Call :+91 8055223360 

International PG Diploma Program (UK)- IT IMS Cloud & DevOps

5918 Ratings
5/5
1880 Learners

International PG Diploma Certificate Program IT – IMS Cloud and Devops  – Awarded by OTHM – UK , Ofqual Approved UK Qualification provider(https://www.gov.uk/government/organisations/ofqual).This program consists of Practical in-depth  learning of Operating system  , Virtualization , All Cloud technologies and automation using DevOps tools , Clustering , Public Cloud , Private Cloud , Storage area Network and Core system networking , Data Centre Management etc .Program include  300 core System Admin activities , 120 + Cloud activities , complete automation using DevOps Tools . 10  DevOps Projects , 400 + Assignments and 100 hours of Mock interview session. You will acquire a knowledge of  5+ year experienced System / Cloud and DevOps Engineer .This program is good for freshers and up to 3 – 4 years of industry experienced professional   . Those who have career gap .1 Global Certification is Free along with this course . All materials are giving free along with this course .

 

Avg. salary of a System/Cloud/ Devops Engineer is goes up to 15 Lakhs per annum

Major courses : Red Hat Linux 7/8 – SA1 , SA2 and SA3 . Automation with ansible , Devops – Complete Life Cycle , Virtualization – VMWARE , Public Cloud – IaaS AWS | Azure and GCP | Private Cloud – Openstack , Openshift – Docker , Containers and Kubernetes . SAN , NetBackup , VCS , VXVM – High availability Clustering , Shell Scripting , Redhat Virtualization , Open Source- Docker & Kubernetes, AWS-Docker & Kubernetes, Azure-Docker & Kubernetes, GCP-Docker & Kubernetes 

Overview of tools covered

Red Hat Linux 7/8 – SA1 , SA2 and SA3 . Automation with ansible , , AWS Cloud , Devops – Complete Life Cycle VMware , AZURE , SAN , NetBackup , VCS , VXVM – High availability Clustering , Private Cloud – Openstack, Red hat Virtualization , Networking , OpenShift – Containers , Kubernetes and Docker ,GCP , Shell Scripting , Pythion Scripting  and All Cloud Devops , CKA , CKAD 

0 +
Students Empowered

Online / Classroom

Format

12 months

Recommended 12-15 hrs/week

0 +
Hiring Partners

Every Month 1st

Start Date

Certified By

OTHM–UK Recognised by ofqual.gov.uk

About the Program

Project Driven industry mentorship in IT IMS , Cloud and Devops
Dedicated career support,
Learn 30 + IMS tools .
300 core System Admin activities
120 + Cloud activities
complete automation using DevOps Tools .
400 + AssignmentsAll Cloud Devops – Azure , AWS and GCP
100 hours of Mock interview session
Expertise in Infrastructure Management
Dedicated Trainers with ample of Industry Experience
Project based IT Training and Certification programs .
You Gain Knowledge of 5+ Year Experienced System Administrator
Industry standard Projects And Assignments with Mentor Support
Lab Access and Practical Guidance

About Ofqual Qualifications – The Office of Qualifications and Examinations Regulation (Ofqual) regulates qualifications, examinations and assessments in England. 

Program Overview

Key Highlights

Top Skills You Will Learn

Redhat Linux , AWS , Devops , VMWARE , AZURE , Openstack , Openshift , GCP, All Cloud Devops

Job Opportunities

System Administrator , Linux Cloud Engineer , Devops Engineer , Cloud Administrator , Our students placed in various packages in MNC’s Ranging from 5 Lakhs to 25 Lakhs . Experience Level from freshers  to 18+ Year experienced candidates

Who Is This Program For?

 

Engineers, Freshers, Domain Experts, Software & IT Professionals , Those who having career gap .  Not interested in Programming . 

  • Engineering/Management Graduate or Post-graduate Fresher Students who want to make their career in IT Infrastructure Management Field . Those who hate programming .
  • Engineers who want to Become System Admin, Technical Architect , System Engineer , Cloud Engineer , Devops Engineer
  • System Admins who are interested in Data Centre Setup and Migration and Troubleshooting
  • Cloud Admins who would like to become Cloud Infra Architect .
  • MBA Graduates or business professionals who are looking to move to a heavily quantitative role.
  • Engineering Graduate/Professionals who want to be in IT Infrastructure Management Administrator field 
  • Working Professional or Fresh Graduate who have mostly worked in Operating system , Virtualization , Cloud Technology etc
  • Professionals who’ve worked mostly with Linux , Cloud , Windows , Virtualization , Automation etc 

Minimum Eligibility

Any Bachelor’s degree. Completed or not completed . No coding experience required . If you have any Educational Gap or any other career gap , you can do this program to boost up your career . The qualifications provided by UK Regulatory board is equal to Level 7 Masters Degree in UK.

Programming Languages and Tools Covered .

INTERNATIONAL POSTGRADUATE DIPLOMA FROM othm

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

INTERNATIONAL POSTGRADUATE DIPLOMA FROM othm

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

How You Benefit From This Program

    • Short Term Job Guaranteed Program
    • Minimum 5 Interview Calls .And Continued until  you get the JOB
    • RHCSA , RHCE , AWS Solution Architect , GCP , AZURE , Certification Preparation
    • Industrial Job Oriented Assignments, Industry Scenarios ,  which make you perfect in Subject 
    • Gain Knowledge of 5 + Years in IT Infrastructure System and Cloud Administration
    • Designed for Freshers to Working Professionals
    • 30 +   Tools 
    • Learn 30 + IMS  tools . 
    • 300 core System Admin activities 
    • 120 + Cloud activities 
    • complete automation using DevOps Tools . 
    • 400 + Assignments 
    • 360 Degree Career Support
    • One-on-One with Industry Mentors
    • Dedicated Student Mentor
    • Job Assistance with Top Firms
    • 0 % EMI – No Cost EMI Option

COURSE RELATED FAQs

Audience :- Freshers , Any Graduate , 2 to 4 Years Experienced up skilling enthusiasts . 3rd Year Graduates who are going to attend campus Interviews . These  courses designed in a way to be suitable for all branches of Engineering and all type of graduates – Science and non-science Graduates. Option to customise the subject according to the interest of candidate is also available

Minimum 5 Interview Calls and Maximum , until you get the JOB

Yes . you should inform the Administrator and send email to [email protected] to         cancel your admission within 7 days of the enrolment . Once we allocate the trainer and further proceedings , we will not be able to refund .



All our programs are developed by Industry person, who is having 10+ years real working knowledge . Under their mentorship , you will be able to gain at least 5+ year experience



Yes , it’s a 100% JOB Guaranteed program . Minimum salary Package of 5 Lakhs per annum for the right candidate .

No , You will get calls until you get placed 

We have placement record of over 6000+

Our Process

Course Curriculum

Redhat Linux RHEL V8 – SA1 | SA2 | SA3

Redhat Linux RHEL V8 – SA1 | SA2 | SA3

Redhat Linux RHEL V8 – SA1 | SA2 | SA3
  • Get started with Red Hat Enterprise Linux

    Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.

    Access the command line

    Log into a Linux system and run simple commands using the shell.

    Manage files from the command line

    Copy, move, create, delete, and organize files while working from the bash shell.

    Get help in Red Hat Enterprise Linux

    Resolve problems by using local help systems.

    Create, view, and edit text files

    Manage text files from command output or in a text editor.

    Manage local users and groups

    Create, manage, and delete local users and groups, as well as administer local password policies.

    Control access to files

    Set Linux file system permissions on files and interpret the security effects of different permission settings.

    Monitor and manage Linux processes

    Evaluate and control processes running on a Red Hat Enterprise Linux system.

    Control services and daemons

    Control and monitor network services and system daemons using systemd.

    Configure and secure SSH

    Configure secure command line service on remote systems, using OpenSSH.

    Analyze and store logs

    Locate and accurately interpret logs of system events for troubleshooting purposes.

    Manage networking

    Configure network interfaces and settings on Red Hat Enterprise Linux servers.

    Archive and transfer files

    Archive and copy files from one system to another.

    Install and update software

    Download, install, update, and manage software packages from Red Hat and yum package repositories.

    Access Linux files systems

    Access, inspect, and use existing file systems on storage attached to a Linux server.

    Analyze servers and get support

    Investigate and resolve issues in the web-based management interface, getting support from Red Hat to help solve problems.

    Comprehensive review

    Review the content covered in this course by completing hands-on exercises.

Improve command line productivity

Run commands more efficiently by using advanced features of the bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.

Schedule future tasks

Schedule commands to run in the future, either one time or on a repeating schedule.

Tune system performance

Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.

Control access to files with ACLs

Interpret and set access control lists (ACLs) on files to handle situations requiring complex user and group access permissions.

Manage SELinux security

Protect and manage the security of a server by using SELinux.

Maintain basic storage

Create and manage storage devices, partitions, file systems, and swap spaces from the command line.

Manage logical volumes

Create and manage logical volumes containing file systems and swap spaces from the command line.

Implement advanced storage features

Manage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.

Access network-attached storage

Use the NFS protocol to administer network-attached storage.

Control the boot process

Manage the boot process to control services offered and to troubleshoot and repair problems.

Manage network security

Control network connections to services using the system firewall and SELinux rules.

Install Red Hat Enterprise Linux

Install Red Hat Enterprise Linux on servers and virtual machines

Introduce Ansible

Describe Ansible concepts and install Red Hat Ansible Engine.

Deploy Ansible

Configure Ansible to manage hosts and run ad hoc Ansible commands.

Implement playbooks

Write a simple Ansible Playbook and run it to automate tasks on multiple managed hosts.

Manage variables and facts

Write playbooks that use variables to simplify management of the playbook and facts to reference information about managed hosts.

Implement task control

Manage task control, handlers, and task errors in Ansible Playbooks.

 

Deploy files to managed hosts

Deploy, manage, and adjust files on hosts managed by Ansible.

 

Manage large projects

Write playbooks that are optimized for larger, more complex projects.

 

Simplify playbooks with roles

Use Ansible roles to develop playbooks more quickly and to reuse Ansible code.

 

Troubleshoot Ansible

Troubleshoot playbooks and managed hosts.

Automate Linux administration tasks

Automate common Linux system administration tasks with Ansible.



AWS Certified Solutions Architect – Associate

AWS Certified Solutions Architect – Associate
  •  

    Course Introduction

    About the Training Architect

    Working as a Solutions Architect

    Creating an AWS Account, AWS Free Tier, Usage Tracking, and Billing Widget



 

Access Management

Shared Responsibility/Security Model

Service Models

High Availability vs. Fault Tolerance

RPO vs. RTO

Scaling

Tiered Application Design

 

Encryption

Architecture Odds and Ends

Architecture 101

 

AWS Accounts

AWS Physical and Networking Layer

Well-Architected Framework

Elasticity

AWS Architecture 101

 

Console Tour and Navigation

Introduction to S3

Introduction to CloudFormation

Hands-on Labs 

Getting Started with CloudFormation

AWS Product Fundamentals

 

IAM Essentials

IAM Policies

IAM Users

IAM Groups

IAM Access Keys

Securing Your Account — Creating an IAM User and Setting Up the CLI

IAM Roles

IAM Essentials

 

AWS Organizations

Role Switching Between Accounts

Multi-Account Management and Organizations

 

EC2 Architecture: Part 1

EC2 Architecture: Part 2

Instance Types and Sizes

EC2 Storage Architecture: Part 1

EC2 Storage Architecture: Part 2

EBS Snapshots

Security Groups

Instance Metadata

Hands-on Labs 

Creating and Working with an EC2 Instance

Server-Based Compute (EC2) Fundamentals

 

AMI

Bootstrap

Instance ENI, IP, and DNS: Part 1

Instance ENI, IP, and DNS: Part 2

Instance Roles

Server-Based Compute (EC2) Intermediate

 

Using EC2 Roles and Instance Profiles

 

Using AWS Tags and Resource Groups

 

EBS Volume and Snapshot Encryption

EBS Optimization, Enhanced Networking, and Placement Groups

EC2 Billing Models: Part 1 – Spot and Spot Fleet

EC2 Billing Models: Part 2 – Reserved Instances

Dedicated Hosts

Server-Based Compute (EC2) Advanced

 

What Are APIs and Microservices?

Serverless and Event-Driven Architectures

Lambda Essentials: Part 1

Lambda Essentials: Part 2

API Gateway Essentials: Part 1

API Gateway Essentials: Part 2

Step Functions

Serverless Compute (Lambda)

 

Docker Essentials

ECS

Container-Based Compute and Microservices

 

Introduction

Seven-Layer OSI Model: Part 1

Seven-Layer OSI Model: Part 2

IP Addressing Basics

Subnetting

IP Routing

Firewalls

Proxy Servers

Networking Fundamentals

 

Virtual Private Cloud (VPC) and Subnets: Part 1

Virtual Private Cloud (VPC) and Subnets: Part 2

Routing and Internet Gateway

Bastion Host/JumpBox

NAT, NAT Instance, and NAT Gateway: Part 1

NAT, NAT Instance, and NAT Gateway: Part 2

Network ACLs

Hands-on Labs 

Designing and Building a Custom VPC from Scratch

Virtual Private Cloud (VPC)

 

VPC Peering: Part 1

VPC Peering: Part 2

VPC Endpoints: Part 1

VPC Endpoints: Part 2

IPv6 within AWS

Egress-Only Gateway

Hands-on Labs 

Implementing VPC Peering on AWS

Advanced VPC

 

DNS 101

Domain Registration

Private vs. Public Hosted Zones

Record Set Types

Health Checks

Global DNS (Route 53) Fundamentals

 

Routing Policy: Simple

Routing Policy: Failover

Routing Policy: Weighted

Routing Policy: Latency

Routing Policy: Geolocation

Global DNS (Route 53) Advanced

 

Permissions

Transferring Data to S3

Encryption

Static Websites and CORS

Object Versioning

Presigned URLs

Hands-on Labs 

Creating a Static Website Using Amazon S3

 

Storage Tiers/Classes

Lifecycle Policies and Intelligent-Tiering

Cross-Region Replication (CRR)

 

CloudFront Architecture: Part 1

CloudFront Architecture: Part 2

OAI

 

EFS Fundamentals: Part 1

EFS Fundamentals: Part 2

Storage and Content Delivery

 

Database Models

 

RDS Essentials: Part 1

RDS Essentials: Part 2

RDS Backups and Restore

RDS Resiliency: Multi-AZ

RDS Read Replicas

Database Fundamentals and SQL — RDS

 

Aurora Essentials: Part 1

Aurora Essentials: Part 2

Parallel Queries and Aurora Global

Aurora Serverless Essentials: Part 1

Aurora Serverless Essentials: Part 2

SQL — Aurora

 

DynamoDB Essentials: Part 1 — Tables and Items

DynamoDB Essentials: Part 2 — Query and Scan

DynamoDB Essentials: Part 3

DynamoDB Performance and Billing

DynamoDB Streams and Triggers

DynamoDB Indexes: Part 1 — LSI

DynamoDB Indexes: Part 2 — GSI

NoSQL

 

DAX

ElastiCache

In-Memory Caching

 

Load Balancing Fundamentals

Classic Load Balancers and Health Checks: Part 1

Classic Load Balancers and Health Checks: Part 2

Classic Load Balancers and Health Checks: Part 3

Application Load Balancers: Part 1

Application Load Balancers: Part 2

Network Load Balancers

Launch Templates and Configurations

Auto Scaling Groups: Part 1

Auto Scaling Groups: Part 2

Hands-on Labs

Implementing an Auto Scaling Group and Application Load Balancer in AWS

 

VPC VPN (IPsec)

Direct Connect Architecture

When to Pick Direct Connect vs. VPN

 

Snowball, Snowball Edge, and Snowmobile

 

Storage Gateway 101

Database Migration Service 101

 

What Is Identity Federation?

