+ All Categories
Home > Documents > Job Guaranteed Master Program - Radical Technologies

Job Guaranteed Master Program - Radical Technologies

Date post: 12-Mar-2022
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
51
Placement Guaranteed Master Program - Integrated with International PG program from UK Mode Of Training – Online / Classroom Acquire Knowledge of 5+ year experienced IT Infrastructure System and Cloud Administrator Job Guaranteed Master Program IT IMS - Linux Cloud and Devops This program is integrated with International PG Diploma Certificate Program IT – IMS Cloud and Devops - Awarded by OTHM - UK, Ofqual Approved UK Qualification provider (https://www.gov.uk/government/organisations/ofqual) This program consists of Practical in-depth learning of Operating system, Virtualization, All Cloud technologies – AWS, AZURE and GCP, automa- tion using DevOps tools, Clustering, Public Cloud, Private Cloud, Storage area Network and Core system networking, Backup and Recover, Data Centre and Application Migrations, Data Centre Management etc. Program include 300 core System Admin activities, 120 + Cloud activi- ties, complete automation using DevOps Tools. 10 DevOps Projects, 400 + Assignments and 100 hours of Mock interview session. You will acquire a knowledge of 5+ year experienced System / Cloud and DevOps Engi- neer. This program is good for freshers and up to 3 - 4 years of industry experi- enced professional. Those who have career gap www.radicaltechnologies.co.in
Transcript

Placement Guaranteed

Master Program - Integrated with

International PG program from UK

Mode Of Training –

Online / Classroom

Acquire Knowledge of

5+ year experienced IT Infrastructure System and Cloud Administrator

Job Guaranteed Master Program IT IMS - Linux Cloud and Devops

This program is integrated with International PG Diploma Certificate Program IT – IMS Cloud and Devops - Awarded by OTHM - UK, Ofqual

Approved UK Qualification provider (https://www.gov.uk/government/organisations/ofqual)

This program consists of Practical in-depth learning of Operating system, Virtualization, All Cloud technologies – AWS, AZURE and GCP, automa-

tion using DevOps tools, Clustering, Public Cloud, Private Cloud, Storage area Network and Core system networking, Backup and Recover,

Data Centre and Application Migrations, Data Centre Management etc.

Program include 300 core System Admin activities, 120 + Cloud activi-ties, complete automation using DevOps Tools. 10 DevOps Projects, 400 + Assignments and 100 hours of Mock interview session. You will acquire a knowledge of 5+ year experienced System / Cloud and DevOps Engi-

neer.

This program is good for freshers and up to 3 - 4 years of industry experi-enced professional. Those who have career gap

www.radicaltechnologies.co.in

1 Global Certification is Free along with this course . All materials are giving free along with this course .

Certificates : RCITP after 6 months and International PG Diploma certificate in IT – IMS Cloud and Devops -OTHM UK After 1 year of successful comple-tion of the course. You have to undergo multiple assignments to achieve the International PG Diploma. After successful completion of the course, there will be 12 online assessments on topics covered during the course . PG Diploma is awarded directly by OTHM

Red Hat Linux 7/8 – SA1, SA2 and SA3. Automation with ansible, Devops –Complete Life Cycle, Virtualization – VMWARE, Public Cloud – IaaS AWS | Azure and GCP | Private Cloud – Openstack, Openshift – Docker, Contain-ers and Kubernetes. SAN, NetBackup, VCS, VXVM – High availability Clus-tering, Shell Scripting, Redhat Virtualization, Open Source- Docker & Kuber-netes, AWS-Docker & Kubernetes, Azure-Docker & Kubernetes, GCP-Docker & Kubernetes

Red Hat Linux 7/8 – SA1, SA2 and SA3. Automation with ansible, AWS Cloud, Devops – Complete Life Cycle VMware, AZURE, SAN, NetBackup, VCS, VXVM – High availability Clustering , Private Cloud – Openstack, Red hat Virtualization, Networking, OpenShift – Containers, Kubernetes and Docker, GCP, Shell Scripting, Pythion Scripting and All Cloud Devops, CKA, CKAD

• 18000+ Students Empowered till now

• Online/Classroom/Self-Paced

Major courses

Overview of Courses covered

Program Highlight

SALARY :- Avg. salary of a System/Cloud/ Devops Engineer is goes up to 15 Lakhs per annum

www.radicaltechnologies.co.in 1

Project Driven industry mentorship in IT IMS , Cloud and Devops

Dedicated career support,

Learn 30 + IMS tools.

300 core System Admin activities

120 + Cloud activities

complete automation using DevOps Tools.

400 + Assignments

All Cloud Devops – Azure, AWS and GCP

100 hours of Mock interview session

Expertise in Infrastructure Management

• 12 months Intensive Training

• Triple Certification – Global Certification + RCITP After 6 months of Successful Completion of Masters + International PG Diploma From UK after 1 Year

• Start Date - Every Month One Batch ( Per Batch 25 Students )

• 400+ Hiring Partners

• Certified from OTHM–UK Recognised by ofqual.gov.uk

• Minimum 5 Interview Call and until you get Job

• What you get After the Training - Gain Knowledge of At least 3+ Year Experienced Professional

About the Program

www.radicaltechnologies.co.in 2

Redhat Linux, AWS, Devops, VMWARE, AZURE, Openstack, Openshift, GCP, All Cloud Devops

System Administrator, Linux Cloud Engineer, Devops Engineer, Cloud Ad-ministrator, Our students placed in various packages in MNC’s Ranging from 5 Lakhs to 25 Lakhs. Experience Level from freshers to 18+ Year expe-rienced candidates

Engineers, Freshers, Domain Experts, Software & IT Professionals , Those who having career gap, Candidates, those who are not interested in Pro-gramming. • Engineering/Management Graduate or Post-graduate Fresher Students who want to make their career in IT Infrastructure Management Field. Those who hate programming .• Engineers who want to Become System Admin, Technical Architect, System Engineer, Cloud Engineer, Devops Engineer• System Admins who are interested in Data Centre Setup and Migration and Troubleshooting

• Designed for Freshers to Working Professionals• 30 + Tools • Learn 30 + IMS tools. • 300 core System Admin activities • 120 + Cloud activities • complete automation using DevOps Tools. • 400 + Assignments • 360 Degree Career Support• One-on-One with Industry Mentors• Dedicated Student Mentor• Job Assistance with Top Firms• 0 % EMI - No Cost EMI Option

Program Key Highlights

Top Skills You Will Learn

Job Opportunities

Target audience?

www.radicaltechnologies.co.in 3

• Cloud Admins who would like to become Cloud Infra Architect.• MBA Graduates or business professionals who are looking to move to a heavily quantitative role.• Engineering Graduate/Professionals who want to be in IT Infrastructure Management Administrator field • Working Professional or Fresh Graduate who have mostly worked in Op-erating system, Virtualization, Cloud Technology etc• Professionals who’ve worked mostly with Linux, Cloud, Windows, Virtu-alization, Automation etc

Any Bachelor’s degree. Completed or not completed. No coding experi-ence required. If you have any Educational Gap or any other career gap, you can do this program to boost up your career. The qualifications provid-ed by UK Regulatory board is equal to Level 7 Masters Degree in UK.

Minimum Eligibility

Technology Covered

www.radicaltechnologies.co.in 4

• Short Term Job Guaranteed Program• Minimum 5 Interview Calls .And Continued until you get the JOB• RHCSA, RHCE, AWS Solution Architect, GCP, AZURE, Certification Prepa-ration• Industrial Job Oriented Assignments, Industry Scenarios, which make you perfect in Subject • Gain Knowledge of 5 + Years in IT Infrastructure System and Cloud Ad-ministration• Designed for Freshers to Working Professionals• 30 + Tools • Learn 30 + IMS tools. • 300 core System Admin activities • 120 + Cloud activities • complete automation using DevOps ToolsSSSSS. • 400 + Assignments • 360 Degree Career Support• One-on-One with Industry Mentors• Dedicated Student Mentor• Job Assistance with Top Firms• 0 % EMI - No Cost EMI Option

1. Who Should do this courseAudience :- Freshers, Any Graduate, 2 to 4 Years Experienced up skilling enthusiasts. 3rd Year Graduates who are going to attend campus Inter-views. These courses designed in a way to be suitable for all branches of Engineering and all type of graduates – Science and non-science Gradu-ates. Option to customise the subject according to the interest of candi-date is also available

2. How many Interview Calls You will provideMinimum 5 Interview Calls and Maximum, until you get the JOB

3. Do I get Refund , if I am not interested to continuedYes. you should inform the Administrator and send email to PG @radicaltechnologies.co.in to cancel your admission within 7 days of the

Key Benefit From This Program

Frequently Asked Questions

www.radicaltechnologies.co.in 4

enrolment. Once we allocate the trainer and further proceedings, we will not be able to refund.

