Radical Technologies
Call :+91 8055223360 | 8103400400

PG DIPLOMA CERTIFICATE IN IT- IMS – LINUX | CLOUD | DEVOPS

Achieve PG Diploma Certificate in IT- IMS

Job Guaranteed Master Program – IT IMS  – Linux Cloud and Devops 

Duration: 1 Year

This program is integrated with International PG Diploma Certificate Program IT – IMS Cloud and Devops  – Awarded by OTHM – UK , Ofqual Approved UK Qualification provider  (https://www.gov.uk/government/organisations/ofqual)

This program consists of Practical in-depth  learning of Operating system  , Virtualization , All Cloud technologies – AWS , AZURE and GCP ,automation using DevOps tools , Clustering , Public Cloud , Private Cloud , Storage area Network and Core system networking , Backup and Recovery ,Data Centre and Application Migrations , Data Centre Management etc

Program include  300 core System Admin activities , 120 + Cloud activities , complete automation using DevOps Tools . 10  DevOps Projects , 400 + Assignments and 100 hours of Mock interview session. You will acquire a knowledge of  5+ year experienced System / Cloud and DevOps Engineer .

This program is good for freshers and up to 3 – 4 years of industry experienced professional   & Those who have career gap

Certificates Achieved

You will receive 4 certificates after successful completion.

1. Global Certification – Google Certified Data Engineer.

2. RCITP after 6 months

3. Internship Certificate explaining Projects undergone

4. International PG Diploma certificate in IT – IMS Cloud and Devops -OTHM UK After 1 year of successful completion of the course . You have to undergo multiple  assignments to achieve the International PG Diploma. After successful completion of the course, there will be 12 online assessments on topics covered during the course . PG Diploma is awarded directly by OTHM

Major courses covered :

Red Hat Linux 7/8 , Devops – Complete Life Cycle
Automation with ansible Docker
Virtualization- Vmware Containers and Kubernetes
 Public Cloud – IaaS SAN
 AWS NetBackup
Azure and GCP  VCS
Private Cloud VXVM- High availability Clustering
Openstack Shell Scripting
Openshift Redhat Virtualization
Azure-Docker & Kubernetes Open Source- Docker & Kubernetes
GCP-Docker & Kubernetes AWS-Docker & Kubernetes

Red Hat Linux 7/8 – SA1 , SA2 and SA3 . Automation with ansible , Devops – Complete Life Cycle , Virtualization – VMWARE , Public Cloud – IaaS AWS | Azure and GCP | Private Cloud – Openstack , Openshift – Docker , Containers and Kubernetes . SAN , NetBackup , VCS , VXVM – High availability Clustering , Shell Scripting , Redhat Virtualization , Open Source- Docker & Kubernetes, AWS-Docker & Kubernetes, Azure-Docker & Kubernetes, GCP-Docker & Kubernetes

linux aws devop
aws datascience oracle

SALARY :- Avg. salary of a System/Cloud/ Devops Engineer   is goes up to 15 Lakhs per annum

 

Overview of Courses covered

 

Red Hat Linux 7/8 – SA1 , SA2 and SA3 . Automation with ansible , , AWS Cloud , Devops – Complete Life Cycle VMware , AZURE , SAN , NetBackup , VCS , VXVM – High availability Clustering , Private Cloud – Openstack, Red hat Virtualization , Networking , OpenShift – Containers , Kubernetes and Docker ,GCP , Shell Scripting , Pythion Scripting  and All Cloud Devops , CKA , CKAD

 

 

Program Highlight

 

Our Highlights

 

  • 18000+ Students Empowered till now

 

  • Online/Classroom/Self-Paced

 

  • 12 months Intensive Training

 

  • Triple Certification – Global Certification + RCITP After 6 months of Successful Completion of Masters + International PG Diploma From UK after 1 Year

 

  • Start Date – Every Month One Batch ( Per Batch 25 Students )

 

  • 400+ Hiring Partners

 

  • Certified from OTHM–UK Recognised by ofqual.gov.uk

 

  • Minimum 5 Interview Call and until you get Job

 

  • What you get After the Training – Gain Knowledge of At least 3+ Year Experienced Professional

 

About the Program

Project Driven industry mentorship in IT IMS , Cloud and Devops

Dedicated career support,

Learn 30 + IMS  tools .

300 core System Admin activities

120 + Cloud activities

complete automation using DevOps Tools .

400 + Assignments

All Cloud Devops – Azure , AWS and GCP

100 hours of Mock interview session

Expertise in Infrastructure Management

Dedicated Trainers with ample of Industry Experience

Project based IT Training and Certification programs .

You Gain Knowledge of 5+ Year Experienced System Administrator

Industry standard  Projects And Assignments with Mentor Support

Lab Access and Practical Guidance

Program Key Highlights

 

Designed for Freshers to Working Professionals

  • 30 + Tools

Learn 30 + IMS  tools .

300 core System Admin activities

120 + Cloud activities

complete automation using DevOps Tools .

  • 400 + Assignments
  • 360 Degree Career Support
  • One-on-One with Industry Mentors
  • Dedicated Student Mentor
  • Job Assistance with Top Firms
  • 0 % EMI – No Cost EMI Option

 

Top Skills You Will Learn

 

 

Redhat Linux , AWS , Devops , VMWARE , AZURE , Openstack , Openshift , GCP, All Cloud Devops

                                                             

Job Opportunities

 

System Administrator , Linux Cloud Engineer , Devops Engineer , Cloud Administrator , Our students placed in various packages in MNC’s Ranging from 5 Lakhs to 25 Lakhs . Experience Level from freshers  to 18+ Year experienced candidates

 

 

Target audience?

 

Engineers, Freshers, Domain Experts, Software & IT Professionals , Those who having career gap .  Not interested in Programming .

  • Engineering/Management Graduate or Post-graduate Fresher Students who want to make their career in IT Infrastructure Management Field . Those who hate programming .
  • Engineers who want to Become System Admin, Technical Architect , System Engineer , Cloud Engineer , Devops Engineer
  • System Admins who are interested in Data Centre Setup and Migration and Troubleshooting
  • Cloud Admins who would like to become Cloud Infra Architect .
  • MBA Graduates or business professionals who are looking to move to a heavily quantitative role.
  • Engineering Graduate/Professionals who want to be in IT Infrastructure Management Administrator field
  • Working Professional or Fresh Graduate who have mostly worked in Operating system , Virtualization , Cloud Technology etc
  • Professionals who’ve worked mostly with Linux , Cloud , Windows , Virtualization , Automation etc

Minimum Eligibility

 

Any Bachelor’s degree. Completed or not completed . No coding experience required . If you have any Educational Gap or any other career gap , you can do this program to boost up your career . The qualifications provided by UK Regulatory board is equal to Level 7 Masters Degree in UK.

 

 

Technology  Covered .

 

( needs to insert the picture as below for all our tools covered )

 

 

Like the above – Redhat Linux , AWS , Azure , Veritas Cluster , Veritas Volume Manager , Microsoft Azure, Openstack , Openshift , Docker , Kubernetes , Devops , Jenkins , Ansible , Chef , Puppet , Nagios , Shell Scripting

 

Note :- Pictures shown above should be replaced with pictures technologies mentioned above

 

 

 

 

 

 

 

 

 

 

 

Banner for this program should contain

 

Placement Guaranteed Master Program – Integrated with International PG program from UK

Minimum 5 interview Calls

Mode Of Training – Online / Classroom

Acquire Knowledge of  4+ year experienced IT Infrastructure System and Cloud Administrator

 

 

 

 

 

 

How You Benefit From This Program

  • Post Graduate Diploma without quitting your job
  • Cutting-edge curiculum designed by industry experts
  • Alumni status from IIIT Bangalore
  • Career transition with 58% average salary hike
Key Benefit From This Program
  • Short Term Job Guaranteed Program
  • Minimum 5 Interview Calls .And Continued until you get the JOB
  • RHCSA , RHCE , AWS Solution Architect , GCP , AZURE , Certification Preparation
  • Industrial Job Oriented Assignments, Industry Scenarios , which make you perfect in Subject
  • Gain Knowledge of 5 + Years in IT Infrastructure System and Cloud Administration
  • Designed for Freshers to Working Professionals
  • 30 +   Tools
  • Learn 30 + IMS tools .
  • 300 core System Admin activities
  • 120 + Cloud activities
  • complete automation using DevOps Tools .
  • 400 + Assignments
  • 360 Degree Career Support
  • One-on-One with Industry Mentors
  • Dedicated Student Mentor
  • Job Assistance with Top Firms
  • 0 % EMI – No Cost EMI Option

 

 

 

 

 

Frequently Asked Questions

  1. Who Should do this course

Audience :- Freshers , Any Graduate , 2 to 4 Years Experienced up skilling enthusiasts . 3rd Year Graduates who are going to attend campus Interviews . These  courses designed in a way to be suitable for all branches of Engineering and all type of graduates – Science and non-science Graduates. Option to customise the subject according to the interest of candidate is also available

  1. How many Interview Calls You will provide

Minimum 5 Interview Calls and Maximum , until you get the JOB

  1. Do I get Refund , if I am not interested to continued

 

Yes . you should inform the Administrator and send email to PG@radicaltechnologies.co.in to         cancel your admission within 7 days of the enrolment . Once we allocate the trainer and further proceedings , we will not be able to refund .

