Course curriculum

  • 1

    How to access container based labs

    • Please see the video to learn how you can utilise our containers to perform hands on labs

  • 2

    DevOps Docker Deep Dive

    • Introduction DevOps Administrator

      FREE PREVIEW
    • Lecture 1 : DevOps Architecture | Trainer Profile | Introduction to Docker

    • Introduction Docker lecture Document

    • Lecture 2 : Docker installation and compose

    • Lecture 3 : Introduction to Docker File and Docker commands

    • Lecture 4: Docker Busy Box and Alpine image concepts with example.

    • Lecture 5 : Understand Docker file and Docker file creation.

    • Lecture 6 : Practical Phase One - Part - 1 - with Solution.

    • Lecture 7 : Docker Pull and Push Commands.

    • Lecture 8 : Create Docker Image from Docker Container

    • Lecture 9 : Docker Port Mapping.

    • Lecture 10 : Deploy an Application In Docker.

    • Lecture 11 : Practical Phase 1 [ Part - 2 ] with Solution.

    • Lecture 12 : Practical Phase 2 with Solution.

    • Lecture 13 : Introduction to Docker Volume.

    • Lecture 14 : Docker Volume type explanation with Hands on.

    • Lecture 15 : Docker Image variants and Change default Docker path.

    • Lecture 16 : Docker Multi stages.

    • Lecture 17 : Hands-On Docker Compose

    • Lecture 18 : Docker Data Container with Hands-On.

    • Lecture 19 : Practical Phase 3 with Solution.

    • Lecture 20 : Docker file understand with useful keywords.

    • Lecture 21 : Docker image push and pull to AWS ECR.

    • Lecture 22 : Deploy Docker app to AWS ECS.

    • Lecture 23 : Docker image push and Pull from GitHub and GitLab repository.

    • Lecture 24 : Practical Phase 4 with Solution.

    • Lecture 25 : GitLab Workflow automation using CICD pipeline.

    • Lecture 26 : Docker image push from GitLab to AWS ECR using CICD pipeline.

    • Lecture 27 : GitHub build image to AWS ECR using CICD pipeline.

    • Lecture 28 : Introduction to Docker Networking.

    • Lecture 29 : Docker Network with Hands On.

    • Lecture 30 : Docker linking with two containers.

    • Lecture 31 : Docker Swarm

    • Lecture 32 : Local repository in Docker.

    • Lecture 33 : Docker Monitoring.

    • Lecture 34 : Docker Secrets | Docker Stack | Jboss Deployment using Docker.

    • Lecture 35 : Docker Alias.

    • Lecture 36 Archive your image and container

    • 37 : DevOps admin work profile and interview questions.

    • Docker Quiz

    • Feedback

  • 3

    Bash Script Deep Dive

    • Lecture 1: Introduction to Bash Script.

      FREE PREVIEW
    • Lecture 2 : Understanding echo and read command.

      FREE PREVIEW
    • Lecture 3 : Lecture 3: How to write your script and Understanding Debugging MODE

    • Lecture 4 : Introduction to Linux editor | tr | xargs | seq commands

    • Lecture 5 : Conditional Statement in bash script [ PART - 1 ].

    • Lecture 6 : Conditional Statement in Bash script [ PART - 2 ]

    • Lecture 7 Introduction to Nested if condition in Bash script.

    • Lecture 8 : Positional parameter in Bash script

    • Lecture 9 : Introduction to Loops in Bash script.

    • Lecture 10 : For loop in Bash script.

    • Lecture 11 : While loop in Bash script.

    • Lecture 12 : Until Loop in Bash Script.

    • Lecture 13 : Select Loop in Bash script.

    • Lecture 14 : Introduction to Echo commands flag and Advance bash script commands.

    • Lecture 15 : Positional Parameter with shift commands.

    • Lecture 16 : Control and Break statement in Bash script.

    • Lecture 17 : Practical Phase 1 - Solution

    • Lecture 18 : String operation in Bash Script.

    • Lecture 19 : Understanding to Array in Bash script.

    • Lecture 20 : Understanding to Function in Bash Script.

    • Lecture 21 : Filter grep commands in bash script.

    • Lecture 22 : Filter cut commands in bash script.

    • Lecture 23 : AWK commands in Bash script.

    • Lecture 24 : AWK script in Bash script.

    • Lecture 25 : SED commands in bash script.

    • Lecture 26 : Understanding find commands.