4. How I will get Industry knowledgeAll our programs are developed by Industry person, who is having 10+ years real working knowledge. Under their mentorship, you will be able to gain at least 5+ year experience

5. Is this is 100% Job Guarantee program ? And how is the Salary Struc-tureYes, it’s a 100% JOB Guaranteed program. Minimum salary Package of 5 Lakhs per annum for the right candidate.

6. Is there any limitation on number of Interview calls providing No, You will get calls until you get placed

7. How many people got placed as part of this program We have placement record of over 6000+

Full Course Curriculum

www.radicaltechnologies.co.in 5

Get started with Red Hat Enterprise LinuxDescribe and define open source, Linux distributions, and Red Hat En-terprise Linux.Access the command lineLog into a Linux system and run simple commands using the shell.Manage files from the command lineCopy, move, create, delete, and or-ganize files while working from the bash shell.Get help in Red Hat Enterprise LinuxResolve problems by using local help systems.Create, view, and edit text filesManage text files from command output or in a text editor.Manage local users and groupsCreate, manage, and delete local users and groups, as well as admin-ister local password policies.Control access to filesSet Linux file system permissions on files and interpret the security ef-fects of different permission set-tings.Monitor and manage Linux pro

cessesEvaluate and control processes running on a Red Hat Enterprise Linux system.Control services and daemonsControl and monitor network ser-vices and system daemons using systemd.Configure and secure SSHConfigure secure command line service on remote systems, using OpenSSH.Analyze and store logsLocate and accurately interpret logs of system events for trouble-shooting purposes.Manage networkingConfigure network interfaces and settings on Red Hat Enterprise Linux servers.Archive and transfer filesArchive and copy files from one system to another.Install and update softwareDownload, install, update, and manage software packages from Red Hat and yum package reposi-tories.Access Linux files systemsAccess, inspect, and use existing file systems on storage attached to a Linux server.Analyze servers and get support

1.1 Red Hat System Administration I (RH124)

1 ) Redhat Linux RHEL V8 – SA1 | SA2 | SA3

Mode of Training :- Classroom OR Online

www.radicaltechnologies.co.in 6

Investigate and resolve issues in the web-based management inter-face, getting support from Red Hat to help solve problems.Comprehensive reviewReview the content covered in this course by completing hands-on ex-ercises.

es, partitions, file systems, and swap spaces from the command line.Manage logical volumesCreate and manage logical vol-umes containing file systems and swap spaces from the command line.Implement advanced storage fea-turesManage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.Access network-attached storageUse the NFS protocol to administer network-attached storage.Control the boot processManage the boot process to con-trol services offered and to trouble-shoot and repair problems.Manage network securityControl network connections to services using the system firewall and SELinux rules.Install Red Hat Enterprise LinuxInstall Red Hat Enterprise Linux on servers and virtual machines

Introduce AnsibleDescribe Ansible concepts and in-stall Red Hat Ansible Engine.Deploy AnsibleConfigure Ansible to manage hosts and run ad hoc Ansible commands.

Improve command line productivi-tyRun commands more efficiently by using advanced features of the bash shell, shell scripts, and various utilities provided by Red Hat Enter-prise Linux.Schedule future tasksSchedule commands to run in the future, either one time or on a re-peating schedule.Tune system performanceImprove system performance by setting tuning parameters and ad-justing scheduling priority of pro-cesses.Control access to files with ACLsInterpret and set access control lists (ACLs) on files to handle situa-tions requiring complex user and group access permissions.Manage SELinux securityProtect and manage the security of a server by using SELinux.Maintain basic storageCreate and manage storage devic

1.2 Red Hat System Administration II (RH134)

1.3 Red Hat System Administration III: Linux Automation with Ansible

(RH294)

www.radicaltechnologies.co.in 7

Implement playbooksWrite a simple Ansible Playbook and run it to automate tasks on multiple managed hosts.Manage variables and factsWrite playbooks that use variables to simplify management of the play-book and facts to reference information about managed hosts.Implement task controlManage task control, handlers, and task errors in Ansible Playbooks.Deploy files to managed hostsDeploy, manage, and adjust files on hosts managed by Ansible.Manage large projectsWrite playbooks that are optimized for larger, more complex projects.Simplify playbooks with rolesUse Ansible roles to develop playbooks more quickly and to reuse Ansible code.Troubleshoot AnsibleTroubleshoot playbooks and managed hosts.Automate Linux administration tasksAutomate common Linux system administration tasks with Ansible.

www.radicaltechnologies.co.in 8

Course IntroductionAbout the Training ArchitectWorking as a Solutions ArchitectCreating an AWS Account, AWS Free Tier, Usage Tracking, and Bill-ing Widget

Access ManagementShared Responsibility/Security ModelService ModelsHigh Availability vs. Fault ToleranceRPO vs. RTOScalingTiered Application DesignEncryptionArchitecture Odds and EndsArchitecture 101

AWS AccountsAWS Physical and Networking LayerWell-Architected FrameworkElasticityAWS Architecture 101

Console Tour and NavigationIntroduction to S3

Getting Started with CloudForma-tionAWS Product Fundamentals

Introduction to CloudFormationHands-on Labs

IAM EssentialsIAM PoliciesIAM UsersIAM GroupsIAM Access KeysSecuring Your Account — Creating an IAM User and Setting Up the CLIIAM RolesIAM Essentials

AWS OrganizationsRole Switching Between AccountsMulti-Account Management and Organizations

EC2 Architecture: Part 1EC2 Architecture: Part 2Instance Types and SizesEC2 Storage Architecture: Part 1

2 AWS Certified Solutions Architect – Associate

2.2 Architecture

2.3 AWS Architecture

2.5 IAM (Identity and Access Management)

2.6 Multi-Account Management & Organizations

2.7 Server-Based Compute (EC2) Fundamentals

2.4 AWS Product Fundamentals

www.radicaltechnologies.co.in 9

2.1 Getting Started

EC2 Storage Architecture: Part 2EBS SnapshotsSecurity GroupsInstance MetadataHands-on Labs Creating and Working with an EC2

InstanceServer-Based Compute (EC2) Fun-damentals

Server-Based Compute (EC2) Ad-vanced

What Are APIs and Microservices?Serverless and Event-Driven Archi-tecturesLambda Essentials: Part 1Lambda Essentials: Part 2

API Gateway Essentials: Part 1API Gateway Essentials: Part 2Step FunctionsServerless Compute (Lambda)

Docker EssentialsECSContainer-Based Compute and Mi-croservices

IntroductionSeven-Layer OSI Model: Part 1Seven-Layer OSI Model: Part 2IP Addressing BasicsSubnettingIP RoutingFirewallsProxy ServersNetworking Fundamentals

Virtual Private Cloud (VPC) and Subnets: Part 1Virtual Private Cloud (VPC) and Subnets: Part 2Routing and Internet GatewayBastion Host/JumpBoxNAT, NAT Instance, and NAT Gate-way: Part 1NAT, NAT Instance, and NAT Gate-way: Part 2Network ACLsHands-on Labs Designing and Building a Custom VPC from ScratchVirtual Private Cloud (VPC)

AMIBootstrapInstance ENI, IP, and DNS: Part 1Instance ENI, IP, and DNS: Part 2Instance RolesServer-Based Compute (EC2) Inter-mediateUsing EC2 Roles and Instance Pro-filesUsing AWS Tags and Resource Groups

EBS Volume and Snapshot Encryp-tionEBS Optimization, Enhanced Net-working, and Placement GroupsEC2 Billing Models: Part 1 – Spot and Spot FleetEC2 Billing Models: Part 2 – Re-served InstancesDedicated Hosts

2.8 Server-Based Compute (EC2) Intermediate

2.13 Virtual Private Cloud (VPC)

2.9 Server-Based Compute (EC2) Advanced

2.10 Serverless Compute (Lambda)

2.11 Container-Based Compute & Microservices

2.12 Networking Fundamentals

www.radicaltechnologies.co.in 10

DNS 101Domain RegistrationPrivate vs. Public Hosted ZonesRecord Set TypesHealth ChecksGlobal DNS (Route 53) Fundamen-tals

Routing Policy: SimpleRouting Policy: FailoverRouting Policy: WeightedRouting Policy: LatencyRouting Policy: GeolocationGlobal DNS (Route 53) Advanced

PermissionsTransferring Data to S3EncryptionStatic Websites and CORSObject VersioningPresigned URLsHands-on Labs