 

  1. How I will get Industry knowledge

 

 

All our programs are developed by Industry person, who is having 10+ years real working knowledge . Under their mentorship , you will be able to gain at least 5+ year experience

 

  1. Is this is 100% Job Guarantee program ? And how is the Salary Structure

 

Yes , it’s a 100% JOB Guaranteed program . Minimum salary Package of 5 Lakhs per annum for the right candidate .

 

 

  1. Is there any limitation on number of Interview calls providing

No , You will get calls until you get placed

  1. How many people got placed as part of this program

We have placement record of over 6000+

 

Full Course Curriculum

 

1 ) Redhat Linux RHEL V8 – SA1 | SA2 | SA3

 

Mode of Training :- Classroom OR Online

 

1.1 Red Hat System Administration I (RH124)

Get started with Red Hat Enterprise Linux

Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.

Access the command line

Log into a Linux system and run simple commands using the shell.

Manage files from the command line

Copy, move, create, delete, and organize files while working from the bash shell.

Get help in Red Hat Enterprise Linux

Resolve problems by using local help systems.

Create, view, and edit text files

Manage text files from command output or in a text editor.

Manage local users and groups

Create, manage, and delete local users and groups, as well as administer local password policies.

Control access to files

Set Linux file system permissions on files and interpret the security effects of different permission settings.

Monitor and manage Linux processes

Evaluate and control processes running on a Red Hat Enterprise Linux system.

Control services and daemons

Control and monitor network services and system daemons using systemd.

Configure and secure SSH

Configure secure command line service on remote systems, using OpenSSH.

Analyze and store logs

Locate and accurately interpret logs of system events for troubleshooting purposes.

Manage networking

Configure network interfaces and settings on Red Hat Enterprise Linux servers.

Archive and transfer files

Archive and copy files from one system to another.

Install and update software

Download, install, update, and manage software packages from Red Hat and yum package repositories.

Access Linux files systems

Access, inspect, and use existing file systems on storage attached to a Linux server.

Analyze servers and get support

Investigate and resolve issues in the web-based management interface, getting support from Red Hat to help solve problems.

Comprehensive review

Review the content covered in this course by completing hands-on exercises.

1.2 Red Hat System Administration II (RH134)

 

Improve command line productivity

Run commands more efficiently by using advanced features of the bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.

Schedule future tasks

Schedule commands to run in the future, either one time or on a repeating schedule.

Tune system performance

Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.

Control access to files with ACLs

Interpret and set access control lists (ACLs) on files to handle situations requiring complex user and group access permissions.

Manage SELinux security

Protect and manage the security of a server by using SELinux.

Maintain basic storage

Create and manage storage devices, partitions, file systems, and swap spaces from the command line.

Manage logical volumes

Create and manage logical volumes containing file systems and swap spaces from the command line.

Implement advanced storage features

Manage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.

Access network-attached storage

Use the NFS protocol to administer network-attached storage.

Control the boot process

Manage the boot process to control services offered and to troubleshoot and repair problems.

Manage network security

Control network connections to services using the system firewall and SELinux rules.

Install Red Hat Enterprise Linux

Install Red Hat Enterprise Linux on servers and virtual machines

1.3 Red Hat System Administration III: Linux Automation with Ansible (RH294)

Introduce Ansible

Describe Ansible concepts and install Red Hat Ansible Engine.

Deploy Ansible

Configure Ansible to manage hosts and run ad hoc Ansible commands.

Implement playbooks

Write a simple Ansible Playbook and run it to automate tasks on multiple managed hosts.

Manage variables and facts

Write playbooks that use variables to simplify management of the playbook and facts to reference information about managed hosts.

Implement task control

Manage task control, handlers, and task errors in Ansible Playbooks.

 

Deploy files to managed hosts

Deploy, manage, and adjust files on hosts managed by Ansible.

 

Manage large projects

Write playbooks that are optimized for larger, more complex projects.

 

Simplify playbooks with roles

Use Ansible roles to develop playbooks more quickly and to reuse Ansible code.

 

Troubleshoot Ansible

Troubleshoot playbooks and managed hosts.

Automate Linux administration tasks

Automate common Linux system administration tasks with Ansible.

 

 

2  AWS Certified Solutions Architect – Associate

 

2.1 Getting Started

Course Introduction
About the Training Architect
Working as a Solutions Architect
Creating an AWS Account, AWS Free Tier, Usage Tracking, and Billing Widget
 

2.2 Architecture 

Access Management
Shared Responsibility/Security Model
Service Models
High Availability vs. Fault Tolerance
RPO vs. RTO
Scaling
Tiered Application Design
Encryption
Architecture Odds and Ends
Architecture 101
 

2.3 AWS Architecture 

AWS Accounts
AWS Physical and Networking Layer
Well-Architected Framework
Elasticity
AWS Architecture 101
 

2.4 AWS Product Fundamentals

Console Tour and Navigation
Introduction to S3
Introduction to CloudFormation
Hands-on Labs
Getting Started with CloudFormation
AWS Product Fundamentals
 

2.5 IAM (Identity and Access Management)

IAM Essentials
IAM Policies
IAM Users
IAM Groups
IAM Access Keys
Securing Your Account — Creating an IAM User and Setting Up the CLI
IAM Roles
IAM Essentials
 

2.6 Multi-Account Management and Organizations

AWS Organizations
Role Switching Between Accounts
Multi-Account Management and Organizations
 

2.7 Server-Based Compute (EC2) Fundamentals

EC2 Architecture: Part 1
EC2 Architecture: Part 2
Instance Types and Sizes
EC2 Storage Architecture: Part 1
EC2 Storage Architecture: Part 2
EBS Snapshots
Security Groups
Instance Metadata
Hands-on Labs
Creating and Working with an EC2 Instance
Server-Based Compute (EC2) Fundamentals
 

2.8 Server-Based Compute (EC2) Intermediate

AMI
Bootstrap
Instance ENI, IP, and DNS: Part 1
Instance ENI, IP, and DNS: Part 2
Instance Roles
Server-Based Compute (EC2) Intermediate
Using EC2 Roles and Instance Profiles
Using AWS Tags and Resource Groups
 

2.9 Server-Based Compute (EC2) Advanced

EBS Volume and Snapshot Encryption
EBS Optimization, Enhanced Networking, and Placement Groups
EC2 Billing Models: Part 1 – Spot and Spot Fleet
EC2 Billing Models: Part 2 – Reserved Instances
Dedicated Hosts
Server-Based Compute (EC2) Advanced
 

2.10 Serverless Compute (Lambda)

What Are APIs and Microservices?
Serverless and Event-Driven Architectures
Lambda Essentials: Part 1
Lambda Essentials: Part 2
API Gateway Essentials: Part 1
API Gateway Essentials: Part 2
Step Functions
Serverless Compute (Lambda)
 

2.11 Container-Based Compute and Microservices

Docker Essentials
ECS
Container-Based Compute and Microservices
 

2.12 Networking Fundamentals

Introduction
Seven-Layer OSI Model: Part 1
Seven-Layer OSI Model: Part 2
IP Addressing Basics
Subnetting
IP Routing
Firewalls
Proxy Servers
Networking Fundamentals
 

2.13 Virtual Private Cloud (VPC)

Virtual Private Cloud (VPC) and Subnets: Part 1
Virtual Private Cloud (VPC) and Subnets: Part 2
Routing and Internet Gateway
Bastion Host/JumpBox
NAT, NAT Instance, and NAT Gateway: Part 1
NAT, NAT Instance, and NAT Gateway: Part 2
Network ACLs
Hands-on Labs
Designing and Building a Custom VPC from Scratch
Virtual Private Cloud (VPC)
 