    • Lecture 27 : Scheduling task in bash script.

    • Lecture 28 : Realtime Hands-on practical in bash script. [ Part - 1 ]

    • Lecture 29 : Realtime Hands-on practical in bash script. [ Part - 2]

    • Lecture 30 : Practical Phase 2 - Solution.

    • Bash Script Quiz

    • Feedback

  • 4

    Python Automation

    • Lecture 1 : Lecture Introduction to Python.

      FREE PREVIEW
    • Lecture 3 : Python basic commands and installation Pycharm.

    • Lecture 4 : Variables and Data types in Python.

    • Lecture 5 : Python type casting and print format in Python.

    • Lecture 6 : Escape sequences and comments in Python.

    • Lecture 7 : Condition in Python.

    • Lecture 8 : String operation in python [ Part - 1 ]

    • Lecture 9 : String operation in python [ Part - 2 ]

    • Lecture 10 : List Data structure in python [ Part - 1 ]

    • Lecture 11 : List Data Structure in python [ Part - 2 ]

    • Lecture 12 : Tuple data structure in python.

    • Lecture 13 : Dictionary data structure in Python [ Part - 1 ]

    • Lecture 14 : Dictionary data structure in Python [ Part - 2 ]

    • Lecture 15 : How to work with modules in python.

    • Lecture 16 : OS module in python [ Part - 1 ]

    • Lecture 17 : OS module in python [ Part - 2 ]

    • Lecture 18 : OS module in python [ Part - 3 ]

    • Lecture 19 : OS Module in python [ Part - 4 ]

    • Lecture 20 : Platform module in Python.

    • Lecture 21 : Command line arguments module in python.

    • Lecture 22 : Python Loop [ Part - 1 ]

    • Lecture 23 : Python Loop [ Part - 2 ]

    • Lecture 24 : Practical Session - Phase one Solution.

    • Lecture 25 : Control Statement in python.

    • Lecture 26 : Practical session - Phase two solution.

    • Lecture 27 : Python Function [ Part - 1 ]

    • Lecture 28 : Python Function [ Part - 2 ]

    • Lecture 29 : Exception Handling [ Part - 1 ]

    • Lecture 30 : Exception Handling [ Part - 2 ]

    • Lecture 31 : Datetime module in python [ Part - 1 ]

    • Lecture 32 : Datetime module in python [ Part - 2 ]

    • Lecture 33 : File Handling [ Part - 1 ]

    • Lecture 34 : File handling [ Part - 2 ]

    • Lecture 35 : File handling [ Part - 3 ]

    • Lecture 36 : File handling [ Part - 4 ]

    • Lecture 37 : File Handling [ Part - 5 ]

    • Lecture 38 : File Handling [ Part - 6 ]

    • Lecture 39 : Email module [ Part - 1 ]

    • Lecture 40 : Email Module [ Part - 2 ]

    • Lecture 41 : Scheduler in python [ Part - 1 ]

    • Lecture 42 : Regular expression in python [ Part - 1 ]

    • Lecture 43 : Regular expression in Python [ Part - 2 ]

    • Lecture 44 : Regular Expression in Python [ Part - 3 ]

    • Lecture 45 : Regular Expression in Python [ Part - 4 ]

    • Lecture 46 : Regular Expression in Python [ Part - 5 ]

    • Lecture 47 : Remote Server Module in Python [ Part - 1 ]

    • Lecture 48 : Remote Server Module in Python [ Part - 2 ]

    • Lecture 49 : Remote server module in python [ Part - 3 ]

    • Lecture 50 : Remote server module in python [ Part - 4 ]

    • Lecture 51 : remote server module in Python [ Part - 5 ]

    • Lecture 52 : Working with Database module in Python [ Part -1 ]

    • Lecture 53 : Working with Database module in python [ Part -2 ]

    • Lecture 54 : Working with Database module In python [ Part - 3 ]

    • Lecture 55 : Working with database module in Python [ Part - 4 ]

    • Lecture 56 : Working with database module in Python [ Part -5 ]

    • Lecture 57 : Real-World Project [ Part -1 ]

    • Lecture 58 : Real-World Project [ Part - 2 ]

    • Lecture 59 : Real-World Project [ Part - 3 ]

    • Quiz

    • Feedback

  • 5

    Python Selenium

    • Lecture 1 : Introduction to Python Selenium.

      FREE PREVIEW
    • Lecture 2 : Python Selenium Architecture.

