CL210VT – Red Hat OpenStack Administration II: Day 2 Operation[...]

Course description

Build advanced skills for performing Red Hat OpenStack Platform day 2 operations and management of hybrid cloud infrastructure

Red Hat OpenStack Administration II: Day 2 Operations for Cloud Operators (CL210) is designed for cloud operators, service administrators, and automation engineers who operate and manage a full-featured hybrid and private cloud-computing environment using Red Hat OpenStack Platform. You will learn how to manage, monitor, troubleshoot, and scale a Red Hat OpenStack Platform infrastructure. This course focuses on using the OpenStack Client command-line user interface to configure metrics, policies, and architecture in order to support enterprise cloud applications and daily operations.

This course is based on Red Hat OpenStack version 16.1 and Red Hat Enterprise Linux version 8.2

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

  • Managing overcloud service containerization technology.
  • Providing metrics for performance tuning and governance.
  • Monitoring and troubleshooting Open Virtual Networking (OVN) network flow.
  • Configuring Identity service using an external Red Hat IdM store.
  • Managing the core control plane, including Pacemaker.
  • Customizing images, with techniques for multiple use cases.
  • Managing block and object storage back-ends.
  • Managing compute nodes, including tuning and hyperconverged.
  • Troubleshooting Red Hat OpenStack Platform.

Audience for this course

  • Cloud operators responsible for managing daily operations and automation.
  • Infrastructure architects interested in or responsible for maintaining a large-scale private or hybrid cloud.

Prerequisites for this course

Technology considerations

  • There are no current special requirements or technical considerations.
  • No BYOD support.
  • No Internet access required.

RH362VT – Red Hat Security: Identity Management and Authentica[...]

Provide help to secure, centralized identity management services to coordinate user authentication and authorization with client systems, network services, and Windows domains.

Course Description

Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.

Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.

  • Design an Identity Management topology for scale and resiliency.
  • Describe key technologies used by IdM, including SSSD, PAM, Kerberos, and PKI.
  • Install Identity Management (IdM) servers, replicas, and clients using Ansible Playbooks.
  • Manage IdM services, including integrated DNS and CA.
  • Configure and manage Kerberos authentication and secure services.
  • Configure and manage TLS certificates.
  • Create and manage a trust relationship with Microsoft Active Directory.
  • Configure to help secure user authentication, including two-factor authentication and single sign-on.
  • Configure and manage Sudo, HBAC, and RBAC policies.
  • Manage secrets, vaults, certificates, and keys.
  • Troubleshoot identity management.
  • Integrate Satellite 6 and Red Hat Ansible Automation Platform with IdM.
  • Configure IdM backup and recovery.

Audience for this course

  • Red Hat Certified System Engineers (RHCE) who wish to learn how to provision and configure centralized identity management solutions for Linux clients and how to integrate them with other network services and identity management systems.
    • Identity Management specialists or engineers
    • Access Management specialists or engineers

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • An RHCE certification or equivalent skill is a prerequisite to this course.

Technology considerations

  • There are no special requirements other than those needed for standard courses delivered in ILT/VT/ROLE/RHLS delivery modes.

RH415VT – Red Hat Security: Linux in Physical, Virtual, and Cl[...]

The „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) course is designed for security and system administration personnel who manage the secure operation of computer systems running Red Hat Enterprise Linux on physical hardware, as virtual machines, or as cloud instances both in private data centers and on public cloud platforms.

Course description

  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, as virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements, including the kernel’s Audit subsystem, AIDE, SELinux, OpenSCAP and SCAP Workbench, USBGuard, PAM authentication, and Network-Based Device Encryption. You will learn to monitor compliance and to proactively identify, prioritize, and resolve issues by using OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Automation Platform. You will have a basic introduction to how Red Hat Ansible Automation Platform automates the deployment of remediation to systems, by using Ansible Playbooks from OpenSCAP or Red Hat Insights.
  • This course is based on RHEL 9.2, Ansible Core 2.14, Red Hat Ansible Automation Platform 2.4, Satellite 6.14, and OpenSCAP 1.3.7.
  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
  • Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.
  • Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course summary

  • Manage compliance with OpenSCAP.
  • Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniques.
  • Proactively identify and resolve issues with Red Hat Insights.
  • Monitor activity and changes on a server with Linux Audit and AIDE.
  • Protect data from compromise with USBGuard and storage encryption.
  • Manage authentication controls with PAM.
  • Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues.
  • Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Automation Platform.

Target Audience

  • System Administrator – responsible for supporting the company’s physical and virtual infrastructure, systems, and servers
  • IT Security Practitioner / Compliance & Auditor – responsible for ensuring the technology environment is protected from attacks and is in compliance with security/privacy rules and regulations.
  • Automation Architect – Engineer or architect responsible for the company’s automation development and optimizing cloud tools and infrastructure to achieve automation goals.

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • Red Hat Certified Engineer (EX294 / RHCE) certification or equivalent Red Hat Enterprise Linux knowledge and experience.

Technology considerations

  • If the instructor intends to demonstrate Red Hat Insights, internet access and appropriate entitlements are required.

CL110VT – Red Hat OpenStack Administration I: Core Operations [...]

Course description

Learn to operate a Red Hat® OpenStack Platform private cloud and manage domain resources to secure and deploy modern, scalable cloud applications, networks and storage

Red Hat OpenStack Administration I: Core Operations for Domain Operators (CL110) teaches you how to operate and manage a production Red Hat OpenStack Platform (RHOSP) single-site overcloud. You will learn how to create secure project environments in which to provision resources and manage security privileges that cloud users need to deploy scalable cloud applications. You will learn about OpenShift integration with load balancers, identity management, monitoring, proxies, and storage. You will also develop more troubleshooting and Day 2 operations skills in this course.

This course is based on Red Hat OpenStack Platform 16.1.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

Students in the Red Hat OpenStack Administration I: Core Operations for Domain Operators (CL110) course will focus on performing both routine and specialized tasks that are necessary to manage a production OpenStack overcloud domain. Students will manage OpenStack using both web-based and command-line interfaces. Essential skills covered in the course include the following:

  • Launch instances to satisfy various use case examples.
  • Manage domains, projects, users, roles, and quota in a multitenant environment.
  • Manage networks, subnets, routers, and floating IP addresses.
  • Manage instance security with group rules and access keys.
  • Create and manage block, object and shared storage within OpenStack.
  • Perform instance launch customization with cloud-init.
  • Deploy scalable applications using stack templates.

Audience for this course

This course is designed for cloud users who deploy application instances and stacks, domain operators who manage resources and security for cloud users, and any other cloud personnel interested in, or responsible for, maintaining applications on private or hybrid OpenStack clouds. Any cloud persona, or personnel with roles that include performing technology evaluation, should attend this course to learn RHOSP operation and application deployment methods.

Prerequisites for this course

RH436VT – Red Hat High Availability Clustering

Course description

Deploy reliable, available critical production services in a high availability cluster

In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities.

You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

This course is based on Red Hat Enterprise Linux 8.3.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

  • Install and configure a Pacemaker-based high availability cluster.
  • Create and manage highly available services.
  • Troubleshoot common cluster issues.
  • Work with shared storage (iSCSI) and configure multipathing.
  • Implement Logical Volume Manager (LVM) in cluster-aware configurations.
  • Configure GFS2 file systems on storage shared by multiple nodes.

Audience for this course

  • Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services.

Prerequisites for this course

Technology considerations 

  • Internet access is required.

RH415 – Red Hat Security: Linux in Physical, Virtual, and Clou[...]

The „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) course is designed for security and system administration personnel who manage the secure operation of computer systems running Red Hat Enterprise Linux on physical hardware, as virtual machines, or as cloud instances both in private data centers and on public cloud platforms.

Course description

  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, as virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements, including the kernel’s Audit subsystem, AIDE, SELinux, OpenSCAP and SCAP Workbench, USBGuard, PAM authentication, and Network-Based Device Encryption. You will learn to monitor compliance and to proactively identify, prioritize, and resolve issues by using OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Automation Platform. You will have a basic introduction to how Red Hat Ansible Automation Platform automates the deployment of remediation to systems, by using Ansible Playbooks from OpenSCAP or Red Hat Insights.
  • This course is based on RHEL 9.2, Ansible Core 2.14, Red Hat Ansible Automation Platform 2.4, Satellite 6.14, and OpenSCAP 1.3.7.
  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
  • Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment..

Course summary

  • Manage compliance with OpenSCAP.
  • Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniques.
  • Proactively identify and resolve issues with Red Hat Insights.
  • Monitor activity and changes on a server with Linux Audit and AIDE.
  • Protect data from compromise with USBGuard and storage encryption.
  • Manage authentication controls with PAM.
  • Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues.
  • Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Automation Platform.

Target Audience

  • System Administrator – responsible for supporting the company’s physical and virtual infrastructure, systems, and servers
  • IT Security Practitioner / Compliance & Auditor – responsible for ensuring the technology environment is protected from attacks and is in compliance with security/privacy rules and regulations.
  • Automation Architect – Engineer or architect responsible for the company’s automation development and optimizing cloud tools and infrastructure to achieve automation goals.

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • Red Hat Certified Engineer (EX294 / RHCE) certification or equivalent Red Hat Enterprise Linux knowledge and experience.

Technology considerations

  • If the instructor intends to demonstrate Red Hat Insights, internet access and appropriate entitlements are required.

RH436 – Red Hat High Availability Clustering

Course description

Deploy reliable, available critical production services in a high availability cluster

In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities.

You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

This course is based on Red Hat Enterprise Linux 8.3.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

  • Install and configure a Pacemaker-based high availability cluster.
  • Create and manage highly available services.
  • Troubleshoot common cluster issues.
  • Work with shared storage (iSCSI) and configure multipathing.
  • Implement Logical Volume Manager (LVM) in cluster-aware configurations.
  • Configure GFS2 file systems on storage shared by multiple nodes.