Creating a Static Website Using Amazon S3

Storage Tiers/ClassesLifecycle Policies & Intelligent-TieringCross-Region Replication (CRR)

CloudFront Architecture: Part 1CloudFront Architecture: Part 2OAI

EFS Fundamentals: Part 1EFS Fundamentals: Part 2Storage and Content Delivery

RDS Essentials: Part 1RDS Essentials: Part 2RDS Backups and RestoreRDS Resiliency: Multi-AZRDS Read ReplicasDatabase Fundamentals and SQL — RDS

Aurora Essentials: Part 1Aurora Essentials: Part 2Parallel Queries and Aurora GlobalAurora Serverless Essentials: Part 1Aurora Serverless Essentials: Part 2SQL — Aurora

Database Models

VPC Peering: Part 1VPC Peering: Part 2VPC Endpoints: Part 1VPC Endpoints: Part 2IPv6 within AWSEgress-Only GatewayHands-on Labs Implementing VPC Peering on AWSAdvanced VPC

2.19 Cloud Front

2.20 Network File Systems

2.21 Database Fundamentals

2.22 SQL — RDS

2.23 SQL — Aurora

2.14 Advanced VPC

2.15 Global DNS (Route 53) Fundamentals

2.16 Global DNS (Route 53) Advanced

2.17 S3 Architecture and Features

2.18 S3 Performance & Resilience

www.radicaltechnologies.co.in 11

Group and Application Load Bal-ancer in AWS

Simple Notification Service (SNS)Simple Queue Service (SQS): Part 1Simple Queue Service (SQS): Part 2Elastic TranscoderApplication Integration

AthenaElastic MapReduce (EMR)Kinesis and FirehoseRedshiftAnalytics

DynamoDB Essentials: Part 1 — Tables and ItemsDynamoDB Essentials: Part 2 — Query and ScanDynamoDB Essentials: Part 3DynamoDB Performance and Bill-ingDynamoDB Streams and TriggersDynamoDB Indexes: Part 1 — LSIDynamoDB Indexes: Part 2 — GSINoSQL

VPC VPN (IPsec)Direct Connect ArchitectureWhen to Pick Direct Connect vs. VPN

VPC VPN (IPsec)Direct Connect ArchitectureWhen to Pick Direct Connect vs. VPN

Snowball, Snowball Edge, and Snowmobile

DAXElastiCacheIn-Memory Caching

Load Balancing FundamentalsClassic Load Balancers and Health Checks: Part 1Classic Load Balancers and Health Checks: Part 2Classic Load Balancers and Health Checks: Part 3Application Load Balancers: Part 1Application Load Balancers: Part 2Network Load BalancersLaunch Templates and Configura-tionsAuto Scaling Groups: Part 1Auto Scaling Groups: Part 2Hands-on LabsImplementing an Auto Scaling

2.27 VPN and Direct Connect

2.28 VPN & Direct Connect

2.29 Snow

Storage Gateway 101Database Migration Service 101

What Is Identity Federation?When to Use Identity FederationHybrid and Scaling

2.30 Data and DB Migration

2.31 Identity Federation and SSO

2.32 Application Integration

2.24 NoSQL

2.25 In-Memory Caching

2.33 Analytics

2.26 Load Balancing & Auto Scaling

www.radicaltechnologies.co.in 12

How to Prepare for the Real ExamAWS Solutions Architect Associate (SAAC01) – Final Practice Exam

This course can help prepare you for a certification exam.Earn a Certificate of CompletionWhen you complete this course, you’ll receive a certificate of completion as proof

CloudWatchCloudWatch LogsCloudTrailVPC Flow LogsHands-on LabsCustom Logging Using CloudWatch and CloudWatch LogsHands-on Labs Working with AWS VPC Flow Logs for Network MonitoringLogging and Monitoring

CloudWatch EventsKMS Essentials: Part 1KMS Essentials: Part 2

Elastic BeanstalkOpsWorksOperations and Deployment

2.37 The Exam

2.38 Course Features

2.34 Logging & Monitoring

2.35 Operations

2.36 Deployment

www.radicaltechnologies.co.in 13

This module gives an introduction to DevOps principles and objec-tives. You will gain complete knowl-edge on how to use DevOps frameworks and implement DevOps on the cloud.

Tools:• Jenkins

• Chef• Docker• Vagrant• NagiosCI/CD :• Continuous Testing and Integra-tion• Continuous Release and Deploy-ment• Continuous Application Monitor-ing

In this section, you’ll master the fundamentals of the Linux Operat-ing system and system administra-tion. • Basics of linux operating system• Introduction linux system admin-istration

• What is DevOps.• Basics of DevOps• DevOps Principles• Benefits of DevOps• DevOps SDLC• DevOps objectives• DevOps on Cloud• Devops Frameworks

3.1 Introduction to Devops

3.2 Introduction to Linux

The cloud computing module of DevOps provides comprehensive knowledge of cloud service models and cloud deployment models. Also, you will be taught how to launch a virtual machine with AWS. Cloud Computing Concepts:• Evolution of cloud• Grid Computing vs. Cloud Com-puting• Characteristics and Benefits of Cloud• Cloud service models (NIST)• IaaS, PaaS, and SaaS• Cloud service model implemen-tations• Cloud Deployment Models (NIST)Virtualization Concepts:• Virtual Machines• Virtual bootable OS Images• Cloud Storage

3.4 Cloud Computing & Virtualization

Continuous integration/Continuous deployment is the backbone bone of successful DevOps practice. This section will walk you through the fundamentals of CI/CD and devel-ops skills to work with DevOps tools through hands-on exercises.

3.3 Continuous Integration Tools

3 DEVOPS

www.radicaltechnologies.co.in 14

The cloud computing module of DevOps provides comprehensive knowledge of cloud service models and cloud deployment models. Also, you will be taught how to launch a virtual machine with AWS. Cloud Computing Concepts:• Evolution of cloud• Grid Computing vs. Cloud Com-puting• Characteristics and Benefits of Cloud• Cloud service models (NIST)• IaaS, PaaS, and SaaS• Cloud service model implemen-tations• Cloud Deployment Models (NIST)Virtualization Concepts:• Virtual Machines• Virtual bootable OS Images• Cloud Storage• SOA and Cloud• Virtual Private Cloud (VPC)• Risk in Cloud and DevOps securi-ty concerns

• SOA and Cloud• Virtual Private Cloud (VPC)• Risk in Cloud and DevOps securi-ty concerns• Introduction to AWS and AZURE

figuration, workstation setup, orga-nization setup, how to create data bags, create and add roles to the organization. Advanced chef con-cepts like Foodcritic, Test Kitchen Chef, etc., are also covered in this section.

In this section, you’ll gain a detailed overview of chef terminology, con

CRITERIA• Things to Look For and Avoid• IT Assets Ownership• Viewing Applications As Prod

ucts, not Projects• DevOps in the Enterprise• IT Governance• Governance and Risk Mitigation• DevOps Adoption Steps• Select DevOps Techniques and Practices• Service Quality Metrics TOOLS• The Choice of Cloud Platform• DevOps IaaS and PaaS• Containerization Tools• System Configuration Automa-tion and Management• Continuous Integration (CI) Sys-tems• Build and Dependency Manage-ment Systems• Select DevOps Tools• Collaborative Lifecycle Manage-ment Solutions from IBM• Rational Team Concert (RTC)• Rational Quality Manager (RQM)• Rational DOORS Next Genera-tion (DNG)

3.5 Devops adoption

3.6 Chef

www.radicaltechnologies.co.in 15

3.7 PUPPET

3.8 VAGRANT

Overview of Chef• Common Chef Terminology (Server, Workstation, Client, Re-pository, etc.)• Servers and Nodes• Chef Configuration ConceptsWorkstation Setup• How to configure knife• Execute some commands to test the connection between knife and workstationOrganization Setup• Create an organization• Add yourself and node to orga-nizationTest Node Setup• Create a server and add to the organization• Check node details using a knifeDatabags• How to create Databags• Add Databags to organization• Node Objects and Search• How to Add Run list to Node• Check node DetailsEnvironments• How to create Environments• Add servers to environmentsRoles• Create roles• Add Roles to organizationAdvanced Chef• Foodcritic• Test Kitchen Chef• Improve and expand on the ex-isting recipes• One-click system launching

In this module, you’ll learn how to deploy the Puppet configuration management tool through hands-on exercises. By the end of this module, you’ll become profi-cient at automating the entire workflow using Puppet.Introduction to Puppet• Installation and Configuration of Master server and agents• Managing ManifestsCreating and Managing modulesVersion control with Puppet