      FREE PREVIEW
    • Lecture 3 : Installation Python selenium.

    • Lecture 4 : Working with Different browser [ part - 1 ]

    • Lecture 5 : Working with Different Browser [ Part - 2 ]

    • Lecture 6 : Working with Web Driver Manager.

    • Lecture 7 : Web Elements in Python Selenium [ Part - 1 ]

    • Lecture 8 : Web Elements in Python Selenium [ Part - 2 ]

    • Lecture 9 : Web Elements in Python Selenium [ Part - 3 ]

    • Lecture 10 : Web Elements in Python Selenium [ Part - 4 ]

    • Lecture 11 : Synchronization issue [ Part - 1 ]

    • Lecture 12 : Synchronization issue [ Part - 2 ]

    • Lecture 13 : Synchronization issue [ Part -3 ]

    • Lecture 14 : Working with Different elements [ Part - 1 ]

    • Lecture 15 : Working with Different elements [ Part - 2 ]

    • Lecture 16 : Working with Different elements [ Part - 3 ]

    • Lecture 17 : Working with Different elements [ Part - 4 ]

    • Lecture 18 : CSS Selectors in Python Selenium.

    • Lecture 19 : XPATH in Python Selenium [ Part - 1 ]

    • Lecture 20 : XPATH in Python Selenium [ Part - 2 ]

    • Lecture 21 : XPATH in Python Selenium [ Part - 3 ]

    • Lecture 22 : Handling complex elements in Python Selenium [ Part - 1 ]

    • Lecture 23 : Handling complex elements in Python Selenium [ Part - 2 ]

    • Lecture 24 : Handling complex elements in Python Selenium [ Part - 3 ]

    • Practical Assignments

    • Lecture 25 : Options in Python Selenium [ Part - 1 ]

    • Lecture 26 : Screenshot in Python Selenium [ Part - 1 ]

    • Lecture 27 : Screenshot in Python Selenium [ Part - 2 ]

    • Lecture 28 : Screenshot in Python Selenium [ Part - 3 ]

    • Lecture 29 : Pytest in python Selenium [ Part - 1 ]

    • Lecture 30 : Pytest in python selenium [ Part - 2 ]

    • Lecture 31 : Pytest in python selenium [ Part - 3 ]

    • Lecture 32 : Pytest in python selenium [ Part - 4 ]

    • Lecture 33 : Practical Session 33 [ Part - 1 ]

    • Lecture 34 : practical Session [ Part - 2 ]

    • Lecture 35 : Practical Session [ Part - 3 ]

    • Lecture 36 : Selenium Grid [ Part - 1 ]

    • Lecture 37 : Selenium Grid [ Part - 2 ]

    • Lecture 38 : Selenium Grid [ Part - 3 ]

    • Lecture 39 : Selenium grid with docker [ Part - 1 ]

    • Lecture 40 : Selenium grid with Docker [ Part - 2 ]

    • Lecture 41 : Python Selenium with Jenkins and GitHub [ Part - 1 ]

    • Lecture 42 : Python Selenium with Jenkins and GitHub [ Part - 2 ]

    • Lecture 43 : Python Selenium with Jenkins and GitHub [ Part - 3 ]

