DO285VT – Containers, Kubernetes, and Red Hat OpenShift Admini[...]

Overview

Course description

Learn to build and manage Linux containers and configure and manage an OpenShift cluster

Containers, Kubernetes, and Red Hat OpenShift Administration I (DO285) helps you build core knowledge in building and managing Linux® containers and Red Hat® OpenShift® Container Platform. This hands-on, lab-based course shows you how to deploy sample applications to either a local container runtime or an OpenShift cluster, as well as how to configure and manage OpenShift clusters. If you’re a developer, administrator or site reliability engineer, you will benefit from learning these skills.

This course is based on Red Hat OpenShift Container Platform 4.2 and combines the content from Introduction to Containers, Kubernetes, and Red Hat OpenShift (DO180) and Red Hat OpenShift Administration I (DO280).

Course content summary

  • Learn about container and OpenShift architecture.
  • Manage containers and container images.
  • Create custom container images.
  • Deploy and troubleshoot applications on OpenShift.
  • Configure authentication using local users.
  • Control access to projects using role-based access control.
  • Configure service and container networking.
  • Configure pod scheduling using labels and selectors.
  • Limit compute resource usage.
  • Scale a cluster.
  • Monitor cluster events and alerts.

Audience for this course

  • System and software architects interested in understanding features and functionality of an OpenShift cluster
  • System administrators who want to learn about the initial establishment of a cluster
  • Cluster operators responsible for the ongoing maintenance of a cluster
  • Site reliability engineers interested in the ongoing maintenance and troubleshooting of a cluster

Prerequisites for this course

Become a Red Hat Certified System Administrator (RHCSA), or demonstrate equivalent Red Hat Enterprise Linux system administration experience

Technology considerations

Internet access is required.

DO380VT – Red Hat OpenShift Administration III: Scaling Deploy[...]

Overview

Course description

Design, build, and test OpenShift HA cluster

Red Hat OpenShift Administration II teaches you how to build robust clusters that provide high availability and the ability to run large numbers of applications. You will learn about OpenShift integration with datacenter infrastructure such as load balancers, identity management, monitoring, proxies, and storage. You will also develop more troubleshooting and Day 2 operations skills in this course.

This course is based on Red Hat® OpenShift Container Platform 3.6.

You will design an OpenShift HA cluster, then build and test it. You will use this cluster to examine more advanced topics in the administration and operation of a robust OpenShift cluster in the remainder of the course.

Course content summary

  • Understand container and OpenShift architecture.
  • Create containerized services.
  • Manage containers and container images.
  • Create custom container images.
  • Deploy containerized applications on Red Hat OpenShift.
  • Deploy multi-container applications.

Audience for this course

This course is designed for Linux® system administrators who want to deploy and manage a large-scale Red Hat® OpenShift Container Platform environment in their datacenters.

Prerequisites for this course

DO425VT – Red Hat Security: Securing Containers and OpenShift


Overview

COURSE DESCRIPTION

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

COURSE CONTENT SUMMARY

  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

AUDIENCE FOR THIS COURSE

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

PREREQUISITES FOR THIS COURSE

DO425 – Red Hat Security: Securing Containers and OpenShift

Overview

Course description

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

Course content summary

  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

Audience for this course

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

Prerequisites for this course

DO180 – Red Hat OpenShift Administration I: Operating a Produc[...]

Overview

Course description

Deploy, manage, and troubleshoot containerized applications running as Kubernetes workloads in OpenShift clusters.

  • Red Hat OpenShift Administration I: Managing Containers and Kubernetes (DO180) prepares OpenShift Cluster Administrators to perform day-to-day management of Kubernetes workloads and collaborate with Developers, DevOps Engineers, System Administrators, and SREs to ensure the availability of application workloads. This course focuses on managing typical end-user applications that are often accessible from a web or mobile UI and represent the majority of cloud native and containerized workloads. Management of applications also includes deployment and updating of their dependencies such as databases, messaging, and authentication systems.