In this module, you will learn to in-stall and configure Vagrant. Addi-tionally, understand how to create a small VirtualBox using Vagrant and add images.Introduction• What is Vagrant• Working with Vagrant environ-mentInstallation and Configuration• How to install Vagrant in Win-dows and Linux• Configure VagrantProvisioning with Vagrant• How to use Vagrant to create a small Virtualbox.• Add required Images to VagrantUsing Vagrant• Using Vagrant in Chef for Test-ing

www.radicaltechnologies.co.in 16

3.9 Source Code Management - GIT & Nexus

3.10 JENKINS

3.11 Monitoring tools - Nagois & Zenoss

This section provides detailed knowledge about the source code management using Git and Nexus. You’ll master the core concepts and various operations performed on it through real-time examples.GIT REPOSITORY• What is a version control system?• What is a distributed version control system?• Installation• Different levels of Git configura-tion• The process of staging and com-mitting• The details of the commit ob-jectsNEXUS• Nexus prerequisites• Installing and Running Nexus• Using the Nexus User Interface

This module introduces Jenkins, the core concepts and technology behind Jenkins. You’ll learn how to build and automate test cases

In this section, you’ll learn how to monitor the servers, trigger alerts, how to apply and remove black-outs using both Nagios and Zenoss through hands-on practice.NAGIOS• How to monitor the Servers in Nagios• Trigger Alerts in Nagios• How to apply blackouts and remove blackoutsZENOSS

using Maven, install Jenkins plugins, and distributed builds with Jenkins.INTRODUCTION TO JENKINS-CI• Continuous Integration with Jen-kins Overview• Installation

• Configure Jenkins as a stand-alone application• Configure Jenkins on an Applica-tion Server• Jenkins management• Support for the Git version con-trol systems• Different types of Jenkins Jobs• Setting up a Jenkins job• Scheduling build Jobs• Maven Build ScriptsSecuring Jenkins• Authentication• Authorization• Confidentiality• Creating usersJenkins Plugin • Installing Jenkins Plugins• SCM plugin• Build and test• AnalyzersDistributed builds with JenkinsBest Practices for Jenkins

www.radicaltechnologies.co.in 17

3.12 Devops: Application Architecture

3.14 General environment setup steps in AWS & NTTA

This section deals with cloud services. You'll learn how to create servers and networks in the cloud, set up rules, and more through best practices.• Creating Servers and Networks in Cloud• Setting up rules and Application• Difficult Scenarios in environments.• Scaling• Environment testing

• How to monitor the Servers in Zenoss• Trigger Alerts in Zenoss• How to apply blackouts and remove blackouts• How to check events; CPU, Memory and RAM Graphs for servers

In this section, you’ll explore what DevOps architecture is and how it bene-fits your organization.• Web Forms• User Controls• Shared UI Code• Business Logic

3.13 Configuration Management

Configuration management plays a major role in DevOps in automating te-dious tasks. This section highlights configuration management processes, incident management, problem management, and change management.• Configuration Management Activity• Configuration Control• Incident Management• Change Management• Problem Management

www.radicaltechnologies.co.in 18

• Basic Concepts of virtualization to complete the VMware course.

nicate with vCenter Server• Use vSphere Client to manage the vCenter Server inventory

• Add data center, organizational objects, and hosts to vCenter Server• Create custom inventory tags• Describe the rules for applying permissions• Create a custom role in vCenter Server

• Describe the vCenter Server ar-chitecture• Discuss how ESXi hosts commu

• Create, provision, and remove a virtual machine• Explain the importance of VMware Tools™

4.4 Configuring and Managing Virtual Storage

4.5 Creating Virtual Machines

• Identify storage protocols and storage device types• Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage• Create and manage VMware vSphere® VMFS and NFS data stores• Explain how multi pathing works with iSCSI, NFS, and Fibre Channel storage• Identify the advantages of VMware vSAN™

4 VMWARE

4.1 Course Introduction

4.3 vCenter Server with Windows 2012 R2

• Describe how vSphere fits into the software defined data center and the cloud infrastructure• Explain how vSphere interacts with CPUs, memory, networks, and storage• Use vSphere Client to access and manage your vCenter Server system and ESXi host• Compare virtual machine hard-ware version 14 to other versions• Identify the virtual network adapters, and describe the en-hanced VMXNET3• Compare the types of virtual disk provisioning• Install and configure ESXi host settings• Identify the advantages of ESXi Quick Boot

4.2 Introduction to vSphere and the Software Defined Data Center

www.radicaltechnologies.co.in 19

• Describe how to import a virtual appliance OVF template

• Use templates and cloning to deploy new virtual machines• Modify and manage virtual ma

4.6 Virtual Machine Management

www.radicaltechnologies.co.in 20

EAM integration• Integrate vSphere Update Man-ager with vSphere DRS

chines• Create an instant clone of a vir-tual machine• Identify the types of content li-braries and how to deploy and use them• Add a hot-pluggable device• Dynamically increase the size of a virtual disk• Use customization specification files to customize a new virtual ma-chine• Perform vSphere vMotion and vSphere Storage vMotion migra-tions

• Describe the architecture, com-ponents, and capabilities of vSphere Update Manager• Use vSphere Update Manager to manage the patching of ESXi, virtual machines, and vApps• Examine the features and func-tions of vSphere Update Manager

4.7 vSphere Update Manager

4.8 vSphere HA, vSphere Fault Tolerance, & Protecting Data

• Explain the vSphere HA architec-ture• Configure and manage a vSphere HA cluster• Use vSphere HA advanced pa-rameters

• Enforce infrastructural or in-tra-app dependencies during failover• Describe vSphere HA heartbeat networks and datastore heartbeats• Examine the features and func-

4.9 vSphere DRS

• Describe the functions of a vSphere DRS cluster• Create a vSphere DRS cluster• View information about a vSphere DRS cluster• Configure virtual machine affini-ty, DRS groups, and VM-host affini-ty rules• Remove a host from a vSphere

• Review troubleshooting tools• Find important log files• Use vSphere Syslog Collector• ESXi core dump collector• Create and use alarms to report certain conditions or events• ESXi command line• ESXi / VM performance monitor-ing• Virtual Center server advance options• RV Tool deployment• ESXi and VC license manage-ment

4.10 vSphere Troubleshooting

• Discuss CPU and memory con-cepts in a virtualized environment

4.11 Resource Management & Monitoring

• CISCO UCS hardware demon-stration.• How to work with physical hard-ware with management console.

• Describe what over commitment of a resource means• Configure and manage resource pools

• Configure and Access vCenter Server Appliance with multiple De-ployment Scenarios.• Virtual Center Server link Mode• Create a vCenter Server Appli-ance backup schedule• Restore vCenter Server Appli-ance from a backup• Monitor vCenter Server Appli-ance

4.12 Virtual Center Server Appliance

4.13 VMware VSphere Migration 6.0 to 6.5 / 6.7

4.14 Difference between 6.0 / 6.5 / 6.7

4.15 Discussion on CV & Interview Preparation

4.16 Physical Hardware demonstration

www.radicaltechnologies.co.in 21

multiple subscriptions

- view Alerts in Azure Monitor logs- NOT: create Log Analytics query

Implement cloud infrastructure monitoring• monitor security• monitor performance- configure diagnostic settings on resources- create a performance baseline for resources- monitor for unused resources- monitor performance capacity- visualize diagnostics data using Azure Monitor• monitor health and availability o monitor networking- monitor service health• monitor cost- monitor spend- report on spend• configure advanced logging- implement and configure Azure Monitor insights, including App In-sights, Networks, Containers- configure a Log Analytics work-space• configure logging for workloads• initiate automated responses by using Action Groups• configure and manage ad-vanced alerts- collect alerts and metrics across

5.1 Implement & Monitor an Azure Infrastructure (50-55%)

• save a deployment as an Azure Resource Manager template

5.4 Automate deployment and & configuration of resources

• select storage account options based on a use case• configure Azure Files and blob storage• configure network access to the storage account• implement Shared Access Signa-tures and access policies• implement Azure AD authentica-tion for storage• manage access keys• implement Azure storage repli-cation• implement Azure storage ac-count failover

5.2 Implement storage accounts

• configure High Availability• configure storage for VMs• select virtual machine size• implement Azure Dedicated Hosts• deploy and configure scale sets• configure Azure Disk Encryption

5.3 Implement VMs for Windows & Linux

5 AZURE

www.radicaltechnologies.co.in 22

• modify Azure Resource Manager template• evaluate location of new re-sources• configure a virtual disk template• deploy from a template• manage a template library• create and execute an automa-tion runbook

• implement Azure Load Balancer• implement an application gate-way• implement a Web Application Firewall• implement Azure Firewall• implement the Azure Front Door

