destroys early
- Drift triage workflows and communication templates
- Secrets handling without sharing long-lived keys in chat
- Documentation blocks that survive audits
- Pair sessions on reviewing large plans calmly
Outcomes you can demonstrate
- Ship a reusable module with examples and upgrade notes
- Run a policy-gated apply demo for stakeholders
- Draft a drift response playbook for your squad
FAQ
Terraform or OpenTofu?
Core lessons target Terraform 1.x APIs; OpenTofu compatibility is highlighted where CLI flags differ.
Do you cover cloud-specific modules?
Yes, with emphasis on patterns that stay portable. Vendor-specific modules are demos, not the entire syllabus.
What is excluded?
We skip desktop virtualization stacks and bare-metal provisioning kits. Those belong to a dedicated hardware track.