    The skills you learn in this course can be applied using all versions of OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and OpenShift Container Platform.

    This course is based on Red Hat® OpenShift® 4.14.
  • Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.

Course content summary

  • Managing OpenShift clusters from the command-line interface and from the web console.
  • Troubleshooting network connectivity between applications inside and outside of an OpenShift cluster.
  • Connecting Kubernetes workloads to storage for application data.
  • Configuring Kubernetes workloads for high availability and reliability.
  • Managing updates to container images, settings, and Kubernetes manifests of an application.

Audience for this course

  • System Administrators and Platform Operators interested in the ongoing management of OpenShift clusters and containerized applications.
  • Site Reliability Engineers interested in the ongoing maintenance and troubleshooting of containerized applications on Kubernetes.
  • System and Software Architects interested in understanding the features and functionality of an OpenShift cluster.

Prerequisites for this course

DO457VT – Red Hat Ansible for Network Automation

Overview

Course description

Configure and manage network infrastructure using Red Hat Ansible Automation for Networking

Ansible for Network Automation (DO457) is designed for network administrators or infrastructure automation engineers who want to use network automation to centrally manage the switches, routers, and other devices in the organization’s network infrastructure.

This course is based on Red Hat® Ansible Engine 2.5 and Red Hat® Ansible Tower 3.2.

Learn how to use Red Hat Ansible Automation for Networking to remotely automate configuration of network devices, test and validate the current network state, and perform compliance checks to detect and correct configuration drift.

Course summary

  • Install and configure Red Hat Ansible Automation for Networking on a management system
  • Use Ansible to run ad hoc commands and playbooks to automate tasks
  • Write effective Ansible playbooks for network automation
  • Gather information about network infrastructure configuration and backup
  • Automate specific network administration use cases, including configuration of routers and switches, ports, VLANs, SNMP monitoring, and routing protocols
  • Use Ansible playbooks to target devices from various hardware vendors, including Cisco, Juniper, and Arista

Audience for this course

This course is designed for network administrators, network automation engineers, and infrastructure automation engineers who want to learn how to use Ansible to automate the administration, deployment, and configuration management of the network infrastructure of their organization or enterprise.

Prerequisites for this course

  • Experience with network administration, including a solid understanding of TCP/IP, routers, and managed switches
  • Familiarity with managing network devices from the command line, preferably with one or more of Cisco IOS, IOS XR, or NX-OS; Juniper JUNOS; Arista EOS; or VyOS
  • You will work with text files and run commands in a Red Hat Enterprise Linux environment. A working knowledge of Linux, including how to edit text files and run commands from the shell, and how to use SSH to log in to remote systems
  • Knowledge equivalent to Red Hat System Administration I (RH124) or better is recommended
  • Prior Ansible knowledge is not required

DO292VT – Red Hat OpenShift Development II: Creating Microserv[...]

Overview

Course description

Developing microservices using Red Hat OpenShift Application Runtimes

Red Hat OpenShift Development II: Creating Microservices with Red Hat OpenShift Application Runtimes (DO292) introduces you to three runtimes: WildFly Swarm, Vert.x, and Spring Boot. This course is an intensive, hands-on programming experience in which you will develop multiple microservices using the three runtimes and deploy them on a Red Hat® OpenShift Container Platform cluster.

This course is based on Red Hat® Enterprise Linux 7.5 and OpenShift Container Platform 3.9.

Like members of many organizations, you may be interested in or are already employing microservice architectures. We have introduced solutions to ease the on-ramp for the creation and deployment of microservices through its developer programs and Red Hat® OpenShift Application Runtimes.

Course summary

  • Deploy microservices with WildFly Swarm.
  • Deploy microservices with Vert.x.
  • Deploy microservices with Spring Boot.
  • Develop an API gateway.
  • Implement fault tolerance with Hystrix.

Audience for this course

  • Java application developers interested in employing microservices architectures
  • Software architects interested in creating and deploying microservices

Prerequisites for this course

Red Hat recommends these prerequisites: