Here are the Information Privacy Protection course offerings:
Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to Support and Troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment.
Attendees to TN-5320: Supporting and Troubleshooting Windows 11 will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Describe the processes involved in planning and using a troubleshooting methodology for Windows 11
- Troubleshoot startup issues and operating system services on a Windows 11 PC
- Perform system recovery
- Resolve issues related to hardware devices and device drivers
- Administer Windows 11 devices
- Troubleshoot issues related to network connectivity
- Configure Windows 11 devices by using Group Policy
- Configure and troubleshoot user settings
- Configure and troubleshoot resource access
- Implement remote connectivity
- Deploy and troubleshoot applications
- Maintain Windows 11 devices
Prerequisites:
- Networking fundamentals, including Transmission Control Protocol /Internet Protocol (TCP/IP), User Datagram Protocol (UDP), and Domain Name System (DNS).
- Microsoft Active Directory Domain Services (AD DS) principles.
- Understanding of the Public Key Infrastructure (PKI) components.
- Windows Server fundamentals.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course covers the key elements required to understand and apply business analysis techniques in an IT-centric business environment. It identifies key best practices to deal with the challenges of eliciting, analyzing, and specifying project requirements. The key material in each section of this course is reinforced with a student driven lab scenario allowing each participant hands-on practice with the key business analysis concepts that are introduced in this course. At the end of the focused sections on business analysis techniques, the students will engage in a student-driven business analysis case study blending all the learned techniques into a finished product. This course is approximately 60% lecture and 40% lab time.
Attendees to TN-512: Essential Business Analysis Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Overview of Business Analysis Workshop
- Eliciting Project Workshop
- Case Study
- Analyzing Requirements and Writing Case Studies
- Case Study
Prerequisites:
- None
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture. Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.
This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang. Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.
In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.
Course Objectives:
- Learn about Containers, Docker, Kubernetes, and OpenShift architecture
- Overview DoD Enterprise DevSecOps Platform (DSOP) Reference Design and DoD Cloud Platform One (P1)
- Tie together awareness of various DoD Cloud offerings and their relationships
- Create containerized services
- Manage containers and container images
- Deploy multi-container applications
- Install an OpenShift cluster
- Configure and manage masters and nodes
- Secure OpenShift
- Control access to resources on OpenShift
- Monitor and collect metrics on OpenShift
- Deploy applications on OpenShift using source-to-image (S2I)
- Manage storage on OpenShift
Course Outline:
- Getting started with container technology
- Creating containerized services
- Managing containers
- Managing container images
- Creating custom container images
- Deploying containerized applications on OpenShift
- Deploying multi-container applications
- Troubleshooting containerized applications
- Comprehensive Review of Introduction to Container, Kubernetes, and RedHat OpenShift
- Introducing Red Hat OpenShift Container Platform
- Installing OpenShift Container Platform
- Describing and exploring OpenShift networking concepts
- Executing commands
- Controlling access to OpenShift resources
- Allocating persistent storage
- Managing application deployments
- Installing and configuring the metrics subsystem
- Managing and monitoring OpenShift Container Platform
Dates/Locations:
No Events
Duration: 5 Days
Prerequisites:
- Ability to use a Linux® terminal session and issue operating system commands
- Good foundation in Linux
- Experience with web application architectures and their corresponding technologies
Target Audience:
- Developers who wish to containerize software applications
- Administrators who are new to container technology and container orchestration
- Architects who are considering using container technologies in software architectures
- System administrators
- System architects
- Architects and developers who want to install and configure OpenShift Container Platform
- Those working in the field of DevSecOps supporting DoD Platform One (P1) and other implementations
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Through hands-on labs, you will learn to automate system administration tasks on managed hosts with Ansible, learn how to write Ansible playbooks to standardize task execution, and manage encryption for Ansible with Ansible Vault. This course will also teach you how to deploy and use Red Hat® Ansible Tower to centrally manage existing Ansible projects, playbooks, and roles; perform basic maintenance and administration of the Ansible Tower installation; and configure users and teams and use them to control access to systems, projects, and other resources through role-based access controls. You will learn to use Ansible Tower’s visual dashboard to launch, control, and monitor Ansible jobs; use the Ansible Tower application programming interface (API) to launch jobs from existing templates; automatically schedule Ansible jobs; and dynamically update host inventories.
Course Objectives:
- Install and troubleshoot Ansible on central nodes and managed hosts
- Automate administration tasks with Ansible playbooks and ad hoc commands
- Write effective Ansible playbooks
- Protect sensitive data used by tasks with Ansible Vault.
- Install and configure Ansible Tower for enterprise Ansible management
- Use Ansible Tower to control access to inventories and machine credentials by users and teams
- Create job templates in Ansible Tower to standardize playbook execution.
- Centrally launch playbooks and monitor and review job results with Ansible Tower
Course Outline:
- Introduce Ansible
- Deploy Ansible
- Implement playbooks
- Manage variables and inclusions
- Implement task control
- Implement Jinja2 templates
- Implement roles
- Configure complex playbooks
- Implement Ansible Vault
- Troubleshoot Ansible
- Install Ansible Tower and describe Ansible Tower’s architecture
- Create users and teams for role-based access control
- Create and manage inventories and credentials
- Manage projects for provisioning with Ansible Tower
- Construct advanced job workflows
- Update inventories dynamically and compare inventory members
- Maintenance and administration of Ansible Tower
Dates/Locations:
No Events
Duration: 5 Days
Prerequisites:
- Become a Red Hat Certified System Administrator, or demonstrate equivalent experience
Target Audience:
This course is designed for Linux system administrators, cloud administrators, and network administrators needing to automate configuration management, application deployment, and intraservice orchestration at an enterprise scale.