Containers, Kubernetes, and Red Hat OpenShift Administration II (DO285VT) – Tier3 – English

Overview

Course description

Learn to build and manage Linux containers and configure and manage an OpenShift cluster

Containers, Kubernetes, and Red Hat OpenShift Administration I (DO285) helps you build core knowledge in building and managing Linux® containers and Red Hat® OpenShift® Container Platform. This hands-on, lab-based course shows you how to deploy sample applications to either a local container runtime or an OpenShift cluster, as well as how to configure and manage OpenShift clusters. If you’re a developer, administrator or site reliability engineer, you will benefit from learning these skills.

This course is based on Red Hat OpenShift Container Platform 4.2 and combines the content from Introduction to Containers, Kubernetes, and Red Hat OpenShift (DO180) and Red Hat OpenShift Administration I (DO280).

Course content summary

  • Learn about container and OpenShift architecture.
  • Manage containers and container images.
  • Create custom container images.
  • Deploy and troubleshoot applications on OpenShift.
  • Configure authentication using local users.
  • Control access to projects using role-based access control.
  • Configure service and container networking.
  • Configure pod scheduling using labels and selectors.
  • Limit compute resource usage.
  • Scale a cluster.
  • Monitor cluster events and alerts.

Audience for this course

  • System and software architects interested in understanding features and functionality of an OpenShift cluster
  • System administrators who want to learn about the initial establishment of a cluster
  • Cluster operators responsible for the ongoing maintenance of a cluster
  • Site reliability engineers interested in the ongoing maintenance and troubleshooting of a cluster

Prerequisites for this course

Become a Red Hat Certified System Administrator (RHCSA), or demonstrate equivalent Red Hat Enterprise Linux system administration experience

Technology considerations

Internet access is required.

Configuration Management with Puppet (DO405VT) – Tier3_Polish

Overview

Course description

Configure Red Hat Enterprise Linux hosts in DevOps environment using Puppet<

Configuration Management with Puppet (DO405) is designed for system administrators and cloud administrators who intend to implement Puppet as integrated with Red Hat® products in an operations environment or a cloud computing environment.

This course is on Red Hat Enterprise Linux® 7 and Red Hat Satellite 6.

This course will cover case studies involving Red Hat products that use Puppet: Red Hat Enterprise Linux OpenStack® Platform and Red Hat Satellite. Key Puppet concepts will be introduced, including language constructs, modules, classes, and resources. This course will cover the deployment of Puppet server on Red Hat Enterprise Linux and the deployment of Puppet as a client.

Course summary

  • Write Puppet manifests that utilize a variety of Puppet DSL resources.
  • Deploy a GIT repository and use it to maintain Puppet modules.
  • Write Puppet modules that deploy and configure network services.
  • Configure a Puppet master and client nodes.
  • Implement Puppet configuration management in a DevOps environment.
  • Use Red Hat Satellite 6 to manage client configurations with Puppet.

Audience for this course

  • System administrators and cloud administrators responsible for the management of systems and cloud client systems on either Red Hat Enterprise Linux OpenStack Platform or Red Hat Satellite

Prerequisites for this course

Red Hat Ceph 3 Storage Architecture and Administration (CEPH125VT) – Tier3_Polish

Overview

Course description

Learn how to deploy, manage, and scale out a Ceph storage cluster

Red Hat Ceph Storage Architecture and Administration (CEPH125) helps you provide unified storage for enterprise servers and Red Hat® OpenStack Platform with Red Hat Ceph Storage. Learn to use a Ceph storage cluster to provide servers and cloud resources with object storage compatible with the Amazon S3 or OpenStack Swift APIs, Ceph-native or iSCSI-based block storage, and file storage using CephFS.

This course is based on Red Hat Ceph Storage 3.0, Red Hat Enterprise Linux 7.4/7.5, and Red Hat OpenStack Platform 10.0.

Course content summary

Red Hat Ceph Storage Architecture and Administration (CEPH125) is designed for storage administrators or cloud operators who intend to deploy Red Hat Ceph Storage to their production data center environment or OpenStack installation.

  • Deploying and managing a Red Hat Ceph Storage cluster on commodity servers using Ansible.
  • Creating, expanding, and controlling access to storage pools provided by the Ceph cluster.
  • Accessing Red Hat Ceph Storage from clients using object, block, and file-based methods.
  • Analyzing and tuning Red Hat Ceph Storage performance.
  • Integrating OpenStack image, object, block, and file storage with a Red Hat Ceph Storage cluster.