Audience for this course

  • Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services.

Prerequisites for this course

Technology considerations 

  • Internet access is required.

RH362 – Red Hat Security: Identity Management and Active Direc[...]

Provide help to secure, centralized identity management services to coordinate user authentication and authorization with client systems, network services, and Windows domains.

Course Description

Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.

Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.

Course Content Summary

  • Design an Identity Management topology for scale and resiliency.
  • Describe key technologies used by IdM, including SSSD, PAM, Kerberos, and PKI.
  • Install Identity Management (IdM) servers, replicas, and clients using Ansible Playbooks.
  • Manage IdM services, including integrated DNS and CA.
  • Configure and manage Kerberos authentication and secure services.
  • Configure and manage TLS certificates.
  • Create and manage a trust relationship with Microsoft Active Directory.
  • Configure to help secure user authentication, including two-factor authentication and single sign-on.
  • Configure and manage Sudo, HBAC, and RBAC policies.
  • Manage secrets, vaults, certificates, and keys.
  • Troubleshoot identity management.
  • Integrate Satellite 6 and Red Hat Ansible Automation Platform with IdM.
  • Configure IdM backup and recovery.

Audience for this course

  • Red Hat Certified System Engineers (RHCE) who wish to learn how to provision and configure centralized identity management solutions for Linux clients and how to integrate them with other network services and identity management systems.
    • Identity Management specialists or engineers
    • Access Management specialists or engineers

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • An RHCE certification or equivalent skill is a prerequisite to this course.

Technology considerations

  • There are no special requirements other than those needed for standard courses delivered in ILT/VT/ROLE/RHLS delivery modes.

RH342 – Red Hat Enterprise Linux Diagnostics and Troubleshooti[...]

Course description

Diagnose problems, gather information, and fix common issues with Red Hat Enterprise Linux

The Red Hat Enterprise Linux Diagnostics and Troubleshooting course (RH342) provides system administrators with the tools and techniques they need to successfully diagnose, and fix, a variety of potential issues. Students will work through hands-on problems in various subsystems to diagnose and fix common issues.

Students will learn how to apply the scientific method to a structured form of troubleshooting. This approach is then used troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course students can complete various comprehensive review labs to test their skills.

This course is based on Red Hat Enterprise Linux 8.4.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

  • Use the scientific method to approach troubleshooting
  • Troubleshoot boot issues
  • Troubleshoot security issues
  • Troubleshoot storage issues
  • Troubleshoot network issues

Audience for this course

The Red Hat Enterprise Linux Diagnostics and Troubleshooting course is aimed at senior system administrators who wish to learn more about troubleshooting.

Prerequisites for this course

Red Hat recommends these prerequisites:

DO417VT – Microsoft Windows Automation with Red Hat Ansible

Overview

Course description

Learn how to automate administration on Windows Server to enable your DevOps workflow

Microsoft Windows Automation with Red Hat Ansible (DO417) is designed for Windows Server professionals without previous Ansible® experience. You will use Ansible to write automation playbooks for Microsoft Windows systems to perform common system administration tasks reproducibly at scale. You will also learn to use Red Hat® Ansible Tower to securely manage and run your Ansible playbooks from a central web-based user interface.

This course is based on Red Hat Ansible Engine 2.8, Red Hat Ansible Tower 3.5, and Windows Server 2016 and 2019.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.

Course content summary

  • Configure Microsoft Windows systems to be managed with Ansible.
  • Create and manage inventories of managed hosts and provide credentials to manage them to Red Hat Ansible Tower.
  • Write Ansible playbooks to consistently automate multiple tasks and apply them to managed hosts.
  • Run individual ad hoc automation tasks and complex playbooks from Red Hat Ansible Tower.
  • Create survey forms in Red Hat Ansible Tower to simplify playbook operation.
  • Parameterize playbooks using variables and facts.
  • Write and reuse existing Ansible roles to simplify playbook creation and reuse code.
  • Leverage existing PowerShell DSC code to extend the power of Ansible automation.
  • Automate common Windows Server system administration tasks using Ansible.

Audience for this course

Windows Server administrators interested in automating management tasks and in using automation tools to implement their DevOps workflow.

Prerequisites for this course

You are expected to have experience as Windows Server administrators, but no previous experience with Red Hat Ansible Automation or Linux® is required.

Technical requirements

  • This class will require internet access.
  • You will be expected to “bring your own device” (BYOD).
  • Your device must be installed with a Remote Desktop Protocol (RDP).
    • If you are running Microsoft Windows, you should have Microsoft Remote Desktop installed.
    • If you are running macOS, you will need to install Microsoft Remote Desktop for Mac (by Microsoft) from the App Store.
    • If you are running Linux, you may install Remmina from their distribution (if available) or following instructions at https://remmina.org (if not).  If they prefer, they may instead install the FreeRDP clients from their Linux distribution (in the freerdp package in Red Hat Enterprise Linux).