    • Quiz

    • Feedback

  • 6

    JIRA With Python

    • Lab environment

    • Lecture 1 Introduction to JIRA

      FREE PREVIEW
    • Lecture 1 JIRA with Python.pdf

      FREE PREVIEW
    • Lecture 1.txt

      FREE PREVIEW
    • Lecture 2 Setup JIRA

    • Notes :- Lecture 2

    • Lecture 3 Understanding JIRA dashboard

    • Notes :- Lecture 3

    • Lecture 4 JIRA advance search and filter

    • Lecture 4.txt

    • Lecture 5 JIRA advance search and filter part 2

    • Notes:- Lecture 5

    • Lecture 6 JIRA Dashboards

    • Notes :- Lecture 6

    • Lecture 7 JIRA admin part 1

    • Lecture 7

    • Lecture 8 JIRA admin part 2

    • Notes :- Lecture 8

    • Lecture 9 JIRA admin part 3

    • Notes :- Lecture 9

    • Lecture 10 JIRA admin part 4

    • Notes :- Lecture 10

    • Notes :- Lecture 11 JIRA admin part 5

    • Notes :- Lecture 11

    • Lecture 12 JIRA with python

    • Notes :- Lecture 12

    • Lecture 13 JIRA with python part 2

    • Notes :- Lecture 13

    • Lecture 14 JIRA with python part 3

    • Notes :- Lecture 14

    • Lecture 15 JIRA with python part 4

    • Notes :- Lecture 15

    • .py

    • Lecture 16 JIRA with python part 5

    • Lecture 17 JIRA with python part 6

    • Lecture 18 Practical Session

    • Lecture 19 Practical Session

    • Notes :- Lecture 19

    • .py

    • Feedback

  • 7

    Python Flask

    • Lecture 1 Introduction to Flask

      FREE PREVIEW
    • Lecture 1 Flask Introduction

      FREE PREVIEW
    • Lecture 2 Introduction and understanding methods

      FREE PREVIEW
    • What is API ?

    • Lecture 2

    • Lecture 2

    • Lecture 3 Understand API with example

    • Lecture 4 Understand API with example part 2

    • Idea - lecture 4

    • Lecture 5 Installation Flask setup

    • Lecture 6 Database connectivty with Flask

    • Lecture 7 _ Database connectivty with Flask part 2

    • Lecture 8 Fetching data from database in Flask

    • Lecture 9 Setup Website with Flask

    • Lecture 10 Setup Website with Flask part 2

    • Lecture 11 Searchwise data in Flask

    • Lecture 12 Jira integration with Flask Part 1

    • Lecture 13 Jira integration with Flask Part 2

    • Lecture 14 Session management in Flask part 1

    • Lecture 15 Session management in Flask part 2

    • Lecture 16 Session management in Flask part 3

    • Lecture 17 Deploy Python Flask Application on Docker part 1

    • Lecture 18 Deploy Python Flask Application on Docker part 2

    • Lecture 19 Deploy Python Flask Application on Docker part 3

    • Lecture 20 Practical Assignment part 1

    • Lecture 21 Practical Assignment part 2

    • Project

    • Feedback

  • 8

    Vagrant

    • Lecture 1 Vagrant Introduction

      FREE PREVIEW
    • Lecture 1 Vagrant Introduction

      FREE PREVIEW
    • Lecture 2 Installation Vagrant

    • Lectur 2

    • Lecture 3 Creating OS using vagrant

    • Lecture 3

    • Lecture 4 Understanding box in vagrant

    • Lecture 4

    • Lecture 5 Understanding box in vagrant part 2

    • Lecture 5

    • Lecture 6 Networking in vagrant

    • Lecture 7 Syncing foder in vagrant env

    • Lecture 8 Provision in vagrant

    • Lecture 9 File Provision in vagrant

    • Lecture 10 Shell Provision in vagrant

    • Lecture 11 Automated Setup using vagrant

    • Lecture 12 managing multivm using vagrant

    • Feedback

  • 9

    Ansible

    • Lecture 1 : Introduction to Ansible

      FREE PREVIEW
    • Lecture 2 : Ansible Architecture.

      FREE PREVIEW
    • Lecture 3 : Installation of Ansible.

    • Lecture 4 : Setup of Ansible.

    • Lecture 5 : Understanding of Ansible.cfg file structure.

    • Lecture 6 : Ansible Ad-Hoc command line [ Part - 1 ]

    • Lecture 7 : Ansible Ad-Hoc command line [ Part - 2 ]

    • Lecture 8 : Ansible Ad-Hoc command line [ Part - 3 ]

    • Lecture 9 : Ansible facts [ Part - 1 ]

    • Lecture 10 : Ansible Facts [ Part - 2 ]

    • Lecture 11 : Ansible Variables

    • Lecture 12 : Understanding Ansible Playbook

    • Lecture 13: Basic Ansible playbook execution [ Part - 1 ]

    • Lecture 14: basic Ansible playbook execution [ Part - 2 ]

    • Lecture 15 : Printing message using ansible playbook

    • Lecture 16 : Copy and Fetch module in ansible playbook.

    • Lecture 17 : Understanding inventory in Ansible.

    • Lecture 18 : Copy and Fetch script data [ Part - 1 ]

    • Lecture 19 : Copy and Fetch script data [ Part - 2 ]

    • Lecture 20 : Copy and Fetch script data [ Part - 3 ]

    • Lecture 21 : Copy and Fetch script data [ Part - 4 ]

    • Lecture 22: Collect remote output in using ansible playbook.