Audience for this course

This course is intended for storage administrators, cloud operators, and cloud developers who want to learn how to deploy and manage Red Hat Ceph Storage for use by servers in an enterprise data center or within a Red Hat OpenStack Platform environment.

Prerequisites for this course

Red Hat Security: Securing Containers and OpenShift (DO425VT) – Tier 3

Overview

Course description

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

Course content summary

  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

Audience for this course

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

Prerequisites for this course

Red Hat OpenStack Administration II: Day 2 Operations for Cloud Operators (CL210VT) – Tier3 – Polish

Overview

Course description

Introduction to Red Hat OpenStack Platform configuration and administration of private cloud infrastructure using core OpenStack services

Red Hat OpenStack Administration II: Infrastructure Configuration for Cloud Administrators (CL210) teaches you how to implement a full-featured cloud computing environment using OpenStack. You will learn how to configure, administer, and manage Red Hat® OpenStack Platform infrastructure. The lessons and objectives taught in this course will prepare you for the Red Hat Certified System Administrator in Red Hat OpenStack exam (EX210).

This course is based on Red Hat OpenStack Platform 13.0 and Red Hat® Enterprise Linux® 7.5.

The focus of this course is on managing and using the OpenStack client command-line interface and the director and dashboard graphical web user interfaces to securely manage server instances, compute and storage resources, and user identities.

Course content summary

  • Gain familiarity with overcloud service containerization technology.
  • Learn about Open Virtual Networking (OVN) enhancement to OVS.
  • Use identity service v3 (keystone) with external Red Hat IdM store.
  • Manage the core control plane, including Pacemaker.
  • Customize images, with techniques for multiple use cases.
  • Manage block and object storage.
  • Manage compute nodes, including tuning and hyperconvergence.
  • Deploy multi-container stacks.
  • Troubleshoot OpenStack.

Audience for this course

This course is intended for Linux system administrators, cloud administrators, cloud operators, and infrastructure architects interested in, or responsible for, maintaining a private or hybrid cloud.

Prerequisites for this course

Red Hat OpenShift Administration I: Operating a Production Cluster (DO180) – CZ

Overview

Course description

Introduction to building and managing containers for deployment on a Kubernetes and OpenShift 4 cluster

Red Hat OpenShift I: Containers & Kubernetes (DO180) introduces students to building and managing containers for deployment on a Kubernetes cluster. This course helps students build core knowledge and skills in managing containers through hands-on experience with containers, Kubernetes, and the Red Hat OpenShift Container Platform needed for multiple roles, including developers, administrators and site reliability engineers.

This course is based on Red Hat OpenShift® Container Platform 4.10.

Course content summary

  • Container and OpenShift architecture
  • Creating containerized services
  • Managing containers and container images
  • Creating custom container images
  • Deploying containerized applications on OpenShift
  • Deploying multi-container applications

Audience for this course

  • Developers who want to containerize software applications.
  • Administrators who are new to container technology and container orchestration.
  • Architects who are looking to use container technologies in software architectures.
  • Site Reliability Engineers who want to support their technology infrastructure using Kubernetes and OpenShift.

Prerequisites for this course

  • Experience in the use of a Linux terminal session, issuing operating system commands, and familiarity with shell scripting. A Red Hat Certified System Administrator (RHCSA) certification is recommended but not required.
  • Some experience with web application architectures and their corresponding technologies.

Red Hat Security: Identity Management and Authentication (RH362VT) – Tier3 -Polish

Overview

Course description

Configure and manage Red Hat Identity Management (IdM)

Red Hat Security: Identity Management and Active Directory Integration (RH362) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

This course is based on Red Hat Identity Manager 4.5 (bundled with RHEL), Red Hat Enterprise Linux 7.4, Microsoft Windows Server 2016, Red Hat Satellite 6.3, Red Hat Ansible Tower 3.2.2, and Red Hat Ansible 2.5.

This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

Course summary

  • Install Red Hat Identity Management servers, replicas, and clients.
  • Configure and manage Kerberos authentication and secure services.
  • Create and manage a trust relationship with Microsoft Active Directory.
  • Configure highly secure user authentication—local and remote—including two-factor authentication.
  • Manage secrets, vaults, certificates, and keys.
  • Troubleshoot identity management processes.
  • Integrate Satellite 6 with IdM.
  • Integrate Tower with IdM.
  • Configure IdM backup and recovery.