When to Use Identity Federation

Hybrid and Scaling

 

Simple Notification Service (SNS)

Simple Queue Service (SQS): Part 1

Simple Queue Service (SQS): Part 2

Elastic Transcoder

Application Integration

 

Athena

Elastic MapReduce (EMR)

Kinesis and Firehose

Redshift

Analytics

 

CloudWatch

CloudWatch Logs

CloudTrail

VPC Flow Logs

Hands-on Labs

Custom Logging Using CloudWatch and CloudWatch Logs

Hands-on Labs 

Working with AWS VPC Flow Logs for Network Monitoring

Logging and Monitoring

 

CloudWatch Events

KMS Essentials: Part 1

KMS Essentials: Part 2

 

Elastic Beanstalk

OpsWorks

Operations and Deployment

 

How to Prepare for the Real Exam

AWS Solutions Architect Associate (SAAC01) – Final Practice Exam

 

 

This course can help prepare you for a certification exam.

Earn a Certificate of Completion

When you complete this course, you’ll receive a certificate of completion as proof

DEVOPS

DEVOPS
  • This module gives an introduction to DevOps principles and objectives. You will gain complete knowledge on how to use DevOps frameworks and implement DevOps on the cloud.

     

    • What is DevOps.
    • Basics of DevOps
    • DevOps Principles
    • Benefits of DevOps
    • DevOps SDLC
    • DevOps objectives
    • DevOps on Cloud
    • Devops Frameworks

In this section, you’ll master the fundamentals of the Linux Operating system and system administration. 

  • Basics of linux operating system
  • Introduction linux system administration

 

Continuous integration/Continuous deployment is the backbone bone of successful DevOps practice. This section will walk you through the fundamentals of CI/CD and develops skills to work with DevOps tools through hands-on exercises.

Tools:

  • Jenkins
  • Chef
  • Docker
  • Vagrant
  • Nagios

CI/CD :

  • Continuous Testing and Integration
  • Continuous Release and Deployment
  • Continuous Application Monitoring

The cloud computing module of DevOps provides comprehensive knowledge of cloud service models and cloud deployment models. Also, you will be taught how to launch a virtual machine with AWS. 

Cloud Computing Concepts:

  • Evolution of cloud
  • Grid Computing vs. Cloud Computing
  • Characteristics and Benefits of Cloud
  • Cloud service models (NIST)
  • IaaS, PaaS, and SaaS
  • Cloud service model implementations
  • Cloud Deployment Models (NIST)

Virtualization Concepts:

  • Virtual Machines
  • Virtual bootable OS Images
  • Cloud Storage
  • SOA and Cloud
  • Virtual Private Cloud (VPC)
  • Risk in Cloud and DevOps security concerns
  • Introduction to AWS and AZURE

CRITERIA

  • Things to Look For and Avoid
  • IT Assets Ownership
  • Viewing Applications As Products, not Projects
  • DevOps in the Enterprise
  • IT Governance
  • Governance and Risk Mitigation
  • DevOps Adoption Steps
  • Select DevOps Techniques and Practices
  • Service Quality Metrics

 

TOOLS

  • The Choice of Cloud Platform
  • DevOps IaaS and PaaS
  • Containerization Tools
  • System Configuration Automation and Management
  • Continuous Integration (CI) Systems
  • Build and Dependency Management Systems
  • Select DevOps Tools
  • Collaborative Lifecycle Management Solutions from IBM
  • Rational Team Concert (RTC)
  • Rational Quality Manager (RQM)
  • Rational DOORS Next Generation (DNG)

In this section, you’ll gain a detailed overview of chef terminology, configuration, workstation setup, organization setup, how to create data bags, create and add roles to the organization. Advanced chef concepts like Foodcritic, Test Kitchen Chef, etc., are also covered in this section.

Overview of Chef

  • Common Chef Terminology (Server, Workstation, Client, Repository, etc.)
  • Servers and Nodes
  • Chef Configuration Concepts

Workstation Setup

  • How to configure knife
  • Execute some commands to test the connection between knife and workstation

Organization Setup

  • Create an organization
  • Add yourself and node to organization

Test Node Setup

  • Create a server and add to the organization
  • Check node details using a knife

Databags

  • How to create Databags
  • Add Databags to organization
  • Node Objects and Search
  • How to Add Run list to Node
  • Check node Details

Environments

  • How to create Environments
  • Add servers to environments

Roles

  • Create roles
  • Add Roles to organization

Advanced Chef

  • Foodcritic
  • Test Kitchen Chef
  • Improve and expand on the existing recipes
  • One-click system launching

In this module, you’ll learn how to deploy the Puppet configuration management tool through hands-on exercises. By the end of this module, you’ll become proficient at automating the entire workflow using Puppet.

Introduction to Puppet

  • Installation and Configuration of Master server and agents
  • Managing Manifests

Creating and Managing modules

Version control with Puppet

In this module, you will learn to install and configure Vagrant. Additionally, understand how to create a small VirtualBox using Vagrant and add images.

Introduction

  • What is Vagrant
  • Working with Vagrant environment

Installation and Configuration

  • How to install Vagrant in Windows and Linux
  • Configure Vagrant

Provisioning with Vagrant

  • How to use Vagrant to create a small Virtualbox.
  • Add required Images to Vagrant

Using Vagrant

  • Using Vagrant in Chef for Testing

This section provides detailed knowledge about the source code management using Git and Nexus. You’ll master the core concepts and various operations performed on it through real-time examples.

GIT REPOSITORY

  • What is a version control system?
  • What is a distributed version control system?
  • Installation
  • Different levels of Git configuration
  • The process of staging and committing
  • The details of the commit objects

NEXUS

  • Nexus prerequisites
  • Installing and Running Nexus
  • Using the Nexus User Interface

This module introduces Jenkins, the core concepts and technology behind Jenkins. You’ll learn how to build and automate test cases using Maven, install Jenkins plugins, and distributed builds with Jenkins.

INTRODUCTION TO JENKINS-CI

  • Continuous Integration with Jenkins Overview
  • Installation
  • Configure Jenkins as a stand-alone application
  • Configure Jenkins on an Application Server
  • Jenkins management
  • Support for the Git version control systems
  • Different types of Jenkins Jobs
  • Setting up a Jenkins job
  • Scheduling build Jobs
  • Maven Build Scripts

 

Securing Jenkins

  • Authentication
  • Authorization
  • Confidentiality
  • Creating users

Jenkins Plugin 

  • Installing Jenkins Plugins
  • SCM plugin
  • Build and test
  • Analyzers

Distributed builds with Jenkins

Best Practices for Jenkins

In this section, you’ll learn how to monitor the servers, trigger alerts, how to apply and remove blackouts using both Nagios and Zenoss through hands-on practice.

NAGIOS

  • How to monitor the Servers in Nagios
  • Trigger Alerts in Nagios
  • How to apply blackouts and remove blackouts

ZENOSS

  • How to monitor the Servers in Zenoss
  • Trigger Alerts in Zenoss
  • How to apply blackouts and remove blackouts
  • How to check events; CPU, Memory and RAM Graphs for servers

In this section, you’ll explore what DevOps architecture is and how it benefits your organization.