2.14 Advanced VPC

VPC Peering: Part 1
VPC Peering: Part 2
VPC Endpoints: Part 1
VPC Endpoints: Part 2
IPv6 within AWS
Egress-Only Gateway
Hands-on Labs
Implementing VPC Peering on AWS
Advanced VPC
 

2.15 Global DNS (Route 53) Fundamentals

DNS 101
Domain Registration
Private vs. Public Hosted Zones
Record Set Types
Health Checks
Global DNS (Route 53) Fundamentals
 

2.16 Global DNS (Route 53) Advanced

Routing Policy: Simple
Routing Policy: Failover
Routing Policy: Weighted
Routing Policy: Latency
Routing Policy: Geolocation
Global DNS (Route 53) Advanced
 

2.17 S3 Architecture and Features

Permissions
Transferring Data to S3
Encryption
Static Websites and CORS
Object Versioning
Presigned URLs
Hands-on Labs
Creating a Static Website Using Amazon S3
 

2.18 S3 Performance and Resilience

Storage Tiers/Classes
Lifecycle Policies and Intelligent-Tiering
Cross-Region Replication (CRR)
 

2.19 CloudFront

CloudFront Architecture: Part 1
CloudFront Architecture: Part 2
OAI
 

2.20 Network File Systems

EFS Fundamentals: Part 1
EFS Fundamentals: Part 2
Storage and Content Delivery
 

2.21 Database Fundamentals

Database Models
 

2.22 SQL — RDS

RDS Essentials: Part 1
RDS Essentials: Part 2
RDS Backups and Restore
RDS Resiliency: Multi-AZ
RDS Read Replicas
Database Fundamentals and SQL — RDS
 

2.22 SQL — Aurora

Aurora Essentials: Part 1
Aurora Essentials: Part 2
Parallel Queries and Aurora Global
Aurora Serverless Essentials: Part 1
Aurora Serverless Essentials: Part 2
SQL — Aurora
 

2.23 NoSQL

DynamoDB Essentials: Part 1 — Tables and Items
DynamoDB Essentials: Part 2 — Query and Scan
DynamoDB Essentials: Part 3
DynamoDB Performance and Billing
DynamoDB Streams and Triggers
DynamoDB Indexes: Part 1 — LSI
DynamoDB Indexes: Part 2 — GSI
NoSQL
 

2.24 In-Memory Caching

DAX
ElastiCache
In-Memory Caching
 

2.25 Load Balancing and Auto Scaling

Load Balancing Fundamentals
Classic Load Balancers and Health Checks: Part 1
Classic Load Balancers and Health Checks: Part 2
Classic Load Balancers and Health Checks: Part 3
Application Load Balancers: Part 1
Application Load Balancers: Part 2
Network Load Balancers
Launch Templates and Configurations
Auto Scaling Groups: Part 1
Auto Scaling Groups: Part 2
Hands-on Labs
Implementing an Auto Scaling Group and Application Load Balancer in AWS
 

2.26 VPN and Direct Connect

VPC VPN (IPsec)
Direct Connect Architecture
When to Pick Direct Connect vs. VPN
 

2.27 Snow

Snowball, Snowball Edge, and Snowmobile
 

2.28 Data and DB Migration

Storage Gateway 101
Database Migration Service 101
 

2.29 Identity Federation and SSO

What Is Identity Federation?
When to Use Identity Federation
Hybrid and Scaling
 

2.30 Application Integration

Simple Notification Service (SNS)
Simple Queue Service (SQS): Part 1
Simple Queue Service (SQS): Part 2
Elastic Transcoder
Application Integration
 

2.31 Analytics

Athena
Elastic MapReduce (EMR)
Kinesis and Firehose
Redshift
Analytics
 

2.32 Logging and Monitoring

CloudWatch
CloudWatch Logs
CloudTrail
VPC Flow Logs
Hands-on Labs
Custom Logging Using CloudWatch and CloudWatch Logs
Hands-on Labs
Working with AWS VPC Flow Logs for Network Monitoring
Logging and Monitoring
 

2.33 Operations

CloudWatch Events
KMS Essentials: Part 1
KMS Essentials: Part 2
 

2.34 Deployment

Elastic Beanstalk
OpsWorks
Operations and Deployment
 

2.35 The Exam

How to Prepare for the Real Exam
AWS Solutions Architect Associate (SAAC01) – Final Practice Exam
 
2.36 Course Features
This course can help prepare you for a certification exam.
Earn a Certificate of Completion
When you complete this course, you’ll receive a certificate of completion as proof

 

 

 

 

 

3 DEVOPS

 

 

 

 

3.1 Introduction to Devops

 

This module gives an introduction to DevOps principles and objectives. You will gain complete knowledge on how to use DevOps frameworks and implement DevOps on the cloud.

 

  • What is DevOps.
  • Basics of DevOps
  • DevOps Principles
  • Benefits of DevOps
  • DevOps SDLC
  • DevOps objectives
  • DevOps on Cloud
  • Devops Frameworks

 

3.2 Introduction to Linux

 

In this section, you’ll master the fundamentals of the Linux Operating system and system administration.

  • Basics of linux operating system
  • Introduction linux system administration

 

3.3 Continuous Integration Tools

 

Continuous integration/Continuous deployment is the backbone bone of successful DevOps practice. This section will walk you through the fundamentals of CI/CD and develops skills to work with DevOps tools through hands-on exercises.

Tools:

  • Jenkins
  • Chef
  • Docker
  • Vagrant
  • Nagios

CI/CD :

  • Continuous Testing and Integration
  • Continuous Release and Deployment
  • Continuous Application Monitoring

 

3.4 Cloud Computing and Virtualization

 

The cloud computing module of DevOps provides comprehensive knowledge of cloud service models and cloud deployment models. Also, you will be taught how to launch a virtual machine with AWS.

Cloud Computing Concepts:

  • Evolution of cloud
  • Grid Computing vs. Cloud Computing
  • Characteristics and Benefits of Cloud
  • Cloud service models (NIST)
  • IaaS, PaaS, and SaaS
  • Cloud service model implementations
  • Cloud Deployment Models (NIST)

Virtualization Concepts:

  • Virtual Machines
  • Virtual bootable OS Images
  • Cloud Storage
  • SOA and Cloud
  • Virtual Private Cloud (VPC)
  • Risk in Cloud and DevOps security concerns
  • Introduction to AWS and AZURE

3.5 Devops adoption

CRITERIA

  • Things to Look For and Avoid
  • IT Assets Ownership
  • Viewing Applications As Products, not Projects
  • DevOps in the Enterprise
  • IT Governance
  • Governance and Risk Mitigation
  • DevOps Adoption Steps
  • Select DevOps Techniques and Practices
  • Service Quality Metrics

 

TOOLS

  • The Choice of Cloud Platform
  • DevOps IaaS and PaaS
  • Containerization Tools
  • System Configuration Automation and Management
  • Continuous Integration (CI) Systems
  • Build and Dependency Management Systems
  • Select DevOps Tools
  • Collaborative Lifecycle Management Solutions from IBM
  • Rational Team Concert (RTC)
  • Rational Quality Manager (RQM)
  • Rational DOORS Next Generation (DNG)

3.6 Chef

In this section, you’ll gain a detailed overview of chef terminology, configuration, workstation setup, organization setup, how to create data bags, create and add roles to the organization. Advanced chef concepts like Foodcritic, Test Kitchen Chef, etc., are also covered in this section.

Overview of Chef

  • Common Chef Terminology (Server, Workstation, Client, Repository, etc.)
  • Servers and Nodes
  • Chef Configuration Concepts

Workstation Setup

  • How to configure knife
  • Execute some commands to test the connection between knife and workstation

Organization Setup

  • Create an organization
  • Add yourself and node to organization

Test Node Setup

  • Create a server and add to the organization
  • Check node details using a knife

Databags

  • How to create Databags
  • Add Databags to organization
  • Node Objects and Search
  • How to Add Run list to Node
  • Check node Details

Environments

  • How to create Environments
  • Add servers to environments

Roles

  • Create roles
  • Add Roles to organization

Advanced Chef

  • Foodcritic
  • Test Kitchen Chef
  • Improve and expand on the existing recipes
  • One-click system launching

3.7 PUPPET

In this module, you’ll learn how to deploy the Puppet configuration management tool through hands-on exercises. By the end of this module, you’ll become proficient at automating the entire workflow using Puppet.

Introduction to Puppet

  • Installation and Configuration of Master server and agents
  • Managing Manifests

Creating and Managing modules

Version control with Puppet

3.8 VAGRANT

In this module, you will learn to install and configure Vagrant. Additionally, understand how to create a small VirtualBox using Vagrant and add images.