Audience for this course

  • Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications
  • Identity management specialist or engineer
  • Access management specialist or engineer
  • Web application developer
  • DevOps specialist

Prerequisites for this course

Red Hat OpenShift Development II: Creating Microservices with Red Hat OpenShift Application Runtimes (DO292) – CZ

Overview

Course description

Developing microservices using Red Hat OpenShift Application Runtimes

Red Hat OpenShift Development II: Creating Microservices with Red Hat OpenShift Application Runtimes (DO292) introduces you to three runtimes: WildFly Swarm, Vert.x, and Spring Boot. This course is an intensive, hands-on programming experience in which you will develop multiple microservices using the three runtimes and deploy them on a Red Hat® OpenShift Container Platform cluster.

This course is based on Red Hat® Enterprise Linux 7.5 and OpenShift Container Platform 3.9.

Like members of many organizations, you may be interested in or are already employing microservice architectures. We have introduced solutions to ease the on-ramp for the creation and deployment of microservices through its developer programs and Red Hat® OpenShift Application Runtimes.

Course summary

  • Deploy microservices with WildFly Swarm.
  • Deploy microservices with Vert.x.
  • Deploy microservices with Spring Boot.
  • Develop an API gateway.
  • Implement fault tolerance with Hystrix.

Audience for this course

  • Java application developers interested in employing microservices architectures
  • Software architects interested in creating and deploying microservices

Prerequisites for this course

Red Hat recommends these prerequisites:

Advanced Automation: Red Hat Ansible Best Practices (DO447) – CZ

Overview

Course description

Take your Red Hat Ansible Automation skills to the next level and manage automation at scale

Advanced Automation: Ansible Best Practices (DO447) is for experienced Red Hat® Ansible® Automation users who want to take their Ansible skills to the next level, enabling scalable design and operation of Ansible Automation in the enterprise. You will explore better ways to automate tasks and use Red Hat Ansible Engine effectively, as well as how to leverage advanced features of Ansible to perform more complex tasks. You will also learn how to install and use Red Hat Ansible Tower to centrally coordinate your use of Ansible, control access to hosts and systems, and manage Ansible workflows through the web interface and the Red Hat Ansible Tower API.

This course is based on Red Hat Ansible Automation (Red Hat Ansible Engine 2.8 / Red Hat Ansible Tower 3.5) and Red Hat Enterprise Linux® 8.

Course content summary

  • Investigate recommended practices for effective and efficient automation with Ansible.
  • Perform rolling updates with your Ansible Automation operations.
  • Use advanced features of Ansible to work with data, including filters and plugins.
  • Control applications through their REST API with Ansible Playbooks.
  • Implement Red Hat Ansible Tower to centrally coordinate and scale Red Hat Ansible Automation.
  • Leverage capabilities of Red Hat Ansible Tower to manage complex automation workflows.
  • Implement a CI/CD pipeline for your automation with Git and Red Hat Ansible Tower.

Audience for this course

This course is designed for users who need to set recommended design patterns and operate automation practices at scale, including these roles:

  • DevOps engineers
  • Linux system administrators, developers
  • Release engineers
  • Other IT professionals with basic expertise using Ansible or Red Hat Ansible Engine to automate, provision, configure, and deploy applications and services in a Linux environment

Prerequisites for this course

Red Hat OpenShift Administration III: Scaling Deployments in the Enterprise (DO380) – CZ

Overview

Course description

Design, build, and test OpenShift HA cluster

Red Hat OpenShift Administration II teaches you how to build robust clusters that provide high availability and the ability to run large numbers of applications. You will learn about OpenShift integration with datacenter infrastructure such as load balancers, identity management, monitoring, proxies, and storage. You will also develop more troubleshooting and Day 2 operations skills in this course.

This course is based on Red Hat® OpenShift Container Platform 4.10.

You will design an OpenShift HA cluster, then build and test it. You will use this cluster to examine more advanced topics in the administration and operation of a robust OpenShift cluster in the remainder of the course.

Course content summary

  • Understand container and OpenShift architecture.
  • Create containerized services.
  • Manage containers and container images.
  • Create custom container images.
  • Deploy containerized applications on Red Hat OpenShift.
  • Deploy multi-container applications.

Audience for this course

This course is designed for Linux® system administrators who want to deploy and manage a large-scale Red Hat® OpenShift Container Platform environment in their datacenters.

Prerequisites for this course