  • Web Forms
  • User Controls
  • Shared UI Code
  • Business Logic

Configuration management plays a major role in DevOps in automating tedious tasks. This section highlights configuration management processes, incident management, problem management, and change management.

  • Configuration Management Activity
  • Configuration Control
  • Incident Management
  • Change Management
  • Problem Management

This section deals with cloud services. You’ll learn how to create servers and networks in the cloud, set up rules, and more through best practices.

  • Creating Servers and Networks in Cloud
  • Setting up rules and Application
  • Difficult Scenarios in environments.
  • Scaling
  • Environment testing

VMWARE

VMWARE
    • Basic Concepts of virtualization to complete the VMware course.
  • Describe how vSphere fits into the software defined data center and the cloud infrastructure
  • Explain how vSphere interacts with CPUs, memory, networks, and storage
  • Use vSphere Client to access and manage your vCenter Server system and ESXi host
  • Compare virtual machine hardware version 14 to other versions
  • Identify the virtual network adapters, and describe the enhanced VMXNET3
  • Compare the types of virtual disk provisioning
  • Install and configure ESXi host settings
  • Identify the advantages of ESXi Quick Boot
  • Describe the vCenter Server architecture
  • Discuss how ESXi hosts communicate with vCenter Server
  • Use vSphere Client to manage the vCenter Server inventory
  • Add data center, organizational objects, and hosts to vCenter Server
  • Create custom inventory tags
  • Describe the rules for applying permissions
  • Create a custom role in vCenter Server
  • Identify storage protocols and storage device types
  • Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage
  • Create and manage VMware vSphere® VMFS and NFS data stores
  • Explain how multi pathing works with iSCSI, NFS, and Fibre Channel storage
  • Identify the advantages of VMware vSAN™
  • Create, provision, and remove a virtual machine
  • Explain the importance of VMware Tools™
  • Describe how to import a virtual appliance OVF template
  • Use templates and cloning to deploy new virtual machines
  • Modify and manage virtual machines
  • Create an instant clone of a virtual machine
  • Identify the types of content libraries and how to deploy and use them
  • Add a hot-pluggable device
  • Dynamically increase the size of a virtual disk
  • Use customization specification files to customize a new virtual machine
  • Perform vSphere vMotion and vSphere Storage vMotion migrations
  • Create and manage virtual machine snapshots
  • Describe the architecture, components, and capabilities of vSphere Update Manager
  • Use vSphere Update Manager to manage the patching of ESXi, virtual machines, and vApps
  • Examine the features and functions of vSphere Update Manager EAM integration
  • Integrate vSphere Update Manager with vSphere DRS
  • Explain the vSphere HA architecture
  • Configure and manage a vSphere HA cluster
  • Use vSphere HA advanced parameters
  • Enforce infrastructural or intra-app dependencies during failover
  • Describe vSphere HA heartbeat networks and datastore heartbeats
  • Examine the features and functions of vSphere Fault Tolerance
  • Enable vSphere Fault Tolerance on virtual machines
  • Describe the functions of a vSphere DRS cluster
  • Create a vSphere DRS cluster
  • View information about a vSphere DRS cluster
  • Configure virtual machine affinity, DRS groups, and VM-host affinity rules
  • Remove a host from a vSphere DRS cluster
  • Review troubleshooting tools
  • Find important log files
  • Use vSphere Syslog Collector
  • ESXi core dump collector
  • Create and use alarms to report certain conditions or events
  • ESXi command line
  • ESXi / VM performance monitoring
  • Virtual Center server advance options
  • RV Tool deployment
  • ESXi and VC license management
  • Discuss CPU and memory concepts in a virtualized environment
  • Describe what over commitment of a resource meansConfigure and manage resource pools
  • Configure and Access vCenter Server Appliance with multiple Deployment Scenarios.
  • Virtual Center Server link Mode
  • Create a vCenter Server Appliance backup schedule
  • Restore vCenter Server Appliance from a backup
  • Monitor vCenter Server Appliance
Accordion Content
Accordion Content
Accordion Content
  • CISCO UCS hardware demonstration.
  • How to work with physical hardware with management console.

AZURE

AZURE
  • Implement cloud infrastructure monitoring

    • monitor security
    • monitor performance
      • configure diagnostic settings on resources
      • create a performance baseline for resources
      • monitor for unused resources
      • monitor performance capacity
      • visualize diagnostics data using Azure Monitor
    • monitor health and availability o monitor networking
      • monitor service health
    • monitor cost
      • monitor spend
      • report on spend
    • configure advanced logging
      • implement and configure Azure Monitor insights, including App Insights, Networks, Containers
      • configure a Log Analytics workspace
    • configure logging for workloads
    •  initiate automated responses by using Action Groups
    •  configure and manage advanced alerts
      • collect alerts and metrics across multiple subscriptions
      •  view Alerts in Azure Monitor logs
      • NOT: create Log Analytics query
  • select storage account options based on a use case
  • configure Azure Files and blob storage
  • configure network access to the storage account
  • implement Shared Access Signatures and access policies
  • implement Azure AD authentication for storage
  • manage access keys
  • implement Azure storage replication
  • implement Azure storage account failover
  • configure High Availability
  • configure storage for VMs
  • select virtual machine size
  • implement Azure Dedicated Hosts
  • deploy and configure scale sets
  • configure Azure Disk Encryption
  • save a deployment as an Azure Resource Manager template
  • modify Azure Resource Manager template
  • evaluate location of new resources
  • configure a virtual disk template
  • deploy from a template
  • manage a template library
  • create and execute an automation runbook
  • implement VNet to VNet connections
  • implement VNet peering
  • add custom domains
  • configure Azure AD Identity Protection
  • implement self-service password reset
  • implement Conditional Access including MFA
  • configure user accounts for MFA
  • configure fraud alerts
  • configure bypass options
  • configure Trusted IPs
  • configure verification methods
  • implement and manage guest accounts
  • manage multiple directories
  • install and configure Azure AD Connect
  • identity synchronization options
  • configure and manage password sync and password writeback
  • configure single sign-on
  • use Azure AD Connect Health
  • migrate workloads using Azure Migrate
    • assess infrastructure
    • select a migration method
    • prepare the on-premises for migration
    • recommend target infrastructure
  • implement Azure Backup for VMs
  • implement disaster recovery
  • implement Azure Update Management
  • implement Azure Load Balancer
  • implement an application gateway
  • implement a Web Application Firewall
  • implement Azure Firewall
  • implement the Azure Front Door Service
  • implement Azure Traffic Manager
  • implement Network Security Groups and Application Security Groups
  • implement Bastion
  • create and manage hierarchical structure that contains management groups, subscriptions and resource groups
  • assign RBAC roles
  • create a custom RBAC role
  • configure access to Azure resources by assigning roles
  • configure management access to Azure
  • interpret effective permissions
  • set up and perform an access review
  • implement and configure an Azure Policy
  • implement and configure an Azure Blueprint
  • implement and configure KeyVault
  • implement and configure Azure AD Managed Identities
  • register and manage applications in Azure AD
  • create and configure Azure App Service
  • create an App Service Web App for Containers
  • create and configure an App Service plan
  • configure an App Service
  • configure networking for an App Service
  • create and manage deployment slots
  • implement Logic Apps
  • implement Azure Functions
  • create a container image
  • configure Azure Kubernetes Service
  • publish and automate image deployment to the Azure Container Registry
  • publish a solution on an Azure Container Instance
    • NOT: Service Fabric
  • configure storage account tables
  • select appropriate CosmosDB APIs
  • set up replicas in CosmosDB
  • configure Azure SQL database settings
  • implement Azure SQL Database managed instances
  • configure HA for an Azure SQL database
  • publish an Azure SQL database
Accordion Content

 configure diagnostic settings on resources

  • create baseline for resources
  • create and test alerts
  • analyze alerts across subscription
  • analyze metrics across subscription
  • create action groups
  • monitor for unused resources
  • monitor spend
  • report on spend
  • utilize Log Search query functions
  • view Alerts in Azure Monitor logs
  • visualize diagnostics data using Azure Monitor Workbooks

monitor security (Note: Log Analytics, Azure Security Center, Azure Sentinel)• monitor performance