• implement VNet to VNet con-nections• implement VNet peering

5.5 Implement virtual networking

• add custom domains• configure Azure AD Identity Pro-tection• implement self-service pass-word reset• implement Conditional Access including MFA• configure user accounts for MFA• configure fraud alerts• configure bypass options• configure Trusted IPs• configure verification methods• implement and manage guest accounts• manage multiple directories

5.6 Implement Azure Active Directory

• install and configure Azure AD Connect• identity synchronization options• configure and manage password

sync and password writeback• configure single sign-on• use Azure AD Connect Health

5.7 Implement & manage hybrid identities

Manage workloads in Azure• migrate workloads using Azure Migrateo assess infrastructureo select a migration methodo prepare the on-premises for mi-grationo recommend target infrastructure• implement Azure Backup for VMs• implement disaster recovery• implement Azure Update Man-agement

5.8 Implement Management & Security Solutions (25-30%)

• install and configure Azure AD Connect• identity synchronization options• configure and manage password sync and password writeback• configure single sign-on• use Azure AD Connect Health

5.8 Implement Management & Security Solutions (25-30%)

www.radicaltechnologies.co.in 23

5.9 Implement load balancing & network security

Implement NoSQL databases• configure storage account tables• select appropriate CosmosDB APIs• set up replicas in CosmosDB

5.14 Implement & Manage Data Platforms (10-15%)Implement NoSQL

databases

5.15 Implement Azure SQL databases

• create and manage hierarchical structure that contains manage-ment groups, subscriptions and re-source groups• assign RBAC roles• create a custom RBAC role• configure access to Azure re-sources by assigning roles• configure management access to Azure• interpret effective permissions• set up and perform an access

Service• implement Azure Traffic Manag-er• implement Network Security Groups and Application Security Groups• implement Bastion

• create and configure Azure App Service• create an App Service Web App for Containers• create and configure an App Service plan• configure an App Service• configure networking for an App Service• create and manage deployment slots• implement Logic Apps• implement Azure Functions

• implement and configure Key-Vault• implement and configure Azure AD Managed Identities• register and manage applica-tions in Azure AD

5.11 Manage security for applications

Implement an application infra-structure

5.12 Implement Solutions for Apps (10-15%)

5.13 Implement container-based applications

review• implement and configure an Azure Policy• implement and configure an Azure Blueprint

• create a container image• configure Azure Kubernetes Ser-vice• publish and automate image de-ployment to the Azure Container Registry• publish a solution on an Azure Container Instanceo NOT: Service Fabric

www.radicaltechnologies.co.in 24

5.10 Implement and manage Azure governance solutions

Implement NoSQL databases• configure Azure SQL database settings• implement Azure SQL Database managed instances

• configure network access to the storage account• create and configure storage ac-count• generate Shared access signature• implement Azure AD authentica-tion for storage• install and use Azure Storage Ex

5.20 Create & configure storage accounts

5.16 Deploy & Configure Infrastructure

5.17 . Implement & Monitor an Azure Infrastructure (50-55%)

• configure diagnostic settings on resources• create baseline for resources• create and test alerts• analyze alerts across subscription• analyze metrics across subscrip-tion• create action groups• monitor for unused resources• monitor spend• report on spend• utilize Log Search query functions• view Alerts in Azure Monitor logs• visualize diagnostics data using Azure Monitor Workbooks

5.18Analyze resource utilization & consumption

• cmonitor security (Note: Log Ana-lytics, Azure Security Center, Azure Sentinel)• monitor performance• configure diagnostic settings on resources

• create a performance baseline for resources• monitor for unused resources• monitor performance capacity• visualize diagnostics data using Azure Monitor• monitor health and availability• monitor networking• monitor service health• monitor cost

5.19. Implement cloud infrastructure monitoring

• monitor spend• report on spend• configure advanced logging• implement and configure Azure Monitor insights, including App In-sights, Networks, Containers• configure a Log Analytics work-space• configure logging for workloads• initiate automated responses by using Action Groups• configure and manage advanced alerts• collect alerts and metrics across multiple subscriptions• view Alerts in Azure Monitor logs• NOT: create Log Analytics query

www.radicaltechnologies.co.in 25

plorer• manage access keys• monitor Activity log by using Azure Monitor logs • implement Azure storage replication• implement Azure storage account failover• configure HA for an Azure SQL database

• configure High Availability• configure storage for VMs• select virtual machine size• implement Azure Dedicated Hosts• deploy and configure scale sets• configure Azure Disk Encryption

5.24 Implement VMs for Windows and Linux

• create and configure Vnet peering• create and configure Vnet to Vnet connections• verify virtual network connectivity• create virtual network gateway

5.25 Create connectivity between virtual networks

• configure private IP addressing• configure public IP addresses• create and configure network routes• create and configure network in-terface• create and configure subnets• create and configure virtual net-work• create and configure Network Se-curity Groups and Application Se-curity Groups

5.26 Implement & manage virtual networking

• select storage account options based on a use case• configure Azure Files and blob storage• configure network access to the storage account• implement Shared Access Signa-tures and access policies• implement Azure AD authentica-tion for storage• manage access keys• implement Azure storage replica-tion• implement Azure storage account failover

5.21. Implement storage accounts

• configure High Availability• configure Monitoring• configure Networking• configure Storage• configure Virtual Machine Size• implement dedicated hosts• deploy and configure scale sets

5.22 Create and configure a VM for Windows & Linux

• modify Azure Resource Manager template• configure Location of new VMs• configure VHD template• deploy from template• save a deployment as an Azure

5.23 Automate deployment of VMs

Resource Manager template• deploy Windows and Linux VMs

www.radicaltechnologies.co.in 26

• add custom domains• configure Azure AD Identity Pro-tection• implement self-service password

reset• implement Conditional Access in-cluding MFA• configure user accounts for MFA• configure fraud alerts• configure bypass options• configure Trusted IPs• configure verification methods• implement and manage guest ac-counts• manage multiple directories

5.30 Implement Azure Active Directory

• install and configure Azure AD Connect• configure federation• configure single sign-on• manage and troubleshoot Azure AD Connect• troubleshoot password sync and writeback

5.31 Implement & manage hybrid identities

• install and configure Azure AD Connect• identity synchronization options• configure and manage password sync and password writeback

5.32 Implement & managehybrid identities

• save a deployment as an Azure Resource Manager template • modify Azure Resource Manager template• evaluate location of new resourc-es• configure a virtual disk template• deploy from a template• manage a template library• create and execute an automation runbook

5.27 Automate deployment & configuration of resources

• add custom domains• configure Azure AD Identity Pro-tection• configure Azure AD Join• configure self-service password reset• implement conditional access pol-icies• manage multiple directories• perform an access review

5.28Manage Azure Active Directory

• provision VMs• create Azure Resource Manager templates• configure Azure Disk Encryption

5.33 Implement solutions that use virtual machines (VM)

• implement VNet to VNet connec-tions• implement VNet peering

5.29 Implement virtual networking

• configure single sign-on• use Azure AD Connect Health

www.radicaltechnologies.co.in 27

• add custom domains• configure Azure AD Identity Pro-tection• implement self-service password reset• implement Conditional Access in-cluding MFA• configure user accounts for MFA• configure fraud alerts• configure bypass options• configure Trusted IPs

• add custom domains• configure Azure AD Identity Pro-tection• implement self-service password reset• implement Conditional Access in-cluding MFA• configure user accounts for MFA• configure fraud alerts• configure bypass options• configure Trusted IPs

5.30 Implement Azure Active Directory

• create and manage objects• manage a Logic App Resource• manage Azure Function app set-tings• manage Event Grid• manage Service Bus

5.36 Configure serverless computing

• configure application gateway• configure Azure Front Door ser-vice• configure Azure Traffic Manager

5.37 Implement application load balancing

for VMs• implement Azure Backup for VMs

• migrate servers using Azure Mi-grate• backup and restore data

5.34 Implement Workloads & Security (25-30%) Migrate servers to Azure

• create and configure Azure VPN Gateway• create and configure site to site VPN• configure ExpressRoute• configure Virtual WAN• verify on premises connectivity• troubleshoot on premises connec-tivity with Azure

5.38 Integrate on premises network with Azure virtual network

• migrate workloads using Azure Migrate• assess infrastructure• select a migration method• prepare the on-premises for mi-gration• recommend target infrastructure• implement Azure Backup for VMs• implement disaster recovery• implement Azure Update Man-agement

5.35 Implement Management & Security Solutions (25-30%)Manage workloads in Azure

www.radicaltechnologies.co.in 28

Groups• implement Bastion

• create and manage hierarchical structure that contains manage-ment groups, subscriptions and re-source groups• assign RBAC roles• create a custom RBAC role• configure access to Azure re-sources by assigning roles• configure management access to Azure• interpret effective permissions• set up and perform an access review