Introduction

  • What is Vagrant
  • Working with Vagrant environment

Installation and Configuration

  • How to install Vagrant in Windows and Linux
  • Configure Vagrant

Provisioning with Vagrant

  • How to use Vagrant to create a small Virtualbox.
  • Add required Images to Vagrant

Using Vagrant

  • Using Vagrant in Chef for Testing
    • Source Code Management – GIT & Nexus

This section provides detailed knowledge about the source code management using Git and Nexus. You’ll master the core concepts and various operations performed on it through real-time examples.

GIT REPOSITORY

  • What is a version control system?
  • What is a distributed version control system?
  • Installation
  • Different levels of Git configuration
  • The process of staging and committing
  • The details of the commit objects

NEXUS

  • Nexus prerequisites
  • Installing and Running Nexus
  • Using the Nexus User Interface

3.10 JENKINS

This module introduces Jenkins, the core concepts and technology behind Jenkins. You’ll learn how to build and automate test cases using Maven, install Jenkins plugins, and distributed builds with Jenkins.

INTRODUCTION TO JENKINS-CI

  • Continuous Integration with Jenkins Overview
  • Installation
  • Configure Jenkins as a stand-alone application
  • Configure Jenkins on an Application Server
  • Jenkins management
  • Support for the Git version control systems
  • Different types of Jenkins Jobs
  • Setting up a Jenkins job
  • Scheduling build Jobs
  • Maven Build Scripts

 

Securing Jenkins

  • Authentication
  • Authorization
  • Confidentiality
  • Creating users

Jenkins Plugin

  • Installing Jenkins Plugins
  • SCM plugin
  • Build and test
  • Analyzers

Distributed builds with Jenkins

Best Practices for Jenkins

3.11 Monitoring tools – Nagois & Zenoss

In this section, you’ll learn how to monitor the servers, trigger alerts, how to apply and remove blackouts using both Nagios and Zenoss through hands-on practice.

NAGIOS

  • How to monitor the Servers in Nagios
  • Trigger Alerts in Nagios
  • How to apply blackouts and remove blackouts

ZENOSS

  • How to monitor the Servers in Zenoss
  • Trigger Alerts in Zenoss
  • How to apply blackouts and remove blackouts
  • How to check events; CPU, Memory and RAM Graphs for servers

3.12 Devops: Application Architecture

In this section, you’ll explore what DevOps architecture is and how it benefits your organization.

  • Web Forms
  • User Controls
  • Shared UI Code
  • Business Logic

3.13 Configuration Management

Configuration management plays a major role in DevOps in automating tedious tasks. This section highlights configuration management processes, incident management, problem management, and change management.

  • Configuration Management Activity
  • Configuration Control
  • Incident Management
  • Change Management
  • Problem Management

3.14 General environment setup steps in AWS & NTTA

This section deals with cloud services. You’ll learn how to create servers and networks in the cloud, set up rules, and more through best practices.

  • Creating Servers and Networks in Cloud
  • Setting up rules and Application
  • Difficult Scenarios in environments.
  • Scaling
  • Environment testing

 

4 VMWARE

 

4.1 Course Introduction

  • Basic Concepts of virtualization to complete the VMware course.

4.2 Introduction to vSphere and the Software Defined Data Center

  • Describe how vSphere fits into the software defined data center and the cloud infrastructure
  • Explain how vSphere interacts with CPUs, memory, networks, and storage
  • Use vSphere Client to access and manage your vCenter Server system and ESXi host
  • Compare virtual machine hardware version 14 to other versions
  • Identify the virtual network adapters, and describe the enhanced VMXNET3
  • Compare the types of virtual disk provisioning
  • Install and configure ESXi host settings
  • Identify the advantages of ESXi Quick Boot

4.3 vCenter Server with Windows 2012 R2

  • Describe the vCenter Server architecture
  • Discuss how ESXi hosts communicate with vCenter Server
  • Use vSphere Client to manage the vCenter Server inventory
  • Add data center, organizational objects, and hosts to vCenter Server
  • Create custom inventory tags
  • Describe the rules for applying permissions
  • Create a custom role in vCenter Server

4.4 Configuring and Managing Virtual Storage

  • Identify storage protocols and storage device types
  • Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage
  • Create and manage VMware vSphere® VMFS and NFS data stores
  • Explain how multi pathing works with iSCSI, NFS, and Fibre Channel storage
  • Identify the advantages of VMware vSAN™

4.5 Creating Virtual Machines

  • Create, provision, and remove a virtual machine
  • Explain the importance of VMware Tools™
  • Describe how to import a virtual appliance OVF template

4.6 Virtual Machine Management

  • Use templates and cloning to deploy new virtual machines
  • Modify and manage virtual machines
  • Create an instant clone of a virtual machine
  • Identify the types of content libraries and how to deploy and use them
  • Add a hot-pluggable device
  • Dynamically increase the size of a virtual disk
  • Use customization specification files to customize a new virtual machine
  • Perform vSphere vMotion and vSphere Storage vMotion migrations
  • Create and manage virtual machine snapshots

4.7 vSphere Update Manager

  • Describe the architecture, components, and capabilities of vSphere Update Manager
  • Use vSphere Update Manager to manage the patching of ESXi, virtual machines, and vApps
  • Examine the features and functions of vSphere Update Manager EAM integration
  • Integrate vSphere Update Manager with vSphere DRS

4.8 vSphere HA, vSphere Fault Tolerance, and Protecting Data

  • Explain the vSphere HA architecture
  • Configure and manage a vSphere HA cluster
  • Use vSphere HA advanced parameters
  • Enforce infrastructural or intra-app dependencies during failover
  • Describe vSphere HA heartbeat networks and datastore heartbeats
  • Examine the features and functions of vSphere Fault Tolerance
  • Enable vSphere Fault Tolerance on virtual machines

4.9 vSphere DRS

  • Describe the functions of a vSphere DRS cluster
  • Create a vSphere DRS cluster
  • View information about a vSphere DRS cluster
  • Configure virtual machine affinity, DRS groups, and VM-host affinity rules
  • Remove a host from a vSphere DRS cluster

4.10 vSphere Troubleshooting

  • Review troubleshooting tools
  • Find important log files
  • Use vSphere Syslog Collector
  • ESXi core dump collector
  • Create and use alarms to report certain conditions or events
  • ESXi command line
  • ESXi / VM performance monitoring
  • Virtual Center server advance options
  • RV Tool deployment
  • ESXi and VC license management

4.11 Resource Management and Monitoring

  • Discuss CPU and memory concepts in a virtualized environment
  • Describe what over commitment of a resource means
  • Configure and manage resource pools

4.12 Virtual Center Server Appliance

  • Configure and Access vCenter Server Appliance with multiple Deployment Scenarios.
  • Virtual Center Server link Mode
  • Create a vCenter Server Appliance backup schedule
  • Restore vCenter Server Appliance from a backup
  • Monitor vCenter Server Appliance

4.13 VMware VSphere Migration 6.0 to 6.5 / 6.7

4.14 Difference between 6.0 / 6.5 / 6.7

4.15 Discussion on CV and Interview Preparation  

4.16 Physical Hardware demonstration

  • CISCO UCS hardware demonstration.
  • How to work with physical hardware with management console.

 

  1. AZURE

 

5.1 Implement and Monitor an Azure Infrastructure (50-55%)

Implement cloud infrastructure monitoring

  • monitor security
  • monitor performance
    • configure diagnostic settings on resources
    • create a performance baseline for resources
    • monitor for unused resources
    • monitor performance capacity
    • visualize diagnostics data using Azure Monitor
  • monitor health and availability o monitor networking
    • monitor service health
  • monitor cost
    • monitor spend
    • report on spend
  • configure advanced logging
    • implement and configure Azure Monitor insights, including App Insights, Networks, Containers
    • configure a Log Analytics workspace
  • configure logging for workloads
  • initiate automated responses by using Action Groups
  • configure and manage advanced alerts
    • collect alerts and metrics across multiple subscriptions
    • view Alerts in Azure Monitor logs
    • NOT: create Log Analytics query

5.2 Implement storage accounts

  • select storage account options based on a use case
  • configure Azure Files and blob storage
  • configure network access to the storage account
  • implement Shared Access Signatures and access policies
  • implement Azure AD authentication for storage
  • manage access keys
  • implement Azure storage replication
  • implement Azure storage account failover

5.3 Implement VMs for Windows and Linux

  • configure High Availability
  • configure storage for VMs
  • select virtual machine size
  • implement Azure Dedicated Hosts
  • deploy and configure scale sets
  • configure Azure Disk Encryption

5.4 Automate deployment and configuration of resources

  • save a deployment as an Azure Resource Manager template
  • modify Azure Resource Manager template
  • evaluate location of new resources
  • configure a virtual disk template
  • deploy from a template
  • manage a template library
  • create and execute an automation runbook

5.5 Implement virtual networking

  • implement VNet to VNet connections
  • implement VNet peering

5.6 Implement Azure Active Directory

  • add custom domains
  • configure Azure AD Identity Protection
  • implement self-service password reset
  • implement Conditional Access including MFA
  • configure user accounts for MFA
  • configure fraud alerts
  • configure bypass options
  • configure Trusted IPs
  • configure verification methods
  • implement and manage guest accounts
  • manage multiple directories

5.7 Implement and manage hybrid identities

  • install and configure Azure AD Connect
  • identity synchronization options
  • configure and manage password sync and password writeback
  • configure single sign-on
  • use Azure AD Connect Health

5.8 Implement Management and Security Solutions (25-30%)

Manage workloads in Azure

  • migrate workloads using Azure Migrate
    • assess infrastructure
    • select a migration method
    • prepare the on-premises for migration
    • recommend target infrastructure
  • implement Azure Backup for VMs
  • implement disaster recovery
  • implement Azure Update Management

5.9 Implement load balancing and network security

  • implement Azure Load Balancer
  • implement an application gateway
  • implement a Web Application Firewall
  • implement Azure Firewall
  • implement the Azure Front Door Service
  • implement Azure Traffic Manager
  • implement Network Security Groups and Application Security Groups
  • implement Bastion

5.10 Implement and manage Azure governance solutions

  • create and manage hierarchical structure that contains management groups, subscriptions and resource groups
  • assign RBAC roles
  • create a custom RBAC role
  • configure access to Azure resources by assigning roles
  • configure management access to Azure
  • interpret effective permissions
  • set up and perform an access review
  • implement and configure an Azure Policy
  • implement and configure an Azure Blueprint

5.11 Manage security for applications

  • implement and configure KeyVault
  • implement and configure Azure AD Managed Identities
  • register and manage applications in Azure AD

5.12 Implement Solutions for Apps (10-15%)

Implement an application infrastructure

  • create and configure Azure App Service
  • create an App Service Web App for Containers
  • create and configure an App Service plan
  • configure an App Service
  • configure networking for an App Service
  • create and manage deployment slots
  • implement Logic Apps
  • implement Azure Functions

5.13 Implement container-based applications

  • create a container image
  • configure Azure Kubernetes Service
  • publish and automate image deployment to the Azure Container Registry
  • publish a solution on an Azure Container Instance
    • NOT: Service Fabric

5.14 Implement and Manage Data Platforms (10-15%)

Implement NoSQL databases

  • configure storage account tables
  • select appropriate CosmosDB APIs
  • set up replicas in CosmosDB

5.15 Implement Azure SQL databases

  • configure Azure SQL database settings
  • implement Azure SQL Database managed instances
  • configure HA for an Azure SQL database
  • publish an Azure SQL database

 

5.16 Deploy and Configure Infrastructure

5.18Analyze resource utilization and consumption

• configure diagnostic settings on resources

• create baseline for resources

• create and test alerts

• analyze alerts across subscription

• analyze metrics across subscription

• create action groups

• monitor for unused resources

• monitor spend

• report on spend

• utilize Log Search query functions

• view Alerts in Azure Monitor logs

• visualize diagnostics data using Azure Monitor Workbooks

5.20 Create and configure storage accounts

• configure network access to the storage account

• create and configure storage account

• generate Shared access signature

• implement Azure AD authentication for storage

• install and use Azure Storage Explorer

• manage access keys

• monitor Activity log by using Azure Monitor logs • implement Azure storage replication

• implement Azure storage account failover

5.22 Create and configure a VM for Windows and Linux

• configure High Availability

• configure Monitoring

• configure Networking

• configure Storage

• configure Virtual Machine Size

• implement dedicated hosts

• deploy and configure scale sets

5.23 Automate deployment of VMs

• modify Azure Resource Manager template

• configure Location of new VMs

• configure VHD template

• deploy from template

• save a deployment as an Azure Resource Manager template

• deploy Windows and Linux VMs

5.25 Create connectivity between virtual networks

• create and configure Vnet peering

• create and configure Vnet to Vnet connections

• verify virtual network connectivity

• create virtual network gateway

5.26 Implement and manage virtual networking

• configure private IP addressing

• configure public IP addresses

• create and configure network routes

• create and configure network interface

• create and configure subnets

• create and configure virtual network

• create and configure Network Security Groups and Application Security Groups

5.28Manage Azure Active Directory

• add custom domains

• configure Azure AD Identity Protection

• configure Azure AD Join

• configure self-service password reset

• implement conditional access policies

• manage multiple directories

• perform an access review

5.31 Implement and manage hybrid identities

• install and configure Azure AD Connect

• configure federation

• configure single sign-on

• manage and troubleshoot Azure AD Connect

• troubleshoot password sync and writeback

5.33 Implement solutions that use virtual machines (VM)

• provision VMs

• create Azure Resource Manager templates

• configure Azure Disk Encryption for VMs

• implement Azure Backup for VMs

5.17 . Implement and Monitor an Azure Infrastructure (50-55%)
5.19. Implement cloud infrastructure monitoring• monitor security (Note: Log Analytics, Azure Security Center, Azure Sentinel)• monitor performance• configure diagnostic settings on resources

• create a performance baseline for resources

• monitor for unused resources

• monitor performance capacity

• visualize diagnostics data using Azure Monitor

• monitor health and availability

• monitor networking

• monitor service health

• monitor cost

• monitor spend

• report on spend

• configure advanced logging

• implement and configure Azure Monitor insights, including App Insights, Networks, Containers

• configure a Log Analytics workspace

• configure logging for workloads

• initiate automated responses by using Action Groups

• configure and manage advanced alerts

• collect alerts and metrics across multiple subscriptions

• view Alerts in Azure Monitor logs
• NOT: create Log Analytics query

5.21. Implement storage accounts

• select storage account options based on a use case

• configure Azure Files and blob storage

• configure network access to the storage account

• implement Shared Access Signatures and access policies

• implement Azure AD authentication for storage

• manage access keys

• implement Azure storage replication

• implement Azure storage account failover

5.24 Implement VMs for Windows and Linux

• configure High Availability

• configure storage for VMs

• select virtual machine size

• implement Azure Dedicated Hosts

• deploy and configure scale sets

• configure Azure Disk Encryption

5.27 Automate deployment and configuration of resources

• save a deployment as an Azure Resource Manager template • modify Azure Resource Manager template

• evaluate location of new resources

• configure a virtual disk template

• deploy from a template

• manage a template library

• create and execute an automation runbook

5.29 Implement virtual networking

• implement VNet to VNet connections

• implement VNet peering

5.30 Implement Azure Active Directory

• add custom domains

• configure Azure AD Identity Protection

• implement self-service password reset

• implement Conditional Access including MFA

• configure user accounts for MFA

• configure fraud alerts

• configure bypass options

• configure Trusted IPs

• configure verification methods

• implement and manage guest accounts

• manage multiple directories

5.32 Implement and manage hybrid identities • •

·         install and configure Azure AD Connect

• identity synchronization options

• configure and manage password sync and password writeback

• configure single sign-on

• use Azure AD Connect Health

5.34 Implement Workloads and Security (25-30%)

Migrate servers to Azure

• migrate servers using Azure Migrate

• backup and restore data
5.36 Configure serverless computing

• create and manage objects

• manage a Logic App Resource

• manage Azure Function app settings

• manage Event Grid

• manage Service Bus

5.37 Implement application load balancing

• configure application gateway

• configure Azure Front Door service

• configure Azure Traffic Manager

5.38 Integrate on premises network with Azure virtual network

• create and configure Azure VPN Gateway

• create and configure site to site VPN

• configure ExpressRoute

• configure Virtual WAN

• verify on premises connectivity

• troubleshoot on premises connectivity with Azure

5.39 Implement multi factor authentication (MFA)

• configure user accounts for MFA

• configure fraud alerts • configure bypass options

• configure Trusted IPs • configure verification methods

5.42 Manage role based access control (RBAC)

• create a custom role

• configure access to Azure resources by assigning roles

• configure management access to Azure

• troubleshoot RBAC

• implement RBAC Azure Policies

• assign RBAC Roles

5.35 Implement Management and Security Solutions (25-30%)

Manage workloads in Azure

• migrate workloads using Azure Migrate

• assess infrastructure

• select a migration method

• prepare the on-premises for migration

• recommend target infrastructure

• implement Azure Backup for VMs

• implement disaster recovery

• implement Azure Update Management

5.40. Implement load balancing and network security

• implement Azure Load Balancer

• implement an application gateway

• implement a Web Application Firewall

• implement Azure Firewall

• implement the Azure Front Door Service

• implement Azure Traffic Manager

• implement Network Security Groups and Application Security Groups

• implement Bastion

5.41. Implement and manage Azuregovernance solutions

• create and manage hierarchical structure that contains management groups, subscriptions and resource groups

• assign RBAC roles

• create a custom RBAC role

• configure access to Azure resources by assigning roles

• configure management access to Azure

• interpret effective permissions

• set up and perform an access review

• implement and configure an Azure Policy

• implement and configure an Azure Blueprint

5.43 Manage security for applications

• implement and configure KeyVault

• implement and configure Azure AD Managed Identities

• register and manage applications in Azure AD

5.43 Create and Deploy Apps
Create web apps by using PaaS • create an Azure app service Web App• create documentation for the API• create an App Service Web App for Containers • create an App Service background task by using WebJobs• enable diagnostics loggingDesign and develop apps that run in containers • configure diagnostic settings on resources• create a container image by using a Dockerfile

• create an Azure Kubernetes Service

• publish an image to the Azure Container Registry

• implement an application that runs on an Azure Container Instance

• manage container settings by using code

5.44 Implement Solutions for Apps

5.45 Implement an application infrastructure• create and configure Azure App Service• create an App Service Web App for Containers• create and configure an App Service plan• configure an App Service• configure networking for an App Service• create and manage deployment slots

• implement Logic Apps

• implement Azure Functions

5.46 Implement container-based applications

• create a container image

• configure Azure Kubernetes Service

• publish and automate image deployment to the Azure Container Registry

• publish a solution on an Azure Container Instance

• NOT: Service Fabric

5.47 Implement Authentication and Secure Data

Implement authentication

• implement authentication by using certificates, forms-based authentication, tokens, or Windows-integrated authentication

• implement multi-factor authentication by using Azure AD

• implement OAuth2 authentication
• implement Managed Identities for Azure resources Service Principal authentication

5.48 Implement secure data solutions

• encrypt and decrypt data at rest and in transit

• encrypt data with Always Encrypted

• implement Azure Confidential Compute

• implement SSL/TLS communications
• create, read, update, and delete keys, secrets, and certificates by using the KeyVault API

[no mapping]
5.49 Develop for the Cloud and for Azure Storage

5.50 Configure a message-based integration architecture

• configure an app or service to send emails

• configure Event Grid

• configure the Azure Relay service

• create and configure a Notification Hub

• create and configure an Event Hub

• create and configure a Service Bus
• configure queries across multiple products

5.53 Develop for autoscaling

• implement autoscaling rules and patterns (schedule, operational/system metrics

• implement code that addresses singleton application instances
• implement code that addresses transient state

5.54 Develop solutions that use Cosmos DB storage

• create, read, update, and delete data by using appropriate APIs

• implement partitioning schemes
• set the appropriate consistency level for operations

5.55 Develop solutions that use a relational database

• provision and configure relational databases

• configure elastic pools for Azure SQL Database • implement Azure SQL Database managed instances

• create, read, update, and delete data tables by using code

5.51 Implement and Manage Data Platforms

5.52. Implement NoSQL databases

• configure storage account tables

• select appropriate CosmosDB APIs

• set up replicas in CosmosDB

5.52 Implement Azure SQL databases

• configure Azure SQL database settings

• implement Azure SQL Database managed instances

• configure HA for an Azure SQL database

• publish an Azure SQL database

 

 

 

  1. NETBACKUP

 

 

 

About NetBackup

How a NetBackup system works

How to make a NetBackup system work for you

About NetBackup software availability

About the NetBackup media kit

About the NetBackup Electronic Software Distribution (ESD)

images

About the NetBackup documentation

About NetBackup license requirements

About Veritas Services and Operations Readiness Tools

Recommended SORT procedures for new installations

Recommended SORT procedures for upgrades

Installation and upgrade requirements for UNIX and Linux

Clusters

NetBackup 8.1 binary size requirements

How to prepare for NetBackup installation

About NetBackup configuration

NetBackup master server web server user and group creation

 

  1. SAN

Introduction

Fibre Channel Switches and Fabrics

SAN Access Control

Extending SANs with Inter-Switch Links

Flow Control and Buffer Credits

Joining SANs with Fibre Channel Routers

Server Operating Systems and SANs

Multipathing

Booting Servers Off SAN Attached Storage

SANs and Tape

Tape Library Sharing

Managing SANs

 

 

  1. VCS & VXVM

 

Install and configure Veritas InfoScale Enterprise.
Configure and manage disks, disk groups, and volumes.
Administer file systems.
Create a cluster.
Configure service groups and resources.
Implement and verify failover and failback capability for application, storage, and network services.

 

  1. Opnesatck

 

Why OpenStack?

Public Cloud Architecture

Getting started with OpenStack

OpenStack Architecture

Logical Architecture

Who is OpenStack for?

Installation

How does OpenStack work?

OpenStack vs. AWS

Future Scope

 

Components of Openstack

 

Horizon

Nova Compute

Cynder

Glance

Swift

Keystone

 

 

 

 

  1. OPENSHIFT

 

Introduction

Red Hat OpenShift Fundamentals: Introduction

 

Understanding OpenShift

 

 

Understanding Containers and OpenShift

 

Understanding the Red Hat Container Management Solutions

 

Understanding OpenShift in a Container Environment

 

Understanding OpenShift in a DevOps Environment

Understanding OpenShift Architecture

OpenShift versus Kubernetes

Understanding the Role of OpenShift in a Hybrid Cloud Environment

Installing OpenShift

Understanding OpenShift Versions

Installing Minishift

Using oc cluster up

Planning for an OpenShift Cluster

Installing an OpenShift Cluster: Host Prep

Installing an OpenShift Cluster: Installation

Getting Started with OpenShift

Getting Started with the Web Console

Understanding Resource Types: Pods and Namespaces

Understanding Resource Types: Deployment Configs and Networking

Managing Resources from the Command Line

Using Source-to-Image to Create Applications

Basic OpenShift Troubleshooting

Managing and Deploying OpenShift

Module introduction

Managing OpenShift Networking

Understanding Software Defined Networking

Understanding OpenShift SDN

Understanding Services

Understanding Routes

Creating Routes

Deploying Applications

Scaling Applications

Scheduling Pods

Managing Images and Image Streams

Managing Templates

Managing OpenShift Storage

Understanding OpenShift Storage

Configuring OpenShift Storage Access

Setting up NFS Persistent Storage Part 1

Setting up NFS Persistent Storage Part 2

Working with ConfigMaps

 

 

  1. REDHAT Virtualization

 

Introduction to Virtualization and Infrastructure Migration

 

Introduction to Virtualization

 

Essentials of Infrastructure Migration

 

The Role of Cloud Management Platform in Infrastructure Migration (Demonstration)

 

Red Hat Virtualization and vSphere (Demonstration)

 

Cloud Management Platform Setup with CloudForms (Demonstration)

 

Open Virtualization with Red Hat Virtualization (Demonstration)

 

Infrastructure Migration Architecture and Usage

 

Infrastructure Migration (Demonstration)

 

IT Optimization Recap and Beyond

 

 

  1. Networking

 

  1. INTRODUCTION TO NETWORKING.
  2. Computing Basics.

PC Components. PC Versus Laptop. Bit, Bytes, and Measurement Terms. Decimal-to-Binary Conversion. Binary-to-Decimal Conversion. Binary-to-Hex Conversion. Hex-to-Binary Conversion.

  1. Networking Fundamentals.

Basic Networking Terminology. Network Applications. Understanding Network Computers. The Open System Interconnection (OSI) Model. Data Communication. Peer-to-Peer Communication. The TCP/IP Model. OSI Model Versus TCP/IP Model.

  1. Network Devices.

Layer 1 Devices. Layer 2 Devices. Layer 3 Devices. Voice, DSL, and Optical Devices. Firewalls and Authentication, Authorization, and Accounting Servers.

  1. Network Topologies.

Physical Topology Versus Logical Topology. Bus. Star and Extended Star. Ring. Full Mesh and Partial Mesh.