  • configure diagnostic settings on resources
  • create a performance baseline for resources
  • monitor for unused resources
  • monitor performance capacity
  • visualize diagnostics data using Azure Monitor
  • monitor health and availability
  • monitor networking
  • monitor service health
  • monitor cost
  • monitor spend
  • report on spend

configure network access to the storage account

  • create and configure storage account
  • generate Shared access signature
  • implement Azure AD authentication for storage
  • install and use Azure Storage Explorer
  • manage access keys
  • monitor Activity log by using Azure Monitor logs • implement Azure storage replication
  • implement Azure storage account failover
  • configure advanced logging

    • implement and configure Azure Monitor insights, including App Insights, Networks, Containers
    • configure a Log Analytics workspace
    • configure logging for workloads
    • initiate automated responses by using Action Groups
    • configure and manage advanced alerts
    • collect alerts and metrics across multiple subscriptions
    • view Alerts in Azure Monitor logs
      • NOT: create Log Analytics query

select storage account options based on a use case

  • configure Azure Files and blob storage
  • configure network access to the storage account
  • implement Shared Access Signatures and access policies
  • implement Azure AD authentication for storage
  • manage access keys
  • implement Azure storage replication
  • implement Azure storage account failover

 configure High Availability

  • configure Monitoring
  • configure Networking
  • configure Storage
  • configure Virtual Machine Size
  • implement dedicated hosts
  • deploy and configure scale sets

modify Azure Resource Manager template

  • configure Location of new VMs
  • configure VHD template
  • deploy from template
  • save a deployment as an Azure Resource Manager template
  • deploy Windows and Linux VMs

configure High Availability

  • configure storage for VMs
  • select virtual machine size
  • implement Azure Dedicated Hosts
  • deploy and configure scale sets
  •  configure Azure Disk Encryption

create and configure Vnet peering

  • create and configure Vnet to Vnet connections
  • verify virtual network connectivity
  • create virtual network gateway

 configure private IP addressing

  • configure public IP addresses
  • create and configure network routes
  • create and configure network interface
  • create and configure subnets
  • create and configure virtual network
  • create and configure Network Security Groups and Application Security Groups

 save a deployment as an Azure Resource Manager template • modify Azure Resource Manager template

  • evaluate location of new resources
  • configure a virtual disk template
  • deploy from a template
  • manage a template library
  • create and execute an automation runbook

add custom domains

  • configure Azure AD Identity Protection
  • configure Azure AD Join
  • configure self-service password reset
  • implement conditional access policies
  • manage multiple directories
  • perform an access review

implement VNet to VNet connections

  • implement VNet peering

add custom domains

  • configure Azure AD Identity Protection
  • implement self-service password reset
  • implement Conditional Access including MFA
  • configure user accounts for MFA
  • configure fraud alerts
  • configure bypass options
  • configure Trusted IPs
  • configure verification methods
  • implement and manage guest accounts
  • manage multiple directories

install and configure Azure AD Connect

  • configure federation
  • configure single sign-on
  • manage and troubleshoot Azure AD Connect
  • troubleshoot password sync and writeback

install and configure Azure AD Connect

identity synchronization options

  • configure and manage password sync and password writeback
  • configure single sign-on
  • use Azure AD Connect Health

 provision VMs

  • create Azure Resource Manager templates
  • configure Azure Disk Encryption for VMs
  • implement Azure Backup for VMs

migrate servers using Azure Migrate

• backup and restore data

migrate workloads using Azure Migrate

  • assess infrastructure
  • select a migration method
  • prepare the on-premises for migration
  • recommend target infrastructure
  • implement Azure Backup for VMs
  • implement disaster recovery
  • implement Azure Update Management

create and manage objects

  • manage a Logic App Resource
  • manage Azure Function app settings
  • manage Event Grid
  • manage Service Bus

 configure application gateway

  • configure Azure Front Door service
  • configure Azure Traffic Manager

create and configure Azure VPN Gateway

  • create and configure site to site VPN
  • configure ExpressRoute
  • configure Virtual WAN
  • verify on premises connectivity
  • troubleshoot on premises connectivity with Azure

configure user accounts for MFA

  • configure fraud alerts • configure bypass options
  • configure Trusted IPs • configure verification methods

 implement Azure Load Balancer

  • implement an application gateway
  • implement a Web Application Firewall
  • implement Azure Firewall
  • implement the Azure Front Door Service
  • implement Azure Traffic Manager
  • implement Network Security Groups and Application Security Groups
  • implement Bastion

 create and manage hierarchical structure that contains management groups, subscriptions and resource groups

  • assign RBAC roles
  • create a custom RBAC role
  • configure access to Azure resources by assigning roles
  • configure management access to Azure
  • interpret effective permissions
  • set up and perform an access review
  • implement and configure an Azure Policy
  • implement and configure an Azure Blueprint

create a custom role

  • configure access to Azure resources by assigning roles
  • configure management access to Azure
  • troubleshoot RBAC
  • implement RBAC Azure Policies
  • assign RBAC Roles

implement and configure KeyVault

  • implement and configure Azure AD Managed Identities
  • register and manage applications in Azure AD

create an Azure app service Web App• create documentation for the API• create an App Service Web App for Containers • create an App Service background task by using WebJobs• enable diagnostics loggingDesign and develop apps that run in containers • configure diagnostic settings on resources

  • create a container image by using a Dockerfile
  • create an Azure Kubernetes Service
  • publish an image to the Azure Container Registry
  • implement an application that runs on an Azure Container Instance
  • manage container settings by using code

Accordion Content

 create and configure Azure App Service• create an App Service Web App for Containers• create and configure an App Service plan• configure an App Service• configure networking for an App Service• create and manage deployment slots

  • implement Logic Apps
  • implement Azure Functions

create a container image

  • configure Azure Kubernetes Service
  •  publish and automate image deployment to the Azure Container Registry

    • publish a solution on an Azure Container Instance
    • NOT: Service Fabric

implement authentication by using certificates, forms-based authentication, tokens, or Windows-integrated authentication

  • implement multi-factor authentication by using Azure AD
  • implement OAuth2 authentication
    • implement Managed Identities for Azure resources Service Principal authentication

encrypt and decrypt data at rest and in transit

  • encrypt data with Always Encrypted
  • implement Azure Confidential Compute
  • implement SSL/TLS communications
    • create, read, update, and delete keys, secrets, and certificates by using the KeyVault API
Accordion Content

configure an app or service to send emails

  • configure Event Grid
  • configure the Azure Relay service
  • create and configure a Notification Hub
  • create and configure an Event Hub
  •  create and configure a Service Bus
    • configure queries across multiple products

Accordion Content

 configure storage account tables

  • select appropriate CosmosDB APIs
  • set up replicas in CosmosDB

 configure Azure SQL database settings

implement Azure SQL Database managed instances

  • configure HA for an Azure SQL database
  • publish an Azure SQL database

 implement autoscaling rules and patterns (schedule, operational/system metrics

  • implement code that addresses singleton application instances
    • implement code that addresses transient state

create, read, update, and delete data by using appropriate APIs

  • implement partitioning schemes
    • set the appropriate consistency level for operations

provision and configure relational databases

  • configure elastic pools for Azure SQL Database • implement Azure SQL Database managed instances
  • create, read, update, and delete data tables by using code

NETBACKUP

NETBACKUP
  • About NetBackup

    How a NetBackup system works 

    How to make a NetBackup system work for you

    About NetBackup software availability

    About the NetBackup media kit 

    About the NetBackup Electronic Software Distribution (ESD)

    images

    About the NetBackup documentation 

    About NetBackup license requirements 

    About Veritas Services and Operations Readiness Tools 

    Recommended SORT procedures for new installations 

    Recommended SORT procedures for upgrades 

    Installation and upgrade requirements for UNIX and Linux 

    Clusters 

    NetBackup 8.1 binary size requirements

    How to prepare for NetBackup installation 

    About NetBackup configuration

    NetBackup master server web server user and group creation

SAN

SAN
  • Introduction

    Fibre Channel Switches and Fabrics

    SAN Access Control

    Extending SANs with Inter-Switch Links

    Flow Control and Buffer Credits

    Joining SANs with Fibre Channel Routers

    Server Operating Systems and SANs

    Multipathing

    Booting Servers Off SAN Attached Storage

    SANs and Tape

    Tape Library Sharing

    Managing SANs

VCS & VXVM

VCS & VXVM
  • Install and configure Veritas InfoScale Enterprise.
    Configure and manage disks, disk groups, and volumes.
    Administer file systems.
    Create a cluster.
    Configure service groups and resources.
    Implement and verify failover and failback capability for application, storage, and network services.

Openstack

Openstack
  • Why OpenStack?

    Public Cloud Architecture

    Getting started with OpenStack

    OpenStack Architecture

    Logical Architecture

    Who is OpenStack for?

    Installation 

    How does OpenStack work?

    OpenStack vs. AWS

    Future Scope

Horizon

Nova Compute 

Cynder

Glance

Swift

Keystone

OPENSHIFT

OPENSHIFT
  • Introduction

    Red Hat OpenShift Fundamentals: Introduction

     

    Understanding OpenShift



    Understanding Containers and OpenShift

     

    Understanding the Red Hat Container Management Solutions

     

    Understanding OpenShift in a Container Environment

     

    Understanding OpenShift in a DevOps Environment

    Understanding OpenShift Architecture

    OpenShift versus Kubernetes

    Understanding the Role of OpenShift in a Hybrid Cloud Environment

    Installing OpenShift

    Understanding OpenShift Versions

    Installing Minishift

    Using oc cluster up

    Planning for an OpenShift Cluster

    Installing an OpenShift Cluster: Host Prep

    Installing an OpenShift Cluster: Installation

    Getting Started with OpenShift

    Getting Started with the Web Console

    Understanding Resource Types: Pods and Namespaces

    Understanding Resource Types: Deployment Configs and Networking

    Managing Resources from the Command Line

    Using Source-to-Image to Create Applications

    Basic OpenShift Troubleshooting

    Managing and Deploying OpenShift

    Module introduction

    Managing OpenShift Networking

    Understanding Software Defined Networking

    Understanding OpenShift SDN

    Understanding Services

    Understanding Routes

    Creating Routes

    Deploying Applications

    Scaling Applications

    Scheduling Pods

    Managing Images and Image Streams

    Managing Templates

    Managing OpenShift Storage

    Understanding OpenShift Storage

    Configuring OpenShift Storage Access

    Setting up NFS Persistent Storage Part 1

    Setting up NFS Persistent Storage Part 2

    Working with ConfigMaps

REDHAT Virtualization

REDHAT Virtualization
  • Introduction to Virtualization and Infrastructure Migration

     

    Introduction to Virtualization

     

    Essentials of Infrastructure Migration

     

    The Role of Cloud Management Platform in Infrastructure Migration (Demonstration)

     

    Red Hat Virtualization and vSphere (Demonstration)

     

    Cloud Management Platform Setup with CloudForms (Demonstration)

     

    Open Virtualization with Red Hat Virtualization (Demonstration)

     

    Infrastructure Migration Architecture and Usage

     

    Infrastructure Migration (Demonstration)

     

    IT Optimization Recap and Beyond

Networking

Networking
  • Computing Basics.

    PC Components. PC Versus Laptop. Bit, Bytes, and Measurement Terms. Decimal-to-Binary Conversion. Binary-to-Decimal Conversion. Binary-to-Hex Conversion. Hex-to-Binary Conversion.

    1. Networking Fundamentals.

    Basic Networking Terminology. Network Applications. Understanding Network Computers. The Open System Interconnection (OSI) Model. Data Communication. Peer-to-Peer Communication. The TCP/IP Model. OSI Model Versus TCP/IP Model.

    1. Network Devices.

    Layer 1 Devices. Layer 2 Devices. Layer 3 Devices. Voice, DSL, and Optical Devices. Firewalls and Authentication, Authorization, and Accounting Servers.

    1. Network Topologies.

    Physical Topology Versus Logical Topology. Bus. Star and Extended Star. Ring. Full Mesh and Partial Mesh.

  1. Understanding Ethernet Technologies.

LAN Standards. Ethernet. How Ethernet Works. Simplex, Half-Duplex, and Full-Duplex Operation.

  1. WANs.

The Global Internet. WAN Technology Overview. WAN Connection Types. WAN Provider Services. WAN Devices. WAN Service Providers and WAN Service Terms. WAN Signaling Standards and Capacity. WANs and the Physical Layer. WANs and the Data Link Layer.

  1. Other Types of Networks.

Metropolitan-Area Networks (MANs). Storage-Area Networks (SANs). Content Networks. Intranets and Extranets. Virtual Private Network (VPN).

  1. Network Media Types.

Twisted-Pair Cable. Coaxial Cable. Fiber-Optic Cable. Wireless Communication. Comparing Media Types.

  1. Cabling the LAN.

LAN Physical Layer. Ethernet in the Campus LAN. Ethernet Media and Connector Requirements. Connection Media. UTP Implementation.

  1. Cabling the WAN.

WAN Physical Layer. WAN Serial Connections. Routers and Serial Connections. Routers and ISDN BRI Connections. Routers and DSL Connections. Routers and Cable Connections. Setting Up Console Connections.

  1. Shared LAN Technology.

Early Local-Area Networks. Hubs. Bridges. Layer 2 Switches. Typical Causes of Network Congestion. Today’s LANs.

  1. LAN Switching Basics.

Microsegmentation. LAN Switch Operation. Full-Duplex Transmission. Modes of Switching. The Need for Spanning Tree.

  1. Multilayer Switching Devices.

Layer 2 Switching Devices. Layer 3 Switching Devices. Layer 4 Switching Devices.

  1. Virtual LANs.

Constraints of Shared LANs. Virtual LANs. VLAN Components. Establishing VLAN Membership. Communicating Between VLANs. Trunking.

  1. TCP/IP Overview.

Communication Protocol. TCP/IP Protocol Stack. TCP/IP Applications.

  1. Transport Layer.

Transport Layer Functions. Flow Control. TCP and UDP. Establishing a TCP Connection.

  1. TCP/IP Internet Layer Overview.

TCP/IP Internet Layer and the OSI Network Layer. IP Datagram. Protocol Field. ICMP. ARP. RARP. BOOTP and DHCP.

 Networking Addressing.

IP Addressing. IP Address Classes. Reserved IP Address. Private IP Addresses.

  1. IP Subnetting and Calculation.

Subnetworks. Subnet Masks. Network Addressing Planning. Subnetting Class C Addresses. Subnetting Class B Addresses. Identifying Subnet, Directed Broadcast, and Usable Addresses.

  1. Routing Basics.

Routing Overview. Routed Versus Routing. Path Determination. Routing Tables. Routing Algorithms. Administrative Distance.

  1. Routing Protocols.

IGP and EGP. Routing Protocols. RIPv1 and RIPv2. IGRP. EIGRP. OSPF. IS-IS. BGP.

  1. Traditional WAN Services.

WAN Connection Options. Multiplexing. Packet Switching vs Circuit Switching. Leased Lines. Frame Relay. ATM and Cell Switching. SONET.

  1. Dialup Access Technologies.

ISDN. PPP. HDLC.

  1. Analog Modems.

Modem Overview. Analog Modem Standards.

  1. Digital Subscriber Line (DSL).

Basic DSL. DSL Types. DSL Standards. Encapsulation and Protocols. DSL Advantages and Disadvantages.

  1. Cable Modems.

How Cable Modems Work. Cable Modem Advantages and Disadvantages. Cable and the OSI Model.

  1. Wireless Concepts.

Wireless Data Communications. Wireless Signal. Radio Frequency Bands. Spread-Spectrum Technology. Security in the Wireless Environment.

  1. Wireless LANs.

WLANs and Wireless Bridging. In-Building WLANs. In-Building WLAN Technology. Building-to-Building WLANs.

  1. Basics of Optical Networks.

Optical Business Drivers. Fiber-Optic Systems. Fiber-Optic Transmission System. Light.

  1. Optical Fibers.

Fiber Types. Fiber Geometry. Attenuation. Optical Filters. Optical Amplifiers (OAs).

  1. Optical Transmission and Multiplexing.

SONET Technology. DWDM Systems.

Appendix A: Introduction to Converged Networking.

Traditional Networks. Introduction to Voice and Data Networks. Voice, Video, and Data Networks. Common Issues with QoS. Summary. Review Exercises.

Open Source- Docker & Kubernetes

Open Source- Docker & Kubernetes
  •  

    Docker – Overview

    Docker – Installing Docker on Linux

    Docker – Installation

    Docker – Hub

    Docker – Images

    Docker – Images Lifecycle

    Docker – Containers

    Docker – Containers Lifecycle

    Docker – Working With Containers

    Docker – Architecture

    Docker – Configuring

    Docker – Containers & Shells

    Docker – File

    Docker – Building Files

    Building a Web Server Docker File

    Docker – Public Repositories

    Docker – Managing Ports

    Docker – Private Registries

    Docker – Instruction Commands

    Docker – Container Linking

    Docker – Storage

    Docker – Networking

    Docker – Setting NGINX

    Docker – Toolbox

    Docker – Logging

    Docker – Compose

    Docker-Swarm

 

Kubernetes – Overview

Kubernetes – Architecture

Kubernetes – Setup

Kubernetes – Images

Kubernetes – Jobs

Kubernetes – Labels & Selectors

Kubernetes – Namespace

Kubernetes – Node

Kubernetes – Service

Kubernetes – Pod

Kubernetes – Replication Controller

Kubernetes – Replica Sets

Kubernetes – Deployments

Kubernetes – Volumes

Kubernetes – Secrets

Kubernetes – Network Policy

Advanced Kubernetes

Kubernetes – API

Kubernetes – Kubectl

Kubernetes – Kubectl Commands

Kubernetes – Creating an App

Kubernetes – App Deployment

Kubernetes – Autoscaling

Kubernetes – Dashboard Setup

Kubernetes – Monitoring

AWS-Docker & Kubernetes

AWS-Docker & Kubernetes
  •  

    What Is Amazon Elastic Container Registry?

    AWS EC2

    AWS CLI Setup

    Components of Amazon ECR

    Registry

    Authorization Token

    Repository

    Repository Policy

    Image

    Commands

 

Docker Container Concepts

An intro to Amazon ECS

Terms and architecture

Task Definition

Task

Service

ECS Container Instances and ECS Container Agents

Cluster

 

Overview: Installing Kubernetes

Installing Dependencies

Installing the Latest Kubernetes

Exploring Your Kubernetes Installation

Kubernetes Architecture and Design

Achieving High-Availability

Scaling Kubernetes

Federation

Configuration Best Practices

Creating and Decoding Secrets

Using Secrets in Applications

Overview: Docker Containerization

Installing Docker and Building the Image

Deploying Your Docker Container

Interacting With Your Container

Hands-on Kubernetes on AWS

Azure-Docker & Kubernetes

Azure-Docker & Kubernetes

  • Docker Container Concepts

    Deploying Containers

    Multi-container Applications

    Azure Container Registry

    Azure Container Clustering Options

    Installing ACS

 

Introduction to Azure Container Service

Azure Container Instances

Creating your first container in Azure

Azure Marketplace containers

Container orchestration

 

 

What is AKS?

Kubernetes core concepts for AKS

Install the Kubernetes CLI

Baseline architecture for an AKS cluster

Clusters and workloads

Access and identity

Security

Networking

Storage

Deploy an Azure Kubernetes Service (AKS) cluster

Create a Kubernetes cluster

Connect to cluster using kubectl

Deploy the application

Scale applications

Update an application

Upgrade Kubernetes

GCP-Docker & Kubernetes

GCP-Docker & Kubernetes

  • Overview

    Create Account

    Compute Engine

    Permissions

    Running an image

    Commands

 

Containers on Compute Engine

Container technologies that run on Compute Engin

Container-optimized VM images

Installing container technologies on your instances

Install Docker

Permissions

 

Understanding the GKE Service Profiles

Benefits of Using GKE

Costing Model Used in GKE

Using the GCP Calculator

GKE Architecture

Deploying an Application

Kubernetes Components

Basic Commands

GKE Architecture

GKE and IAM Requirements

 

GKE Federation Requirements

Kubernetes Cluster Actions

Scale/Resize a Cluster

DCA

DCA

 

● Complete the setup of a swarm mode cluster, with managers and worker nodes

● State the differences between running a container vs running a service

● Demonstrate steps to lock a swarm cluster

● Extend the instructions to run individual containers into running services under swarm

● Interpret the output of “docker inspect” commands

● Convert an application deployment into a stack file using a YAML compose file with

“docker stack deploy”

● Manipulate a running stack of services

● Increase # of replicas

● Add networks, publish ports

● Mount volumes

● Illustrate running a replicated vs global service

● Identify the steps needed to troubleshoot a service not deploying

● Apply node labels to demonstrate placement of tasks

● Sketch how a Dockerized application communicates with legacy systems

● Paraphrase the importance of quorum in a swarm cluster

● Demonstrate the usage of templates with “docker service create”

 

Content may include the following:

● Describe Dockerfile options [add, copy, volumes, expose, entrypoint, etc)

● Show the main parts of a Dockerfile

● Give examples on how to create an efficient image via a Dockerfile

● Use CLI commands such as list, delete, prune, rmi, etc to manage images

● Inspect images and report specific attributes using filter and format

● Demonstrate tagging an image

● Utilize a registry to store an image

● Display layers of a Docker image

● Apply a file to create a Docker image

● Modify an image to a single layer

● Describe how image layers work

● Deploy a registry (not architect)

● Configure a registry

● Log into a registry

● Utilize search in a registry

● Tag an image

● Push an image to a registry

● Sign an image in a registry

● Pull an image from a registry

● Describe how image deletion works

● Delete an image from a registry

 

Content may include the following:

● Demonstrate the ability to upgrade the Docker engine

● Complete setup of repo, select a storage driver, and complete installation of Docker

engine on multiple platforms

● Configure logging drivers (splunk, journald, etc)

● Setup swarm, configure managers, add nodes, and setup backup schedule

● Create and manager user and teams

● Interpret errors to troubleshoot installation issues without assistance

● Outline the sizing requirements prior to installation

● Understand namespaces, cgroups, and configuration of certificates

● Use certificate-based client-server authentication to ensure a Docker daemon has the

rights to access images on a registry

● Consistently repeat steps to deploy Docker engine, UCP, and DTR on AWS and on

premises in an HA config

● Complete configuration of backups for UCP and DTR

● Configure the Docker daemon to start on boot

 

Content may include the following:

