Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized
Course Overview:
Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture. Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.
This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang. Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.
In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.
Course Objectives:
- Learn about Containers, Docker, Kubernetes, and OpenShift architecture
- Overview DoD Enterprise DevSecOps Platform (DSOP) Reference Design and DoD Cloud Platform One (P1)
- Tie together awareness of various DoD Cloud offerings and their relationships
- Create containerized services
- Manage containers and container images
- Deploy multi-container applications
- Install an OpenShift cluster
- Configure and manage masters and nodes
- Secure OpenShift
- Control access to resources on OpenShift
- Monitor and collect metrics on OpenShift
- Deploy applications on OpenShift using source-to-image (S2I)
- Manage storage on OpenShift
Course Outline:
- Getting started with container technology
- Creating containerized services
- Managing containers
- Managing container images
- Creating custom container images
- Deploying containerized applications on OpenShift
- Deploying multi-container applications
- Troubleshooting containerized applications
- Comprehensive Review of Introduction to Container, Kubernetes, and RedHat OpenShift
- Introducing Red Hat OpenShift Container Platform
- Installing OpenShift Container Platform
- Describing and exploring OpenShift networking concepts
- Executing commands
- Controlling access to OpenShift resources
- Allocating persistent storage
- Managing application deployments
- Installing and configuring the metrics subsystem
- Managing and monitoring OpenShift Container Platform
Dates/Locations:
No Events
Duration: 5 Days
Prerequisites:
- Ability to use a Linux® terminal session and issue operating system commands
- Good foundation in Linux
- Experience with web application architectures and their corresponding technologies
Target Audience:
- Developers who wish to containerize software applications
- Administrators who are new to container technology and container orchestration
- Architects who are considering using container technologies in software architectures
- System administrators
- System architects
- Architects and developers who want to install and configure OpenShift Container Platform
- Those working in the field of DevSecOps supporting DoD Platform One (P1) and other implementations
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Plan and implement an IPv4 network
- Implement Dynamic Host Configuration Protocol (DHCP)
- Implement IPv6
- Implement Domain Name System (DNS)
- Implement and manage IP address management (IPAM)
- Plan for remote access
- Implement DirectAccess
- Implement virtual private networks (VPNs)
- Implement networking for branch offices
- Configure advanced networking features
- Implement Software Defined Networking
Prerequisites:
- A basic understanding of networking fundamentals
- Experience working with Windows Server 2008 or Windows Server 2012
- Experience working in a Windows Server infrastructure enterprise environment
- Knowledge of the Open Systems Interconnection (OSI) model
- Understanding of core networking topologies and architectures such as local area networks (LANs), wide area networks (WANs) and wireless networking
- Basic knowledge of the TCP/IP protocol stack, addressing and name resolution
- Experience with and knowledge of Hyper-V and virtualization
- Hands-on experience working with the Windows client operating systems such as Windows 8.1 or Windows 10
Liked the class? Then let everyone know!
Course Overview:
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy
- Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes
- Describe enterprise storage solutions, and select the appropriate solution for a given situation
- Implement and manage Storage Spaces and Data Deduplication
- Install and configure, and manage Windows and Hyper-V containers
- Describe the high availability and disaster recovery technologies in Windows Server 2016
- Plan, create, and manage a failover cluster
- Implement failover clustering for Hyper-V virtual machines
- Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation
- Create and manage deployment images
- Manage, monitor, and maintain virtual machine installations
Prerequisites:
- A basic understanding of networking fundamentals
- An awareness and understanding of security best practices
- An understanding of basic AD DS concepts
- Basic knowledge of server hardware
- Experience supporting and configuring Windows client operating systems such as Windows 10
Liked the class? Then let everyone know!
PP-244: CIPM + CIPP/E 4 Day GDPR Ready
Course Overview:
A combined course of CIPM + CIPP/E. Achieving a CIPM credential shows that you have a comprehensive knowledge of how data protection programs should work across an organization. Combine with a CIPP/E credential and prove that you not only can manage a data protection program, but you understand the regulations that govern them.
With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. The CIPP/E relates to the knowledge a DPO must have concerning the European legal framework of the legislation, and the CIPM provides theoretical aspects necessary to lead an organization’s data protection policy.
The General Data Protection Regulation (GDPR) takes effect in 2018. Among its mandates is the requirement to appoint a knowledgeable Data Protection Officer (DPO) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There’s a lot to know, there’s a lot at stake and there’s a lot of opportunity for data protection professionals with the right training and education.
What’s Included:
- Authorized courseware
- 2 Exam vouchers
- IAPP membership
**GDPR Regulation Mandated May 25, 2018**
Course Objectives:
See individual courses for details: PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance
See individual courses for details: PP-222 CIPM Certified Information Privacy Manager and GDPR Compliance
Attendees to PP-244: CIPM + CIPP/E 4 Day GDPR Ready will receive TechNow approved course materials and expert instruction, and certification test vouchers and certificate of course completion.
TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).
TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with international sales and compliance.
Dates/Locations:
No Events
Duration: 4 Days
Course Content:
- See individual courses for details: PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance
- See individual courses for details: PP-222 CIPM Certified Information Privacy Manager and GDPR Compliance
Prerequisites: None
Target Audience:
Data Protection Officers, Data Protection Managers, Auditors, Data Protection Lawyers, Records Managers, Information Officers, Legal Compliance Officers, Human Resource Officers, Security Manager, Information Manager, Anyone who uses processes and maintains personal data
Comments
Latest comments from students