  1. NETWORK TYPES.
  2. Understanding Ethernet Technologies.

LAN Standards. Ethernet. How Ethernet Works. Simplex, Half-Duplex, and Full-Duplex Operation.

  1. WANs.

The Global Internet. WAN Technology Overview. WAN Connection Types. WAN Provider Services. WAN Devices. WAN Service Providers and WAN Service Terms. WAN Signaling Standards and Capacity. WANs and the Physical Layer. WANs and the Data Link Layer.

  1. Other Types of Networks.

Metropolitan-Area Networks (MANs). Storage-Area Networks (SANs). Content Networks. Intranets and Extranets. Virtual Private Network (VPN).

III. NETWORK MEDIA.

  1. Network Media Types.

Twisted-Pair Cable. Coaxial Cable. Fiber-Optic Cable. Wireless Communication. Comparing Media Types.

  1. Cabling the LAN.

LAN Physical Layer. Ethernet in the Campus LAN. Ethernet Media and Connector Requirements. Connection Media. UTP Implementation.

  1. Cabling the WAN.

WAN Physical Layer. WAN Serial Connections. Routers and Serial Connections. Routers and ISDN BRI Connections. Routers and DSL Connections. Routers and Cable Connections. Setting Up Console Connections.

  1. SWITCHING FUNDAMENTALS.
  2. Shared LAN Technology.

Early Local-Area Networks. Hubs. Bridges. Layer 2 Switches. Typical Causes of Network Congestion. Today’s LANs.

  1. LAN Switching Basics.

Microsegmentation. LAN Switch Operation. Full-Duplex Transmission. Modes of Switching. The Need for Spanning Tree.

  1. Multilayer Switching Devices.

Layer 2 Switching Devices. Layer 3 Switching Devices. Layer 4 Switching Devices.

  1. Virtual LANs.

Constraints of Shared LANs. Virtual LANs. VLAN Components. Establishing VLAN Membership. Communicating Between VLANs. Trunking.

  1. TCP/IP.
  2. TCP/IP Overview.

Communication Protocol. TCP/IP Protocol Stack. TCP/IP Applications.

  1. Transport Layer.

Transport Layer Functions. Flow Control. TCP and UDP. Establishing a TCP Connection.

  1. TCP/IP Internet Layer Overview.

TCP/IP Internet Layer and the OSI Network Layer. IP Datagram. Protocol Field. ICMP. ARP. RARP. BOOTP and DHCP.

  1. IP ADDRESSING AND ROUTING.
  2. Networking Addressing.

IP Addressing. IP Address Classes. Reserved IP Address. Private IP Addresses.

  1. IP Subnetting and Calculation.

Subnetworks. Subnet Masks. Network Addressing Planning. Subnetting Class C Addresses. Subnetting Class B Addresses. Identifying Subnet, Directed Broadcast, and Usable Addresses.

  1. Routing Basics.

Routing Overview. Routed Versus Routing. Path Determination. Routing Tables. Routing Algorithms. Administrative Distance.

  1. Routing Protocols.

IGP and EGP. Routing Protocols. RIPv1 and RIPv2. IGRP. EIGRP. OSPF. IS-IS. BGP.

VII. WAN TECHNOLOGIES.

  1. Traditional WAN Services.

WAN Connection Options. Multiplexing. Packet Switching vs Circuit Switching. Leased Lines. Frame Relay. ATM and Cell Switching. SONET.

  1. Dialup Access Technologies.

ISDN. PPP. HDLC.

  1. Analog Modems.

Modem Overview. Analog Modem Standards.

  1. Digital Subscriber Line (DSL).

Basic DSL. DSL Types. DSL Standards. Encapsulation and Protocols. DSL Advantages and Disadvantages.

  1. Cable Modems.

How Cable Modems Work. Cable Modem Advantages and Disadvantages. Cable and the OSI Model.

VIII. WIRELESS TECHNOLOGY.

  1. Wireless Concepts.

Wireless Data Communications. Wireless Signal. Radio Frequency Bands. Spread-Spectrum Technology. Security in the Wireless Environment.

  1. Wireless LANs.

WLANs and Wireless Bridging. In-Building WLANs. In-Building WLAN Technology. Building-to-Building WLANs.

  1. OPTICAL NETWORKING FUNDAMENTALS.
  2. Basics of Optical Networks.

Optical Business Drivers. Fiber-Optic Systems. Fiber-Optic Transmission System. Light.

  1. Optical Fibers.

Fiber Types. Fiber Geometry. Attenuation. Optical Filters. Optical Amplifiers (OAs).

  1. Optical Transmission and Multiplexing.

SONET Technology. DWDM Systems.

  1. APPENDIXES.

Appendix A: Introduction to Converged Networking.

Traditional Networks. Introduction to Voice and Data Networks. Voice, Video, and Data Networks. Common Issues with QoS. Summary. Review Exercises.

 

13 Open Source- Docker & Kubernetes

 

13.1 Docker
Docker – Overview
Docker – Installing Docker on Linux
Docker – Installation
Docker – Hub
Docker – Images
Docker – Images Lifecycle
Docker – Containers
Docker – Containers Lifecycle
Docker – Working With Containers
Docker – Architecture
Docker – Configuring
Docker – Containers & Shells
Docker – File
Docker – Building Files
Building a Web Server Docker File
Docker – Public Repositories
Docker – Managing Ports
Docker – Private Registries
Docker – Instruction Commands
Docker – Container Linking
Docker – Storage
Docker – Networking
Docker – Setting NGINX
Docker – Toolbox
Docker – Logging
Docker – Compose
Docker-Swarm

 

 

13.2  Kubernes
Kubernetes – Overview
Kubernetes – Architecture
Kubernetes – Setup
Kubernetes – Images
Kubernetes – Jobs
Kubernetes – Labels & Selectors
Kubernetes – Namespace
Kubernetes – Node
Kubernetes – Service
Kubernetes – Pod
Kubernetes – Replication Controller
Kubernetes – Replica Sets
Kubernetes – Deployments
Kubernetes – Volumes
Kubernetes – Secrets
Kubernetes – Network Policy
Advanced Kubernetes
Kubernetes – API
Kubernetes – Kubectl
Kubernetes – Kubectl Commands
Kubernetes – Creating an App
Kubernetes – App Deployment
Kubernetes – Autoscaling
Kubernetes – Dashboard Setup
Kubernetes – Monitoring

 

 

 

14 . AWS-Docker & Kubernetes

14.1 Elastic Container Registry
What Is Amazon Elastic Container Registry?
AWS EC2
AWS CLI Setup
Components of Amazon ECR
Registry
Authorization Token
Repository
Repository Policy
Image
Commands

 

 

 

 

14.2 Elastic Container Service
Docker Container Concepts
An intro to Amazon ECS
Terms and architecture
Task Definition
Task
Service
ECS Container Instances and ECS Container Agents
Cluster

 

14.3 Elastic Kubernetes Service
Overview: Installing Kubernetes
Installing Dependencies
Installing the Latest Kubernetes
Exploring Your Kubernetes Installation
Kubernetes Architecture and Design
Achieving High-Availability
Scaling Kubernetes
Federation
Configuration Best Practices
Creating and Decoding Secrets
Using Secrets in Applications
Overview: Docker Containerization
Installing Docker and Building the Image
Deploying Your Docker Container
Interacting With Your Container
Hands-on Kubernetes on AWS
 

 

 

 

15 . Azure-Docker & Kubernetes

 

15.1 Azure container registry
Docker Container Concepts
Deploying Containers
Multi-container Applications
Azure Container Registry
Azure Container Clustering Options
Installing ACS

 

 

 

15.2 Azure Container Service
Introduction to Azure Container Service
Azure Container Instances
Creating your first container in Azure
Azure Marketplace containers
Container orchestration

 

 

 

15.3 Azure Kubernetes Services
What is AKS?
Kubernetes core concepts for AKS
Install the Kubernetes CLI
Baseline architecture for an AKS cluster
Clusters and workloads
Access and identity
Security
Networking
Storage
Deploy an Azure Kubernetes Service (AKS) cluster
Create a Kubernetes cluster
Connect to cluster using kubectl
Deploy the application
Scale applications
Update an application
Upgrade Kubernetes

 

 

 

16 GCP-Docker & Kubernetes

 

 

16.1 Google Container Registry
Overview
Create Account
Compute Engine
Permissions
Running an image
Commands

 

 

16.2 Google Container Services
Containers on Compute Engine
Container technologies that run on Compute Engin
Container-optimized VM images
Installing container technologies on your instances
Install Docker
Permissions

 

 

16.3 Google Kubernetes Services
Understanding the GKE Service Profiles
Benefits of Using GKE
Costing Model Used in GKE
Using the GCP Calculator
GKE Architecture
Deploying an Application
Kubernetes Components
Basic Commands
GKE Architecture
GKE and IAM Requirements
GKE Federation Requirements
Kubernetes Cluster Actions
Scale/Resize a Cluster

 

 

  1. DCA

 

Domain​ ​1:​ ​Orchestration​ ​(25%​ ​of​ ​exam)
● Complete the setup of a swarm mode cluster, with managers and worker nodes
● State the differences between running a container vs running a service
● Demonstrate steps to lock a swarm cluster
● Extend the instructions to run individual containers into running services under swarm
● Interpret the output of “docker inspect” commands
● Convert an application deployment into a stack file using a YAML compose file with
“docker stack deploy”
● Manipulate a running stack of services
● Increase # of replicas
● Add networks, publish ports
● Mount volumes
● Illustrate running a replicated vs global service
● Identify the steps needed to troubleshoot a service not deploying
● Apply node labels to demonstrate placement of tasks
● Sketch how a Dockerized application communicates with legacy systems
● Paraphrase the importance of quorum in a swarm cluster
● Demonstrate the usage of templates with “docker service create”
Domain​ ​2:​ ​Image​ ​Creation,​ ​Management,​ ​and​ ​Registry​ ​(20%​ ​of​ ​exam)
Content may include the following:
● Describe Dockerfile options [add, copy, volumes, expose, entrypoint, etc)
● Show the main parts of a Dockerfile
● Give examples on how to create an efficient image via a Dockerfile
● Use CLI commands such as list, delete, prune, rmi, etc to manage images
● Inspect images and report specific attributes using filter and format
● Demonstrate tagging an image
● Utilize a registry to store an image
● Display layers of a Docker image
● Apply a file to create a Docker image
● Modify an image to a single layer
● Describe how image layers work
● Deploy a registry (not architect)
● Configure a registry
● Log into a registry
● Utilize search in a registry
● Tag an image
● Push an image to a registry
● Sign an image in a registry
● Pull an image from a registry
● Describe how image deletion works
● Delete an image from a registry
Domain​ ​3:​ ​Installation​ ​and​ ​Configuration​ ​(15%​ ​of​ ​exam)
Content may include the following:
● Demonstrate the ability to upgrade the Docker engine
● Complete setup of repo, select a storage driver, and complete installation of Docker
engine on multiple platforms
● Configure logging drivers (splunk, journald, etc)
● Setup swarm, configure managers, add nodes, and setup backup schedule
● Create and manager user and teams
● Interpret errors to troubleshoot installation issues without assistance
● Outline the sizing requirements prior to installation
● Understand namespaces, cgroups, and configuration of certificates
● Use certificate-based client-server authentication to ensure a Docker daemon has the
rights to access images on a registry
● Consistently repeat steps to deploy Docker engine, UCP, and DTR on AWS and on
premises in an HA config
● Complete configuration of backups for UCP and DTR
● Configure the Docker daemon to start on boot
Domain​ ​4:​ ​Networking​ ​(15%​ ​of​ ​exam)
Content may include the following:
● Create a Docker bridge network for a developer to use for their containers
● Troubleshoot container and engine logs to understand a connectivity issue between
containers
● Publish a port so that an application is accessible externally
● Identify which IP and port a container is externally accessible on
● Describe the different types and use cases for the built-in network drivers
● Understand the Container Network Model and how it interfaces with the Docker engine
and network and IPAM drivers
● Configure Docker to use external DNS
● Use Docker to load balance HTTP/HTTPs traffic to an application (Configure L7 load
balancing with Docker EE)
● Understand and describe the types of traffic that flow between the Docker engine,
registry, and UCP controllers
● Deploy a service on a Docker overlay network
● Describe the difference between “host” and “ingress” port publishing mode
Domain​ ​5:​ ​Security​ ​(15%​ ​of​ ​exam)
Content may include the following:
● Describe the process of signing an image
● Demonstrate that an image passes a security scan
● Enable Docker Content Trust
● Configure RBAC in UCP
● Integrate UCP with LDAP/AD
● Demonstrate creation of UCP client bundles
● Describe default engine security
● Describe swarm default security
● Describe MTLS
● Identity roles
● Describe the difference between UCP workers and managers
● Describe process to use external certificates with UCP and DTR
Domain​ ​6:​ ​Storage​ ​and​ ​Volumes​ ​(10%​ ​of​ ​exam)
Content may include the following:
● State which graph driver should be used on which OS
● Demonstrate how to configure devicemapper
● Compare object storage to block storage, and explain which one is preferable when available
● Summarize how an application is composed of layers and where those layers reside on
the filesystem
● Describe how volumes are used with Docker for persistent storage
● Identify the steps you would take to clean up unused images on a filesystem, also on
DTR
● Demonstrate how storage can be used across cluster nodes

 

 

18 . CKA
Certified Kubernetes Administrator
5%-Scheduling
•Use label selectors to schedule Pods.
•Understand the role of Daemon Sets.
•Understand how resource limits can affect Pod scheduling.
•Understand how to run multiple schedulers and how to configure Pods
to use them.
•Manually schedule a pod without a scheduler.
•Display scheduler events.
•Know how to configure the Kubernetes scheduler.
5%-Logging/Monitoring
•Understand how to monitor all cluster components.
•Understand how to monitor applications.
•Manage cluster component logs.
•Manage application logs.
8%-Application Lifecycle Management
•Understand Deployment sand how to perform rolling updates and rollbacks.
•Know various ways to configure applications.
•Know how to scale applications.
•Understand the primitives necessary to create a self-healing application.
11%-Cluster
•Understand Kubernetes cluster upgrade process.
•Facilitate operating system upgrades.
•Implement backup and restore methodologies.
12%-Security
•Know how to configure authentication and authorization.
•Understand Kubernetes security primitives.
•Know to configure network policies.
•Create and manage TLS certificates for cluster components.
•Work with images securely.
•Define security contexts.
•Secure persistent keyvalue store.
7%-Storage
•Understand persistent volumes and know how to create them.
•Understand access modes for volumes.
•Understand persistent volume claims primitive.
•Understand Kubernetes storage objects.
•Know how to configure applications with persistent storage.
10%-Troubleshooting
•Trouble shoot application failure.
•Trouble shoot control plane failure.
•Trouble shoot worker node failure.
•Trouble shoot networking.
19%-Core Concepts
•Understand the Kubernetes API primitives.
•Understand the Kubernetes cluster architecture.
•Understand Services and other network primitives.
11%-Networking
•Understand the networking configuration on the cluster nodes.
•Understand Pod networking concepts.
•Understand Service networking.
•Deploy and configure network loadbalancer.
•Know how to use Ingress rules.
•Know how to configure and use the cluster DNS.
•Understand CNI.
12%-Installation,Configuration &Validation
•Design a Kubernetes cluster.
•Install Kubernetes masters and nodes.
•Configure secure cluster communications.
•Configure a Highly-Available Kubernetes cluster.
•Know where to get the Kubernetes release binaries.
•Provision underlying infrastructure to deploy a Kubernetes cluster.
•Choose a network solution.
•Choose your Kubernetes infrastructure configuration.
•Run end-to-end tests on your cluster.
•Analyse end-to-end tests results.
•Run Node end-to-end tests.

 

 

 

19. CKAD
Certified Kubernetes Application Developer(CKAD) ExamCurriculum v1.13.0
This document provides the curriculum outline of the Knowledge,Skills and Abilities that
a Certified Kubernetes Application Developer (CKAD) can be expected to demonstrate.
13%-Core Concepts
•Understand Kubernetes API primitives
•Create and configure basic Pods
18%-Configuration
•Understand Config Maps
•Understand Security Contexts
•Define an application’s resource requirements
•Create & consume Secrets
•Understand Service Accounts
10% Multi-Container Pods
•Understand Multi-Container Pod design patterns (e.g.ambassador,adapter,sidecar)
18%-Observability
•Understand Liveness Probesand
Readiness Probes
•Understand container logging
•Understand how to monitor applications in Kubernetes
•Understand debugging in Kubernetes
20%-PodDesign
•Understand how to use Labels, Selectors, and Annotations
•Understand Deployments and how to perform rolling updates
•Understand Deployments and how to perform rollbacks
•Understand Jobs and CronJobs
13%-Services&Networking
•Understand Services
•Demonstrate basic understanding of Network Policies
8%-State Persistence
•Understand Persistent Volume Claims for storage

 

 

Our Courses

Call Now ButtonCall Us