● Create a Docker bridge network for a developer to use for their containers

● Troubleshoot container and engine logs to understand a connectivity issue between

containers

● Publish a port so that an application is accessible externally

● Identify which IP and port a container is externally accessible on

● Describe the different types and use cases for the built-in network drivers

● Understand the Container Network Model and how it interfaces with the Docker engine

and network and IPAM drivers

● Configure Docker to use external DNS

● Use Docker to load balance HTTP/HTTPs traffic to an application (Configure L7 load

balancing with Docker EE)

● Understand and describe the types of traffic that flow between the Docker engine,

registry, and UCP controllers

● Deploy a service on a Docker overlay network

● Describe the difference between “host” and “ingress” port publishing mode

 

Content may include the following:

● Describe the process of signing an image

● Demonstrate that an image passes a security scan

● Enable Docker Content Trust

● Configure RBAC in UCP

● Integrate UCP with LDAP/AD

● Demonstrate creation of UCP client bundles

● Describe default engine security

● Describe swarm default security

● Describe MTLS

● Identity roles

● Describe the difference between UCP workers and managers

● Describe process to use external certificates with UCP and DTR

 

Content may include the following:

● State which graph driver should be used on which OS

● Demonstrate how to configure devicemapper

● Compare object storage to block storage, and explain which one is preferable when available

● Summarize how an application is composed of layers and where those layers reside on

the filesystem

● Describe how volumes are used with Docker for persistent storage

● Identify the steps you would take to clean up unused images on a filesystem, also on

DTR

● Demonstrate how storage can be used across cluster nodes

CKA

CKA

  • Certified Kubernetes Administrator

    5%-Scheduling

    •Use label selectors to schedule Pods.

    •Understand the role of Daemon Sets.

    •Understand how resource limits can affect Pod scheduling.

    •Understand how to run multiple schedulers and how to configure Pods

    to use them.

    •Manually schedule a pod without a scheduler.

    •Display scheduler events.

    •Know how to configure the Kubernetes scheduler.

    5%-Logging/Monitoring

    •Understand how to monitor all cluster components.

    •Understand how to monitor applications.

    •Manage cluster component logs.

    •Manage application logs.

     

    8%-Application Lifecycle Management

    •Understand Deployment sand how to perform rolling updates and rollbacks.

    •Know various ways to configure applications.

    •Know how to scale applications.

    •Understand the primitives necessary to create a self-healing application.

    11%-Cluster

    •Understand Kubernetes cluster upgrade process.

    •Facilitate operating system upgrades.

    •Implement backup and restore methodologies.

    12%-Security 

    •Know how to configure authentication and authorization.

    •Understand Kubernetes security primitives.

    •Know to configure network policies.

    •Create and manage TLS certificates for cluster components.

    •Work with images securely.

    •Define security contexts.

    •Secure persistent keyvalue store.

    7%-Storage

    •Understand persistent volumes and know how to create them.

    •Understand access modes for volumes.

    •Understand persistent volume claims primitive.

    •Understand Kubernetes storage objects.

    •Know how to configure applications with persistent storage.

    10%-Troubleshooting 

    •Trouble shoot application failure.

    •Trouble shoot control plane failure.

    •Trouble shoot worker node failure.

    •Trouble shoot networking.

    19%-Core Concepts

    •Understand the Kubernetes API primitives.

    •Understand the Kubernetes cluster architecture.

    •Understand Services and other network primitives.

    11%-Networking

    •Understand the networking configuration on the cluster nodes.

    •Understand Pod networking concepts.

    •Understand Service networking.

    •Deploy and configure network loadbalancer.

    •Know how to use Ingress rules.

    •Know how to configure and use the cluster DNS.

    •Understand CNI.

    12%-Installation,Configuration &Validation

    •Design a Kubernetes cluster.

    •Install Kubernetes masters and nodes.

    •Configure secure cluster communications.

    •Configure a Highly-Available Kubernetes cluster.

    •Know where to get the Kubernetes release binaries.

    •Provision underlying infrastructure to deploy a Kubernetes cluster.

    •Choose a network solution.

    •Choose your Kubernetes infrastructure configuration.

    •Run end-to-end tests on your cluster.

    •Analyse end-to-end tests results.

    •Run Node end-to-end tests.

CKAD

CKAD

 

Certified Kubernetes Application Developer(CKAD) ExamCurriculum v1.13.0

This document provides the curriculum outline of the Knowledge,Skills and Abilities that

a Certified Kubernetes Application Developer (CKAD) can be expected to demonstrate.

13%-Core Concepts

•Understand Kubernetes API primitives

•Create and configure basic Pods

18%-Configuration

•Understand Config Maps

•Understand Security Contexts

•Define an application’s resource requirements

•Create & consume Secrets

•Understand Service Accounts

10% Multi-Container Pods 

•Understand Multi-Container Pod design patterns (e.g.ambassador,adapter,sidecar)

18%-Observability

•Understand Liveness Probesand

Readiness Probes

•Understand container logging

•Understand how to monitor applications in Kubernetes

•Understand debugging in Kubernetes

20%-PodDesign 

•Understand how to use Labels, Selectors, and Annotations 

•Understand Deployments and how to perform rolling updates

•Understand Deployments and how to perform rollbacks

•Understand Jobs and CronJobs

13%-Services&Networking

•Understand Services

•Demonstrate basic understanding of Network Policies

8%-State Persistence

•Understand Persistent Volume Claims for storage

Course Reviews

I had a wonderful experience in Radical technologies where i did training in Hadoop development under the guidance of Shanit Sir. He started from the very basic and covered and shared everything he knew in this field. He was brilliant and had a lot of experience in this field. We did hands on for every topic we covered, and that’s the most important thing because honestly theoretical knowledge cannot land you a job.
Rohit Agrawal Hadoop
I have recently completed Linux course under Anand Sir and can assuredly say that it is definitely the best Linux course in Pune. Since most of the Linux courses from other sources are strictly focused on clearing the certification, they will not provide an insight into real-world server administration, but that is not the case with Anand Sir’s course. Anand Sir being an experienced IT infrastructure professional has an excellent understanding of how a data center works and all these information is seamlessly integrated into his classes.
Manu Sunil Linux
I had undergone oracle DBA course under Chetan sir’s Guidance an it was a very good learning experience overall since they not only provide us with theoretical knowledge but also conduct lot of practical sessions which are really fruitful and also the way of teaching is very fine clear and crisp which is easier to understand , overall I had a great time for around 2 months , they really train you well.also make it a point to clear all your doubts and provide you with clear and in-depth concepts hence hope to join sometime again
Reema banerjee Oracle DBA
I have completed Oracle DBA 11g from Radical technology pune. Excellent trainer (chetna gupta ). The trainer kept the energy level up and kept us interested throughout. Very practical, hands on experience. Gave us real-time examples, excellent tips and hints. It was a great experience with Radical technologies.
Mrudul Bhokare Oracle DBA
Linux learning with Anand sir is truly different experience… I don’t have any idea about Linux and system but Anand sir taught with scratch…He has a great knowledge and the best trainer…he can solve all your queries related to Linux in very simple way and giving nice examples… 100 🌟 to Anand Sir.
Harsh Singh Parihar Linux
Prev
Next

How You Benefit From This Program

  • Non-biased career guidance
  • Counselling based on your skills and preference
  • No repetitive calls, only as per convenience
  • Rigorous curriculum designed by industry experts
  • Complete this program while you work

Why we are the best Radical Technologies

Radical Technologies is truly progressing and offer best possible services. And recognition towards Radical Technologies is increasing steeply as the demand is growing rapidly.

Creative

0%

Innovative

0%

Student Friendly

0%

Practical Oriented

0%

Valued Certification

0%

Similar Courses

ENQUIRE NOW











    [recaptcha]