5.41. Implement & manage Azure governance solutions

• configure user accounts for MFA• configure fraud alerts • configure bypass options• configure Trusted IPs • configure verification methods

5.39 Implement multi factor authentication (MFA)

• implement Azure Load Balancer• implement an application gateway• implement a Web Application Firewall• implement Azure Firewall• implement the Azure Front Door Service• implement Azure Traffic Manager• implement Network Security Groups and Application Security

5.40. Implement load balancing & network security

www.radicaltechnologies.co.in 29

• publish a solution on an Azure Container Instance• NOT: Service Fabric

• implement and configure an Azure Policy• implement and configure an Azure Blueprint

Implement authentication• implement authentication by using certificates, forms-based au-thentication, tokens, or Win-dows-integrated authentication• implement multi-factor authenti-cation by using Azure AD• implement OAuth2 authentication• implement Managed Identities for Azure resources Service Principal authentication

5.47 Implement Authentication and Secure Data

• encrypt and decrypt data at rest and in transit• encrypt data with Always En-crypted• implement Azure Confidential Compute• implement SSL/TLS communica-tions• create, read, update, and delete keys, secrets, and certificates by

5.48 Implement secure data solutions

• create a custom role• configure access to Azure re-sources by assigning roles• configure management access to Azure• troubleshoot RBAC• implement RBAC Azure Policies• assign RBAC Roles

5.42 Manage role based access control (RBAC)

• implement and configure Key-Vault• implement and configure Azure AD Managed Identities• register and manage applications in Azure AD

• create and configure Azure App Service• create an App Service Web App for Containers• create and configure an App Service plan• configure an App Service• config-ure networking for an App Service• create and manage deployment slots• implement Logic Apps• implement Azure Functions

5.44 Implement Solutions for Apps

5.43 Manage security for applications

5.45 Implement an application infrastructure

• create a container image• configure Azure Kubernetes Ser-vice• publish and automate image de-ployment to the Azure Container Registry

5.46 Implement container-based applications

www.radicaltechnologies.co.in 30

using the KeyVault API

• configure storage account tables• select appropriate CosmosDB APIs• set up replicas in CosmosDB

• configure Azure SQL database settings• implement Azure SQL Database managed instances

• configure an app or service to send emails• configure Event Grid• configure the Azure Relay service• create and configure a Notifica-tion Hub• create and configure an Event Hub• create and configure a Service Bus• configure queries across multiple products

5.49 Develop for the Cloud & for Azure Storage

5.50 Configure a message-based integration architecture

5.51 Implement and Manage Data Platforms

5.52. Implement NoSQL databases

5.53 Implement Azure SQL databases

www.radicaltechnologies.co.in 31

5.54 Develop for autoscaling

• implement autoscaling rules and patterns (schedule, operation-al/system metrics

• implement code that addresses singleton application instances• implement code that addresses transient state

5.55 Develop solutions that use Cosmos DB storage

• create, read, update, and delete data by using appropriate APIs• implement partitioning schemes• set the appropriate consistency level for operations

5.56 Develop solutions that use a relational database

• provision and configure relational databases• configure elastic pools for Azure SQL Database • implement Azure SQL Database managed instances• create, read, update, and delete data tables by using code

www.radicaltechnologies.co.in 32

About NetBackupHow a NetBackup system works How to make a NetBackup system work for youAbout NetBackup software availabilityAbout the NetBackup media kit About the NetBackup Electronic Software Distribution (ESD)imagesAbout the NetBackup documentation About NetBackup license requirements About Veritas Services and Operations Readiness Tools Recommended SORT procedures for new installations Recommended SORT procedures for upgrades Installation and upgrade requirements for UNIX and Linux Clusters NetBackup 8.1 binary size requirementsHow to prepare for NetBackup installation About NetBackup configurationNetBackup master server web server user and group creation

IntroductionFibre Channel Switches and FabricsSAN Access ControlExtending SANs with Inter-Switch LinksFlow Control and Buffer CreditsJoining SANs with Fibre Channel RoutersServer Operating Systems and SANsMultipathingBooting Servers Off SAN Attached StorageSANs and TapeTape Library SharingManaging SANs

6 NETBACKUP

7 SAN

www.radicaltechnologies.co.in 33

Install and configure Veritas InfoScale Enterprise.Configure and manage disks, disk groups, and volumes.Administer file systems.Create a cluster.Configure service groups and resources.Implement and verify failover and failback capability for application, stor-age, and network services.

Why OpenStack?Public Cloud ArchitectureGetting started with OpenStackOpenStack ArchitectureLogical ArchitectureWho is OpenStack for?Installation How does OpenStack work?OpenStack vs. AWSFuture ScopeComponents of OpenstackHorizon Nova Compute CynderGlanceSwiftKeystone

IntroductionRed Hat OpenShift Fundamentals: IntroductionUnderstanding OpenShift

8 VCS & VXVM

9. Opnesatck

10 OPENSHIFT

Install and configure Veritas InfoScale Enterprise.Configure and manage disks, disk groups, and volumes.Administer file systems.Create a cluster.Configure service groups and resources.Implement and verify failover and failback capability for application, stor-age, and network services.

Why OpenStack?Public Cloud ArchitectureGetting started with OpenStackOpenStack ArchitectureLogical ArchitectureWho is OpenStack for?Installation How does OpenStack work?OpenStack vs. AWSFuture ScopeComponents of OpenstackHorizon Nova Compute CynderGlanceSwiftKeystone

IntroductionRed Hat OpenShift Fundamentals: IntroductionUnderstanding OpenShift

8 VCS & VXVM

9. Opnesatck

10 OPENSHIFT

www.radicaltechnologies.co.in 34

Understanding Containers and OpenShiftUnderstanding the Red Hat Container Management SolutionsUnderstanding OpenShift in a Container EnvironmentUnderstanding OpenShift in a DevOps EnvironmentUnderstanding OpenShift ArchitectureOpenShift versus KubernetesUnderstanding the Role of OpenShift in a Hybrid Cloud EnvironmentInstalling OpenShiftUnderstanding OpenShift VersionsInstalling MinishiftUsing oc cluster upPlanning for an OpenShift ClusterInstalling an OpenShift Cluster: Host PrepInstalling an OpenShift Cluster: InstallationGetting Started with OpenShiftGetting Started with the Web ConsoleUnderstanding Resource Types: Pods and NamespacesUnderstanding Resource Types: Deployment Configs and NetworkingManaging Resources from the Command LineUsing Source-to-Image to Create ApplicationsBasic OpenShift TroubleshootingManaging and Deploying OpenShiftModule introductionManaging OpenShift NetworkingUnderstanding Software Defined NetworkingUnderstanding OpenShift SDNUnderstanding ServicesUnderstanding RoutesCreating RoutesDeploying ApplicationsScaling ApplicationsScheduling PodsManaging Images and Image StreamsManaging TemplatesManaging OpenShift StorageUnderstanding OpenShift StorageConfiguring OpenShift Storage Access

www.radicaltechnologies.co.in 35

Setting up NFS Persistent Storage Part 1Setting up NFS Persistent Storage Part 2Working with ConfigMaps

Introduction to Virtualization and Infrastructure MigrationIntroduction to VirtualizationEssentials of Infrastructure MigrationThe Role of Cloud Management Platform in Infrastructure Migration (Demonstration)Red Hat Virtualization and vSphere (Demonstration)Cloud Management Platform Setup with CloudForms (Demonstration)Open Virtualization with Red Hat Virtualization (Demonstration)Infrastructure Migration Architecture and UsageInfrastructure Migration (Demonstration)IT Optimization Recap and Beyond

I. INTRODUCTION TO NETWORKING.

II. NETWORK TYPES.

Computing Basics.

Networking Funda

Network Devices

Network Topologies

PC Components. PC Versus Laptop. Bit, Bytes, and Measure-ment Terms. Decimal-to-Binary Conversion. Binary-to-Decimal Conversion. Binary-to-Hex Conver-sion. Hex-to-Binary Conversion.

Basic Networking Terminology. Network Applications. Under-standing Network Computers. The Open System Interconnection (OSI) Model. Data Communication. Peer-to-Peer Communication. The

TCP/IP Model. OSI Model Versus TCP/IP Model.

Layer 1 Devices. Layer 2 Devices. Layer 3 Devices. Voice, DSL, and Optical Devices. Firewalls and Au-thentication, Authorization, and Accounting Servers.

Physical Topology Versus Logical Topology. Bus. Star and Extended Star. Ring. Full Mesh and Partial Mesh.

