DO380VT – Red Hat OpenShift Administration III: Scaling Kubern[...]

Overview

Course description

Design, build, and test OpenShift HA cluster

Red Hat OpenShift Administration II teaches you how to build robust clusters that provide high availability and the ability to run large numbers of applications. You will learn about OpenShift integration with datacenter infrastructure such as load balancers, identity management, monitoring, proxies, and storage. You will also develop more troubleshooting and Day 2 operations skills in this course.

This course is based on Red Hat® OpenShift Container Platform 3.6.

You will design an OpenShift HA cluster, then build and test it. You will use this cluster to examine more advanced topics in the administration and operation of a robust OpenShift cluster in the remainder of the course.

Course content summary

  • Understand container and OpenShift architecture.
  • Create containerized services.
  • Manage containers and container images.
  • Create custom container images.
  • Deploy containerized applications on Red Hat OpenShift.
  • Deploy multi-container applications.

Audience for this course

This course is designed for Linux® system administrators who want to deploy and manage a large-scale Red Hat® OpenShift Container Platform environment in their datacenters.

Prerequisites for this course

DO425VT – Red Hat Security: Securing Containers and OpenShift


Overview

COURSE DESCRIPTION

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

COURSE CONTENT SUMMARY

  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

AUDIENCE FOR THIS COURSE

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

PREREQUISITES FOR THIS COURSE

DO425 – Red Hat Security: Securing Containers and OpenShift

Overview

Course description

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

Course content summary

  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

Audience for this course

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

Prerequisites for this course

DO180 – Red Hat OpenShift I: Containers & Kubernetes

Overview

Course description

Introduction to building and managing containers for deployment on a Kubernetes and OpenShift 4 cluster

Red Hat OpenShift I: Containers & Kubernetes (DO180) introduces students to building and managing containers for deployment on a Kubernetes cluster. This course helps students build core knowledge and skills in managing containers through hands-on experience with containers, Kubernetes, and the Red Hat OpenShift Container Platform needed for multiple roles, including developers, administrators and site reliability engineers.

This course is based on Red Hat OpenShift® Container Platform 4.10.

Course content summary

  • Container and OpenShift architecture
  • Creating containerized services
  • Managing containers and container images
  • Creating custom container images
  • Deploying containerized applications on OpenShift
  • Deploying multi-container applications

Audience for this course

  • Developers who want to containerize software applications.
  • Administrators who are new to container technology and container orchestration.
  • Architects who are looking to use container technologies in software architectures.
  • Site Reliability Engineers who want to support their technology infrastructure using Kubernetes and OpenShift.

Prerequisites for this course

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • Experience in the use of a Linux terminal session, issuing operating system commands, and familiarity with shell scripting. A Red Hat Certified System Administrator (RHCSA) certification is recommended but not required.
  • Some experience with web application architectures and their corresponding technologies.

DO457VT – Red Hat Ansible for Network Automation

Overview

Course description

Configure and manage network infrastructure using Red Hat Ansible Automation for Networking

Ansible for Network Automation (DO457) is designed for network administrators or infrastructure automation engineers who want to use network automation to centrally manage the switches, routers, and other devices in the organization’s network infrastructure.

This course is based on Red Hat® Ansible Engine 2.5 and Red Hat® Ansible Tower 3.2.

Learn how to use Red Hat Ansible Automation for Networking to remotely automate configuration of network devices, test and validate the current network state, and perform compliance checks to detect and correct configuration drift.

Course summary

  • Install and configure Red Hat Ansible Automation for Networking on a management system
  • Use Ansible to run ad hoc commands and playbooks to automate tasks
  • Write effective Ansible playbooks for network automation
  • Gather information about network infrastructure configuration and backup
  • Automate specific network administration use cases, including configuration of routers and switches, ports, VLANs, SNMP monitoring, and routing protocols
  • Use Ansible playbooks to target devices from various hardware vendors, including Cisco, Juniper, and Arista

Audience for this course

This course is designed for network administrators, network automation engineers, and infrastructure automation engineers who want to learn how to use Ansible to automate the administration, deployment, and configuration management of the network infrastructure of their organization or enterprise.

Prerequisites for this course

  • Experience with network administration, including a solid understanding of TCP/IP, routers, and managed switches
  • Familiarity with managing network devices from the command line, preferably with one or more of Cisco IOS, IOS XR, or NX-OS; Juniper JUNOS; Arista EOS; or VyOS
  • You will work with text files and run commands in a Red Hat Enterprise Linux environment. A working knowledge of Linux, including how to edit text files and run commands from the shell, and how to use SSH to log in to remote systems
  • Knowledge equivalent to Red Hat System Administration I (RH124) or better is recommended
  • Prior Ansible knowledge is not required

DO292VT – Red Hat OpenShift Development II: Creating Microserv[...]

Overview

Course description

Developing microservices using Red Hat OpenShift Application Runtimes

Red Hat OpenShift Development II: Creating Microservices with Red Hat OpenShift Application Runtimes (DO292) introduces you to three runtimes: WildFly Swarm, Vert.x, and Spring Boot. This course is an intensive, hands-on programming experience in which you will develop multiple microservices using the three runtimes and deploy them on a Red Hat® OpenShift Container Platform cluster.

This course is based on Red Hat® Enterprise Linux 7.5 and OpenShift Container Platform 3.9.

Like members of many organizations, you may be interested in or are already employing microservice architectures. We have introduced solutions to ease the on-ramp for the creation and deployment of microservices through its developer programs and Red Hat® OpenShift Application Runtimes.

Course summary

  • Deploy microservices with WildFly Swarm.
  • Deploy microservices with Vert.x.
  • Deploy microservices with Spring Boot.
  • Develop an API gateway.
  • Implement fault tolerance with Hystrix.

Audience for this course

  • Java application developers interested in employing microservices architectures
  • Software architects interested in creating and deploying microservices

Prerequisites for this course

Red Hat recommends these prerequisites: