Automation with Ansible and Ansible Tower (DO410VT) – Tier 3_Spanish

Overview

Course description

Automation with Ansible and Ansible Tower

Automation with Ansible and Ansible Tower (DO410) teaches you how to develop standardized automation of the enterprise IT environment in order to improve operational efficiency. You will learn how to use Ansible for automation, configuration, provisioning, and management, as well as how to use Red Hat® Ansible Tower to centrally manage Ansible at an enterprise scale.

This course combines the content from Automation with Ansible (DO407) and Automation with Ansible II: Ansible Tower (DO409), and is based on Ansible 2.7 and Ansible Tower 3.3.

Through hands-on labs, you will learn to automate system administration tasks on managed hosts with Ansible, find out how to write Ansible playbooks to standardize task execution, and manage encryption for Ansible with Ansible Vault. This course will also teach you how to deploy and use Red Hat Ansible Tower to centrally manage existing Ansible projects, playbooks, and roles; perform basic maintenance and administration of the Ansible Tower installation; and configure users and teams and use them to control access to systems, projects, and other resources through role-based access controls. You will learn to use Ansible Tower’s visual dashboard to launch, control, and monitor Ansible jobs; use the Ansible Tower application programming interface (API) to launch jobs from existing templates; automatically schedule Ansible jobs; and dynamically update host inventories.

The course material covered in this curriculum is now included within our newly released Red Hat System Administration III: Linux Automation with Ansible (RH294) and Advanced Automation: Ansible Best Practices (DO447) offerings. which cover how to use Red Hat Ansible Automation to automate across different functions. If you are interested in learning how to scale infrastructure efficiently, begin your journey with Linux automation today.

Course content summary

  • Install and troubleshoot Ansible on central nodes and managed hosts.
  • Automate administration tasks with Ansible playbooks and ad hoc commands.
  • Write effective Ansible playbooks.
  • Protect sensitive data used by tasks with Ansible Vault.
  • Install and configure Ansible Tower for enterprise Ansible management.
  • Use Ansible Tower to control access to inventories and machine credentials by users and teams.
  • Create job templates in Ansible Tower to standardize playbook execution.
  • Launch playbooks and monitor and review job results with Ansible Tower.

Audience for this course

This course is designed for professionals responsible for automation of configuration management, application deployment, provisioning and deployment of servers, and integration with DevOps CI/CD workflows, including these roles:

  • Linux system administrators
  • DevOps engineers
  • Infrastructure automation engineers
  • Systems design engineers

Prerequisites for this course

Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) – CZ

Overview

The „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) course is designed for security and system administration personnel who manage the secure operation of computer systems running Red Hat Enterprise Linux on physical hardware, as virtual machines, or as cloud instances both in private data centers and on public cloud platforms.

Course description

  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, as virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements, including the kernel’s Audit subsystem, AIDE, SELinux, OpenSCAP and SCAP Workbench, USBGuard, PAM authentication, and Network-Based Device Encryption. You will learn to monitor compliance and to proactively identify, prioritize, and resolve issues by using OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Automation Platform. You will have a basic introduction to how Red Hat Ansible Automation Platform automates the deployment of remediation to systems, by using Ansible Playbooks from OpenSCAP or Red Hat Insights.
  • This course is based on RHEL 9.2, Ansible Core 2.14, Red Hat Ansible Automation Platform 2.4, Satellite 6.14, and OpenSCAP 1.3.7.
  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
  • Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.
  • Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course summary

  • Manage compliance with OpenSCAP.
  • Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniques.
  • Proactively identify and resolve issues with Red Hat Insights.
  • Monitor activity and changes on a server with Linux Audit and AIDE.
  • Protect data from compromise with USBGuard and storage encryption.
  • Manage authentication controls with PAM.
  • Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues.
  • Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Automation Platform.

Target Audience

  • System Administrator – responsible for supporting the company’s physical and virtual infrastructure, systems, and servers
  • IT Security Practitioner / Compliance & Auditor – responsible for ensuring the technology environment is protected from attacks and is in compliance with security/privacy rules and regulations.
  • Automation Architect – Engineer or architect responsible for the company’s automation development and optimizing cloud tools and infrastructure to achieve automation goals.