11. REDHAT Virtualization

12. Networking

www.radicaltechnologies.co.in 36

III. NETWORK MEDIA.

IV. SWITCHING FUNDAMENTALS.

Network Media Types.Twisted-Pair Cable. Coaxial Cable. Fiber-Optic Cable. Wireless Com

munication. Comparing Media Types.

Cabling the LAN.LAN Physical Layer. Ethernet in the Campus LAN. Ethernet Media and Connector Requirements. Connec-tion Media. UTP Implementation.

Cabling the WAN.WAN Physical Layer. WAN Serial Connections. Routers and Serial Connections. Routers and ISDN BRI Connections. Routers and DSL Connections. Routers and Cable Connections. Setting Up Console Connections.

Shared LAN Technology.Early Local-Area Networks. Hubs. Bridges. Layer 2 Switches. Typical Causes of Network Congestion. To-day's LANs.

Understanding Ethernet Technologies.

Metropolitan-Area Networks (MANs). Storage-Area Networks (SANs). Content Networks. In-tranets and Extranets. Virtual Pri-vate Network (VPN).

LAN Standards. Ethernet. How Eth-ernet Works. Simplex, Half-Duplex, and Full-Duplex Operation.

WANs

WANs

Other Types of Networks.

The Global Internet. WAN Technol-ogy Overview. WAN Connection Types. WAN Provider Services. WAN Devices. WAN Service Pro-viders and WAN Service Terms. WAN Signaling Standards and Ca-pacity. WANs and the Physical Layer. WANs and the Data Link Layer.

LAN Switching Basics.Microsegmentation. LAN Switch Operation. Full-Duplex Transmis-sion. Modes of Switching. The Need for Spanning Tree.

Multilayer Switching Devices.Layer 2 Switching Devices. Layer 3 Switching Devices. Layer 4 Switch-ing Devices.

Virtual LANs.Constraints of Shared LANs. Virtual LANs. VLAN Components. Estab-lishing VLAN Membership. Communicating Between VLANs. Trunking

The Global Internet. WAN Technol-ogy Overview. WAN Connection Types. WAN Provider Services. WAN Devices. WAN Service Pro-viders and WAN Service Terms. WAN Signaling Standards and Ca-pacity. WANs and the Physical Layer. WANs and the Data Link Layer.

www.radicaltechnologies.co.in 37

V. TCP/IP.

VI. IP ADDRESSING AND ROUTING.

VII. WAN TECHNOLOGIES.

VIII. WIRELESS TECHNOLOGY.

Networking Addressing.IP Addressing. IP Address Classes. Reserved IP Address. Private IP Ad-dresses.

IP Subnetting & Calculation.Subnetworks. Subnet Masks. Net-work Addressing Planning. Subnet-ting Class C Addresses. Subnetting Class B Addresses. Identifying Subnet, Directed Broadcast, and Usable Addresses.

Routing Basics.

.

Routing Overview. Routed Versus Routing. Path Determination. Rout-ing Tables. Routing Algorithms. Ad-ministrative Distance.

Routing ProtocolsIGP and EGP. Routing Protocols. RIPv1 and RIPv2. IGRP. EIGRP. OSPF. IS-IS. BGP.

Traditional WAN ServicesWAN Connection Options. Multi-plexing. Packet Switching vs Circuit Switching. Leased Lines. Frame Relay. ATM and Cell Switching. SONET.

Dialup Access Technologies.ISDN. PPP. HDLC.

24. Analog Modems.Modem Overview. Analog Modem Standards.

25. Digital Subscriber Line (DSL).Basic DSL. DSL Types. DSL Stan-dards. Encapsulation and Proto-cols. DSL Advantages and Disad-vantages.

26. Cable ModemsHow Cable Modems Work. Cable Modem Advantages and Disadvan-tages. Cable and the OSI Model.

27. Wireless Concepts.Wireless Data Communications. Wireless Signal. Radio Frequency Bands. Spread-Spectrum Technol-ogy. Security in the Wireless Envi-ronment.

28. Wireless LANsWLANs and Wireless Bridging. In-Building WLANs. In-Building WLAN Technology. Build-ing-to-Building WLANs.

TCP/IP Overview.Communication Protocol. TCP/IP Protocol Stack. TCP/IP Applica-tions.

Transport Layer.Transport Layer Functions. Flow Control. TCP and UDP. Establishing a TCP Connection.

TCP/IP Internet Layer Overview.TCP/IP Internet Layer and the OSI Network Layer. IP Datagram. Pro-tocol Field. ICMP. ARP. RARP. BOOTP and DHCP.

www.radicaltechnologies.co.in 38

IX. OPTICAL NETWORKING FUNDAMENTALS.

X. APPENDIXES.

30. Optical Fibers.Fiber Types. Fiber Geometry. At-tenuation. Optical Filters. Optical Amplifiers (OAs).

31. Optical Transmission and Multiplexing

Appendix A: Introduction to Con-verged Networking.

Traditional Networks. Introduction to Voice and Data Networks. Voice, Video, and Data Networks. Common Issues with QoS. Summa-ry. Review Exercises.

SONET Technology. DWDM Sys-tems.

29. Basics of Optical NetworksOptical Business Drivers. Fiber-Op-tic Systems. Fiber-Optic Transmis-sion System. Light.

www.radicaltechnologies.co.in 39

13.1 Docker

Docker - OverviewDocker - Installing Docker on LinuxDocker - InstallationDocker - HubDocker - ImagesDocker - Images LifecycleDocker - ContainersDocker - Containers LifecycleDocker - Working With ContainersDocker - ArchitectureDocker - ConfiguringDocker - Containers & ShellsDocker - FileDocker - Building FilesBuilding a Web Server Docker FileDocker - Public RepositoriesDocker - Managing PortsDocker - Private RegistriesDocker - Instruction CommandsDocker - Container LinkingDocker - StorageDocker - NetworkingDocker - Setting NGINXDocker - ToolboxDocker - LoggingDocker - ComposeDocker-Swarm

13.2 Kubernes

Kubernetes - OverviewKubernetes - ArchitectureKubernetes - SetupKKubernetes - ImagesKubernetes - Jobs

Kubernetes - Labels & SelectorsKubernetes - NamespaceKubernetes - NodeKubernetes - ServiceKubernetes - PodKubernetes - Replication ControllerKubernetes - Replica SetsKubernetes - DeploymentsKubernetes - VolumesKubernetes - SecretsKubernetes - Network PolicyAdvanced KubernetesKubernetes - APIKubernetes - KubectlKubernetes - Kubectl CommandsKubernetes - Creating an AppKubernetes - App DeploymentKubernetes - AutoscalingKubernetes - Dashboard SetupKubernetes - MonitoringKubernetes - NamespaceKubernetes - NodeKubernetes - ServiceKubernetes - PodKubernetes - Replication ControllerKubernetes - Replica SetsKubernetes - DeploymentsKubernetes - VolumesKubernetes - SecretsKubernetes - Network PolicyAdvanced KubernetesKubernetes - APIKubernetes - KubectlKubernetes - Kubectl CommandsKubernetes - Creating an App

13 Open Source- Docker & Kubernetes

www.radicaltechnologies.co.in 40

14.1 Elastic Container Registry

What Is Amazon Elastic Container Registry?AWS EC2AWS CLI SetupComponents of Amazon ECRRegistryAuthorization TokenRepositoryRepository PolicyImageCommands

14.2 Elastic Container Service

Docker Container ConceptsAn intro to Amazon ECSTerms and architectureTask DefinitionTaskServiceECS Container Instances and ECS Container AgentsCluster

DesignAchieving High-AvailabilityScaling KubernetesFederationConfiguration Best PracticesCreating and Decoding SecretsUsing Secrets in Applications

14.3 Elastic Kubernetes Service

Overview: Installing KubernetesInstalling DependenciesInstalling the Latest KubernetesExploring Your Kubernetes InstallationKubernetes Architecture and

14 AWS-Docker & Kubernetes

www.radicaltechnologies.co.in 41

15.1 Azure container registry

Docker Container ConceptsDeploying ContainersMulti-container ApplicationsAzure Container RegistryAzure Container Clustering OptionsInstalling ACS

15.2 Azure Container Service

Introduction to Azure Container ServiceAzure Container InstancesCreating your first container in AzureAzure Marketplace containersContainer orchestration

15.3 Azure Kubernetes Services

What is AKS?Kubernetes core concepts for AKSInstall the Kubernetes CLIBaseline architecture for an AKS clusterClusters and workloadsAccess and identitySecurityNetworkingStorageDeploy an Azure Kubernetes Service (AKS) clusterCreate a Kubernetes clusterConnect to cluster using kubectlDeploy the applicationScale applications