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • Red Hat Certified Engineer (EX294 / RHCE) certification or equivalent Red Hat Enterprise Linux knowledge and experience.

Technology considerations

  • If the instructor intends to demonstrate Red Hat Insights, internet access and appropriate entitlements are required.

Red Hat Virtualization (RH318) – CZ

Overview

Course description

Deploy, configure, manage, and migrate virtual environments

Red Hat Virtualization (RH318) teaches you the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat® Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.

This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux® 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.

Course content summary

  • Configure Red Hat Virtualization
  • Configure networking and storage for use with Red Hat Virtualization
  • Manage user accounts and access to the Red Hat Virtualization environment
  • Install and manage virtual machines in Red Hat Virtualization
  • Use templates for rapid virtual machine deployment
  • Manage virtual machine snapshots and images
  • Migrate virtual machines and explore high-availability options

Audience for this course

Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform.

Recommendations for this course

Red Hat Enterprise Linux Diagnostics and Troubleshooting (RH342) – CZ

Overview

Course description

Diagnose problems, gather information, and fix common issues with Red Hat Enterprise Linux

The Red Hat Enterprise Linux Diagnostics and Troubleshooting course (RH342) provides system administrators with the tools and techniques they need to successfully diagnose, and fix, a variety of potential issues. Students will work through hands-on problems in various subsystems to diagnose and fix common issues.

Students will learn how to apply the scientific method to a structured form of troubleshooting. This approach is then used troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course students can complete various comprehensive review labs to test their skills.

Course content summary

  • Use the scientific method to approach troubleshooting
  • Troubleshoot boot issues
  • Troubleshoot security issues
  • Troubleshoot storage issues
  • Troubleshoot network issues

Audience for this course

The Red Hat Enterprise Linux Diagnostics and Troubleshooting course is aimed at senior system administrators who wish to learn more about troubleshooting.

Prerequisites for this course

Red Hat recommends these prerequisites:

Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442) – CZ

Overview

Course description

Performance tuning and capacity planning for Red Hat Enterprise Linux

Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH422) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

This course is based on Red Hat® Enterprise Linux 8.

Course content summary

  • Analyze and tune for resource-specific scenarios
  • Applying tuning profiles with the tuned tool
  • Tune in virtual environments (hosts and guests)
  • Trace and profile system events and activities
  • Tune resource limits and utilization using systemd-integrated cgroups
  • Gather performance metrics and benchmarking data

Audience for this course

  • Senior Linux system administrators responsible for maximizing resource utilization through performance tuning

Prerequisites for this course

Red Hat Security: Securing Containers and OpenShift (DO425) – CZ

Overview

Course description

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

Course content summary

  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

Audience for this course

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

Prerequisites for this course

Red Hat Certified Specialist in Ansible Automation exam (EX407) – CZ

Overview

Exam description

The Red Hat Certified Specialist in Ansible Automation exam (EX407) tests your ability to use Ansible to automate the configuration of systems and applications.

By passing this exam, you become a Red Hat Certified Specialist in Ansible Automation, which also count towards becoming a Red Hat Certified Architect (RHCA).

This exam is based on Red Hat® Enterprise Linux® 7.5 and Ansible 2.7.

The material covered in this exam is now included within the curriculum of the Red Hat Certified Engineer (RHCE) exam (EX294). This new exam tests your ability to use Red Hat Ansible Automation to automate across different functions and scale infrastructure efficiently.

Audience for this exam

  • System administrators who need to manage large numbers of systems
  • System administrators who work in a DevOps environment and who wish to automate a large part of their day-to-day workload
  • Developers who have some basic systems administration background and who wish to incorporate automation into their development process
  • A Red Hat Certified Engineer (RHCE) interested in becoming a Red Hat Certified Specialist or Red Hat Certified Architect (RHCA)

Prerequisites for this exam

Automation with Ansible (DO407) – CZ

Overview

Course description

Learn how to automate Linux system administration tasks with Ansible

Automation with Ansible (DO407) is designed for Linux system administrators and developers who need to automate provisioning, configuration, application deployment, and orchestration. You will learn how to install and configure Ansible on a management workstation and prepare managed hosts for automation.

This course is based on Red Hat® Ansible Engine 2.7 and Red Hat Enterprise Linux 7.3.

Incorporating IT automation is key to managing large numbers of systems and applications efficiently and consistently at scale. In this course, you will write Ansible playbooks to automate tasks, and you will run them to ensure servers are correctly deployed and configured. You will also explore examples of how to approach the automation of common Linux system administration tasks.

The material covered in this curriculum is now included within our newly released Red Hat System Administration III: Linux Automation with Ansible (RH294)course, which covers how to use Red Hat Ansible Automation to automate across different functions. If you are interested in learning how to scale infrastructure efficiently, begin your journey with Linux automation today.

Course content summary

  • Install Ansible/Red Hat Ansible Engine on control nodes.
  • Create and update inventories of managed hosts and manage connections to them.
  • Automate administration tasks with Ansible playbooks and ad hoc commands.
  • Write effective Ansible playbooks at scale.
  • Protect sensitive data used by Ansible with Ansible Vault.
  • Reuse code and simplify playbook development with Ansible roles.

Audience for this course

This course is designed for Linux system administrators, DevOps engineers, infrastructure automation engineers, and systems design engineers. The curriculum is particularly geared toward those responsible for automation of configuration management; consistent and repeatable application deployment; provisioning and deployment of development, testing, and production servers; and integration with DevOps CI/CD workflows.

Prerequisites for this course

Red Hat Certified OpenShift Administrator exam (EX280) – CZ

Overview

Exam description

The Red Hat Certified Specialist in OpenShift Administration exam (EX280) tests the knowledge, skills, and ability to create, configure, and manage a cloud application platform using Red Hat® OpenShift® Container Platform.

By passing this exam, you become a Red Hat Certified Specialist, which also counts toward becoming a Red Hat Certified Architect (RHCA®).

This exam is based on Red Hat OpenShift Container Platform 4.2.

Audience for this exam

  • System and Software Architects who need an understanding of the features and functionality of an OpenShift Container Platform cluster.
  • System Administrators who need to support the initial establishment of an OpenShift cluster.
  • Cluster Operators who need to support ongoing maintenance of an OpenShift cluster.
  • Site Reliability Engineers who need to support the ongoing maintenance and troubleshooting of an OpenShift cluster.
  • System administrators who want to demonstrate their OpenShift Container Platform skills
  • Red Hat Certified Engineers (RHCEs) who wish to become a Red Hat Certified Architect (RHCA)
  • System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform

Prerequisites for this exam

Red Hat Satellite 6 Administration (RH403) – CZ

Overview

Course description

Learn how to configure Red Hat Satellite 6 to deploy and manage Red Hat Enterprise Linux systems and software

Red Hat Satellite 6 Administration (RH403) is a lab-based course that explores the concepts and methods necessary for successful large-scale management of Red Hat® Enterprise Linux® systems. You will learn how to configure Red Hat Satellite 6 on a server and populate it with software packages. You will use Red Hat Satellite to manage the software development life cycle of a subscribed host and its configuration, and learn how to provision hosts integrated with software and Ansible® configuration management upon deployment.

This course is based on Red Hat Enterprise Linux 8 and Red Hat Satellite 6.6.

Course content summary

  • Verify a Red Hat Satellite 6.6 installation.
  • Regulate Red Hat Satellite with organizations, locations, users, and roles.
  • Manage software with Red Hat Satellite environments and content views.
  • Use Red Hat Satellite to configure hosts with Ansible playbooks and roles.
  • Provision hosts with integrated software and configuration management.
  • Implement Metal-as-a-Service (MaaS) with Satellite discovery and provisioning of unprovisioned hosts.

Audience for this course

  • Senior Red Hat Enterprise Linux system administrators responsible for the management of multiple servers

Recommended for this course