15 . Azure-Docker & Kubernetes

www.radicaltechnologies.co.in 42

16.1 Google Container Registry

OverviewCreate AccountCompute EnginePermissionsRunning an imageCommands

16.2 Google Container Services

16.3 Google Kubernetes Services

Containers on Compute EngineContainer technologies that run on Compute EnginContainer-optimized VM imagesInstalling container technologies on your instancesInstall DockerPermissions

Understanding the GKE Service ProfilesBenefits of Using GKECosting Model Used in GKEUsing the GCP CalculatorGKE ArchitectureDeploying an ApplicationKubernetes ComponentsBasic CommandsGKE ArchitectureGKE and IAM RequirementsGKE Federation RequirementsKubernetes Cluster ActionsScale/Resize a Cluster

16 GCP-Docker & Kubernetes

www.radicaltechnologies.co.in 43

Domain 1: Orchestration (25% of exam)Complete the setup of a swarm mode cluster, with managers and worker nodes State the differences between run-ning a container vs running a ser-vice Demonstrate steps to lock a swarm cluster Extend the instructions to run indi-vidual containers into running ser-vices under swarm Interpret the output of “docker in-spect” commands Convert an application deploy-ment into a stack file using a YAML compose file with“docker stack deploy” Manipulate a running stack of ser-vices Increase # of replicas Add networks, publish ports Mount volumes Illustrate running a replicated vs global service Identify the steps needed to trou-bleshoot a service not deploying Apply node labels to demonstrate placement of tasks Sketch how a Dockerized applica-tion communicates with legacy systems Paraphrase the importance of quorum in a swarm cluster

Demonstrate the usage of tem-plates with “docker service create”

Domain 2: Image Creation, Man-agement, and Registry (20% of exam)Content may include the following: Describe Dockerfile options [add, copy, volumes, expose, entrypoint, etc) Show the main parts of a Docker-file SGive examples on how to create an efficient image via a Dockerfile Use CLI commands such as list, delete, prune, rmi, etc to manage images Inspect images and report specific attributes using filter and format Demonstrate tagging an image Utilize a registry to store an image Display layers of a Docker image Apply a file to create a Docker image Modify an image to a single layer Describe how image layers work Deploy a registry (not architect) Configure a registry Log into a registry Utilize search in a registry Tag an image Push an image to a registry Sign an image in a registry Pull an image from a registry

17. DCA

www.radicaltechnologies.co.in 44

Describe how image deletion works Delete an image from a registry

Domain 3: Installation and Config-uration (15% of exam)Content may include the following: Demonstrate the ability to up-grade the Docker engine Complete setup of repo, select a storage driver, and complete instal-lation of Dockerengine on multiple platforms Configure logging drivers (splunk, journald, etc) Setup swarm, configure managers, add nodes, and setup backup schedule Create and manager user and teams Interpret errors to troubleshoot in-stallation issues without assistance Outline the sizing requirements prior to installation Understand namespaces, cgroups, and configuration of certificates Use certificate-based client-server authentication to ensure a Docker daemon has therights to access images on a regis-try Consistently repeat steps to deploy Docker engine, UCP, andDTR on AWS and onpremises in an HA config Complete configuration of back-ups for UCP and DTR

Configure the Docker daemon to start on boot

Domain 4: Networking (15% of exam)Content may include the following: Create a Docker bridge network for a developer to use for their con-tainers Troubleshoot container and engine logs to understand a con-nectivity issue betweencontainers Publish a port so that an applica-tion is accessible externally Identify which IP and port a con-tainer is externally accessible on Describe the different types and use cases for the built-in network drivers Understand the Container Net-work Model and how it interfaces with the Docker engineand network and IPAM drivers Configure Docker to use external DNS Use Docker to load balance HTTP/HTTPs traffic to an applica-tion (Configure L7 loadbalancing with Docker EE) Understand & describe the types of traffic that flow between the Docker engine,registry, and UCP controllers Deploy a service on a Docker over-lay network

www.radicaltechnologies.co.in 45

Domain 5: Security (15% of exam)Content may include the following:Describe the process of signing an imageDemonstrate that an image passes a security scanEnable Docker Content TrustConfigure RBAC in UCPIntegrate UCP with LDAP/ADDemonstrate creation of UCP client bundlesDescribe default engine securityDescribe swarm default securityDescribe MTLSIdentity rolesDescribe the difference between UCP workers and managersDescribe process to use external certificates with UCP and DTR

Domain 6: Storage and Volumes (10% of exam)Content may include the following:State which graph driver should be used on which OSDemonstrate how to configure devicemapperCompare object storage to block storage, and explain which one is prefera-ble when availableSummarize how an application is composed of layers and where those layers reside on the file systemDescribe how volumes are used with Docker for persistent storageIdentify the steps you would take to clean up unused images on a filesys-tem, also onDTRDemonstrate how storage can be used across cluster nodes

www.radicaltechnologies.co.in 46

5%-Scheduling•Use label selectors to schedule Pods.•Understand the role of Daemon Sets.•Understand how resource limits can affect Pod scheduling.•Understand how to run multiple schedulers and how to configure Podsto use them.•Manually schedule a pod without a scheduler.•Display scheduler events.•Know how to configure the Kuber-netes scheduler.5%-Logging/Monitoring•Understand how to monitor all cluster components.•Understand how to monitor appli-cations.•Manage cluster component logs.•Manage application logs.8%-Application Lifecycle Manage-ment•Understand Deployment sand how to perform rolling updates and rollbacks.•Know various ways to configure applications.•Know how to scale applications.•Understand the primitives neces-sary to create a self-healing appli-cation.

ologies.12%-Security •Know how to configure authenti-cation and authorization.•Understand Kubernetes security primitives.•Know to configure network poli-cies.•Create and manage TLS certifi-cates for cluster components.•Work with images securely.•Define security contexts.•Secure persistent keyvalue store.7%-Storage•Understand persistent volumes and know how to create them.•Understand access modes for vol-umes.•Understand persistent volume claims primitive.•Understand Kubernetes storage objects.•Know how to configure applica-tions with persistent storage.10%-Troubleshooting •Trouble shoot application failure.•Trouble shoot control plane failure.•Trouble shoot worker node failure.•Trouble shoot networking.19%-Core Concepts•Understand the Kubernetes API primitives.•Understand the Kubernetes clus-ter architecture.

18. Certified Kubernetes Administrator (CKA)

www.radicaltechnologies.co.in 47

•Understand Services and other network primitives.11%-Networking•Understand the networking configuration on the cluster nodes.•Understand Pod networking concepts.•Understand Service networking.•Deploy and configure network loadbalancer.•Know how to use Ingress rules.•Know how to configure and use the cluster DNS.•Understand CNI.12%-Installation,Configuration &Validation•Design a Kubernetes cluster.•Install Kubernetes masters and nodes.•Configure secure cluster communications.•Configure a Highly-Available Kubernetes cluster.•Know where to get the Kubernetes release binaries.•Provision underlying infrastructure to deploy a Kubernetes cluster.•Choose a network solution.•Choose your Kubernetes infrastructure configuration.•Run end-to-end tests on your cluster.•Analyse end-to-end tests results.•Run Node end-to-end tests.

www.radicaltechnologies.co.in 48

This document provides the curric-ulum outline of the Knowl-edge,Skills and Abilities thata Certified Kubernetes Application Developer (CKAD) can be expect-ed to demonstrate.13%-Core Concepts•Understand Kubernetes API primi-tives•Create and configure basic Pods18%-Configuration•Understand Config Maps•Understand Security Contexts•Define an application’s resource requirements•Create & consume Secrets•Understand Service Accounts10% Multi-Container Pods •Understand Multi-Container Pod design patterns (e.g.ambassador,-adapter,sidecar)18%-Observability•Understand Liveness ProbesandReadiness Probes•Understand container logging•Understand how to monitor appli-cations in Kubernetes•Understand debugging in Kuber-netes20%-PodDesign •Understand how to use Labels, Se-lectors, and Annotations

•Understand Deployments and how to perform rolling updates•Understand Deployments and how to perform rollbacks•Understand Jobs and CronJobs13%-Services&Networking•Understand Services•Demonstrate basic understanding of Network Policies8%-State Persistence•Understand Persistent Volume Claims for storage

19. Certified Kubernetes Application Developer(CKAD)

www.radicaltechnologies.co.in 49

Training Queries: [email protected]

PUNE BANGALORE KOCHI

Aundh | Hinjewadi | Pimple Saudagar | Kharadi |Karve Road | Magarpatta |

Banglore | Kochi

8055223360 8103400400


Recommended