    • Lecture 23: Collect remote output and storing to CSV file

    • Lecture 24 : When condition in ansible playbook [ Part - 1 ]

    • Lecture 25 : When condition in ansible playbook [ Part - 2 ]

    • Lecture 26 : When condition in ansible playbook [ Part - 3 ]

    • Lecture 27: Data types in ansible playbook [ Part - 1]

    • Lecture 28: Data types in ansible playbook [ Part - 2]

    • Lecture 29: Data types in ansible playbook [ Part - 3 ]

    • Lecture 30 : Reading the variable using ansible playbook [ Part - 1 ]

    • Lecture 31 : Reading the variable using ansible playbook [ Part - 2 ]

    • Lecture 32 : Command line arguments using ansible playbook

    • Lecture 33: Operators in ansible playbook.

    • Lecture 34: Loop in ansible playbook [ Part - 1 ]

    • Lecture 35: Loop in ansible playbook [ Part - 2 ]

    • Lecture 36 : Execution specific tasks using ansible playbook

    • Lecture 37 : Ansible vaults

    • Lecture 38: Ansible roles.

    • Lecture 39 : Managing EC2 services using Ansible [ Part - 1 ]

    • Lecture 40 : Managing EC2 services using Ansible [ Part - 2 ]

    • Lecture 41 : Managing EC2 services using Ansible [ Part - 3 ]

    • Lecture 42 : Windows machine connection with Ansible [ Part - 1 ]

    • Lecture 43 : Windows machine connection with Ansible [ Part - 2 ]

    • Lecture 44: Practical Assignment.

    • Feedback

  • 10

    DevOps Open Source Tools

    • Chapter#2 Chef

    • 1-What is Chef_Workstation_Chef server and Node Architecture

      FREE PREVIEW
    • 2-Installation chef-workstation on ( Centos-7_Ubuntu-AWS machine)

    • 3-Hands on lab_Create Cookbook and Reipe in Chef workstation

    • 4-Hands on lab install apache and ngnix in ruby script

    • 3-4_All Recipe

    • 5-Deep Dive Hands on lab_What is Attribute in chef

    • 5-Notes_Deep Dive Hands on lab

    • 7-Part_2_What is run list, How to execute multiple Recipe and Cookbook

    • 7-Include Recipe

    • 8-How we connect workstation to chef-server

    • 8-How to share folder and files in VMware Virtual_Machine

    • 8-How to share folder and files in VMware Virtual_Machine

    • 9-Connect Chef Server with Nodes on Linux

    • 10-From the chef workstation upload cookbook on the chef server and attach run_list

    • 11-Automare Node and create web server_Part_1

    • 12-Automare Node and create web server_Part_2

    • 12-Automare Node and create web server_Part_2

    • 13-What is Role_How to Delete Chef-cookbook-nodes and clients part_1

    • 13-What is Role part_1

    • 14-Create Role in Chef, Create 5 Instan in AWS Linux Machhine_Part-2

    • 15-What is Role_How to Connect 5-Node from Chef-Server_Part-3-

    • 15-What is Role part_2

    • 16-What is Role, How to attach role from Node_Part-4

    • 17-What is a role, How to fully automate in 5 nodes in 1 minute_Part-5

    • Chef Interview Question

    • Chapter#5 Splunk

    • 1-Introduction to Splunk Understanding Splunk_s Capabilities and Features

    • 2-Why We Need Splunk tool and Splunk Fundamentals Introduction to Splunk and its Capabilities

    • 3-How Splunk Changed the Game A Look at the History of Splunk

    • 4-Splunk Architecture Explained Key Components and Design Principles

    • 5-Installing Splunk_ Step-by-step installation process of Splunk on a Windows machine

    • 6-Comprehensive Splunk Installation on AWS Linux and Ubuntu A Complete Walkthrough

    • 7-Applying for a Splunk License Step-by-Step Instructions for Obtaining and Applying a Splunk License

    • 8-Introduction to the Splunk Interface Overview of the Splunk user interface and its components

    • 9-Installing the License Step-by-step guide to install the license in Splunk on AWS Ubuntu

    • 10-A Beginner's Guide_Importing Data, dashboards to monitor and visualize data trends

    • A Beginner's Guide_Importing Data, dashboards to monitor and visualize data trends

    • 11-Using Filters and Fields Filtering and refining search results using field extractions and search filters

    • 12-Part_1_Combining Commands Using multiple search commands together to create more complex search queries

    • 13-Part_2_Combining Commands Using multiple search commands together to create more complex search queries

    • 14-Using Apps and Add-ons Exploring the features and functionality of installed apps and add-ons in Splunk

    • 15-Monitoring Website Availability and Downtime with Splunk

    • Feedback

  • 11

    Team-City (DevOps Open Source Tools)

    • 1: TeamCity Introduction

      FREE PREVIEW
    • 2: TeamCity Installation as Docker Container and on Window OS

    • 3: TeamCity Installation on Ubuntu

    • 4: Configure and Run TeamCity First Build

    • 5: Gradle Docker Project in TeamCity with complete Build Steps and Connections

    • 6: Triggers in TeamCity

    • 7: Mapping TeamCity with Jenkins Final Lecture

  • 12

    Test Sigma (DevOps Open Source Tools)

    • 1_introduction

    • 2_Overview first Test Case

    • 3_Test suite and test plan

    • 4_IF-Statement loops reuse Steps

    • 5_Cross Browsing And Creating Agent To Run On Local Device

    • 6_Rest Api https Methods

    • 7_Get Request

    • 8_Post Request

    • 9_Put And Delete Request

    • 10_Sequential Request Store Response

    • 11_Environment Variables

    • Assigning security Group To Instance

  • 13

    Gradle (DevOps Open Source Tools)

    • 1-Getting Started with Gradle__A Beginner_s Guide

    • 2- 9_Reasons Why You Need Gradle for Efficient Build Automation

    • 3-From Ant and Maven to__Gradle__A Brief History of Build Automation Tools

    • 4-how to install Gradle in Windows

    • 5-How to install Gradle on AWS Ubuntu Machine

  • 14

    Terraform (DevOps Open Source Tools)

    • 1_Terraform Introduction

    • 2_Terraform Installation Windows_Linux

    • 3_Terraform Basics Demos for Providers And Terraform Initialization - Made with Clipchamp

    • 4_Terraform Basics AWS Setup

    • 5_Terraform Basics Create Instance Through Terraform

    • 6_Terraform Basics Centralized File For-Credentials

    • 7_Terraform Basics Setting Environment Variables of Credentials

    • 8_Terraform Basics Creating Multiple Instances

    • 9_Terraform Basics_Terraform State file

    • 10_Detailed Coverage Of Variables

    • 11_Terraform variables List And Map

    • 12_terraform Functions and tfvar files

    • 13_ Create keyPair-through terraform

    • 14_Assign pair to Instance

    • 15_Use of terraform validate and fmt commands_create sg_through terraform_useOfLoops

    • 16_Assigning security Group_ToInstance

    • 17:_Passing User's Data Through Terraform -

    • 18_Provisioner: Use Of File Provisioner

    • 20_initialization 2

    • 21_User_Date_Through_Terraform - Made with Clipchamp

    • Terraform Tool

  • 15

    Puppet (DevOps Open Source Tools)

    • 1-Introduction to Puppet

    • 2 - Puppet Learning VM

    • 3 - Installing Puppet Open-Source on VirtualBox in local machine

    • 4 - Puppet Important Configurations and Config files

    • 5 - Puppet resource Syntax and Example lab

    • Puppet resource Syntax and Example lab (Code)

    • 6 - Puppet Resources Manifest files Different and Default Agent Assigning and Variables

    • 7 - Using Loops and Conditions in Puppet Manifest

    • puppet 7.23.0 Docmentation

  • 16

    New Relic (DevOps Open Source Tools)

    • 1 - Introduction to New Relic and its OverView

    • Introduction

    • 2 - Installation on Linux and Windows to start getting Infrastructure Logs

  • 17

    Circleci (DevOps Open Source Tools)

    • 1-Introduction

    • 2-Yaml

    • 3-pythonProjectTesting

    • 4-NodejsConfiguration

  • 18

    Consul (DevOps Open Source Tools)

    • 1. Introduction to Consul

    • Introduction

    • 2. Installing Consul Server and its Important Configuration Files

    • 3. Installing Consul Agent and connecting with Server

    • 4. Consul Service registration and DNS Resolving

    • 6. Configuring Health Checks in Consul

    • 5. Service Register DeRegister and put get modify data in consul

  • 19

    git_github (DevOps Open Source Tools)

    • Intro

    • Staging

    • Gitcheckout gitlog gitdiff git rm Made with Clipchamp

    • Gitignor Branches

    • Github

    • Git Revert Reset Github Actions

  • 20

    Sensu (DevOps Open Source Tools)

    • 1-Introduction to Sensu Monitoring Tool

    • 2-How to Create Sensu_Server on AWS ubuntu Machine

    • 3-How to Install Sensu_Server on AWS ubuntu Machine

    • 4-Install sensu agent and Cli on aws Ubuntu machine

  • 21

    Jenkins & Maven (DevOps Open Source Tools)

    • What is jenkins

    • Jenkins installation

    • Jenkins automate the job

    • Jenkin-pipeline - Project

    • Introduction Of Maven

    • Maven-installation

    • Life-cycle

    • How Maven work

    • Maven project

    • Maven-project

  • 22

    Nagios (DevOps Open Source Tools)

    • 1-What is Continuous_Monitoring and Whay we need Continuous-Monitoring

    • 2-What is Nagios and Countinuous Monitoring

    • 3-Continuous_Monitoring, History of Nagios and why we need Nagios tool

    • 4-Features of Nagios_Tools And Phases of Continuous Monitoring

    • 5-Deep Dive Understand in Nagios Architecture_Nagios How does it work

    • 6-How to create Nagios_Server on AWS-Amazon-Linux-Machine

    • 7-(Part-1) Installation Nagios-Server on Amazon AWS Linux Machine

    • 8-(Part-2) Installation Nagios-Server on Amazon AWS Linux Machine

    • 9-Installation on AWS Amazon Linux Machine Nagios Client Nrpe-Agent Configuration

    • 10-Client Monitoring on AWS Amazon Linux Machine and Nagios Client Nrpe-Agent Configuration

    • 11-All Commands

    • 12-How to send alert SMS SMTP (Simple Mail Transfer Protocol) from Nagios in Gmail Account

    • 13-Create Windows-Client and Monitor Windows-Clients from Nagios Core

  • 23

    Kubernetes & Cloud Native Associate (KCNA)

    • KCNA Intro

      FREE PREVIEW
    • 1. Re-cap - What is a Docker

    • 2. Re-cap - What are Containers

    • 3. Demo - Docker

    • 4. Container Orchestration

    • 5. Kubernetes Architecture

    • 6. Kubernetes Components

    • 7. What is CRI - a brief History_1

    • 8. What is POD

    • Notes - What is POD

    • 9. Demo - POD

    • 10. POD with yaml

    • 11. Demo - POD with yml

    • POD with YAML

    • 12. Replica sets

    • 13. Demo - Replica sets

    • Replica Sets

    • 14. Deployments

    • Deployments

    • 14a. Use Cases - Deployments

    • 15. Demo - Deployments

    • 16. Rolling Updates and Rollbacks

    • 17. Imperative vs Declarative

    • Imperative vs Declarative

    • 18. Namespaces

    • 3-Scheduling - 19. Manual Scheduling

    • 20. Labels _ Selectors

    • 21. Taints _ Tolerations

    • Notes - Taints & Tolerations

    • 22. Node Selectors

    • 23. Node Affinity

    • Node Affinity

    • 24. Taints _ Tolerations vs Node

    • 25. Resouce Limits

    • 26. DaemonSets

    • 27. Static Pods

    • 28. Multiple Schedulers

    • 29. Security - Kubernetes Security

    • 30. Authentication

    • 31. Authorization

    • 32. Cluster Roles

    • 33. Service Accounts

    • 34. Network Policies

    • 35. Cluster Networking

    • 36. Pod Networking

    • 37. DNS in Kunernetes

    • 38. Sidecars

    • 39. Envoy

    • 40. Monolithic vs Microservices

    • 41 Service Mesh

    • 42. Autoscaling

    • 43. Horizontal Pod Autoscaler

    • 44. Vertical Pod Autoscaler

    • 45. Cluster Auto Scaler

    • 46. Serverless

    • 47. Open Standards

    • 48.Observability Fundamentals

    • 49. SLI-SLO-SLA

    • 50. Cost Management

    • 51. Conclusion

  • 24

    Kubernetes Application Developer

    • Chapter 0 Introduction To The Course

      FREE PREVIEW
    • Skills & Opportunities

      FREE PREVIEW
    • 1.1 Introduction

      FREE PREVIEW
    • Chapter 2 2.1. Containers Overview

      FREE PREVIEW
    • 2.2. Container Orchestration

    • 2.3. Kubernetes Architecture

    • 3.1: Introduction to all tools

    • 3.2: Cluster configuration using kind tool

    • 3.3: Cluster configuration using minikube

    • 3.4: Cluster configuration using kubeadm

    • setup-hosts.sh

    • update-dns.sh

    • Vagrantfile

    • Websites where you can practice kubernetes

    • Working with Single Container Pods 5.1.1

    • Working with Multi-container Pods 5.1.2.1

    • Working with Sidecar Multi-Container Pods 5.1.2.2

    • Working with Ambassador Multi-Container Pods 5.1.2.3

    • Init-Container Pods Hands-On 5.1.3

    • Replication Controller Explained 5.2.1

    • Replication Controller Hands-On 5.2.2

    • ReplicaSet Hands-On 5.3

    • Deployment Explained 5.4.1

    • Deployments Hands-On 5.4.2

    • Deployments -- Updates and Rollbacks Explained 5.4.3

    • Deployments -- Updates and Rollbacks Hands-On 5.4.4

    • Deployment Strategies Explained 5.4.5

    • Blue-Green Deployment Strategy Hands-On

    • Canary Deployment Strategy Hands-On 5.4.7

    • Namespaces Explained 5.5.1

    • Namespaces Hands-On 5.5.2

    • Jobs Explained 5.6.1

    • Jobs Hands-On 5.6.2

    • CronJob Explained & Hands-On 5.7.1

    • Imperative Commands in Kubernetes Explained 5.8.1

    • Imperative Commands in Kubernetes Hands-On 5.8.2

    • Imperative Commands For Kubernetes

    • Chapter 6 Pre-requisite -- Commands & Arguments in Docker

    • Commands & Arguments in Kubernetes Hands-On

    • Working with Environment Variables

    • Configmaps Explained

    • Configmap Hands-On

    • Secrets Explained

    • Secrets Hands-On

    • Pre-requisite -- Docker Security Explained

    • Security Context Explained & Hands-On

    • Service Accounts Explained

    • Service Account Hands-On

    • Resource Requirements Explained

    • Resource Requirements Hands-On

    • Taints and Tolerations Explained

    • Taints and Tolerations Hands-On

    • Node Selector Explained

    • Working with Node Selector

    • Node Affinity Explained

    • Node Affinity Hands-On

    • Taints and Tolerations vs Node Affinity

    • Labels, Selectors and Annotations Explained

    • Labels, Selectors and Annotations Hands-On

    • Chapter 7- 1. Readiness Probe Explained

    • 2. Liveness Probe Explained

    • 3. Readiness and Liveness Probe Hands-On

    • 4. Container Logging Explained & Hands-On

    • 5. Monitoring and Debugging Applications Explained

    • 6. Monitoring and Debugging Applications Hands-On (Part-1)

    • 7. Monitoring and Debugging Applications Hands-On (Part-2)

    • Chapter 8- 1. Service and Node Port Service Explained

    • 2. ClusterIP Service Explained

    • 3. NodePort Service and ClusterIP Service Hands-On

    • 4. Ingress Networking Explained (Part - 1)

    • 5. Ingress Networking Explained (Part - 2)

    • 6. Ingress Hands-On (Part - 1)

    • 7. Ingress Hands-On (Part - 2)

    • 8. Ingress Hands-On (Other Clusters)

    • 9. Network Policies Explained

    • 10. Developing Network Policies

    • 11. Network Policies Hands-On (Part - 1)

    • 12. Network Policies Hands-On (Part - 2)

    • 13. Network Policies Hands-On (Part - 3)

    • 14. Network Policies Hands-On (Part - 4)

    • Feedback

  • 25

    Kubernetes Administrator

    • 1. Section Introduction

      FREE PREVIEW
    • 2. Kubernetes Architecture -- Part 1

    • 3. Kubernetes Architecture -- Part 2

    • 4. Kubernetes Architecture -- Part 3

    • 5. Understanding ETCD -- Part 1

    • 6. Understanding ETCD -- Part 2

    • 7. Understanding ETCD -- Part 3

    • 8. Understanding ETCD -- Part 4

    • 9. Understanding ETCD -- Part 5

    • 10. ETCD Demo

    • 11. How ETCD works with Kubernetes -- Part 1

    • 12. How ETCD works with Kubernetes -- Part 2

    • 13. How ETCD Works with Kubernetes -- Slides

    • 14. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 1

    • 15. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 2

    • 16. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 3

    • 17. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 4

    • 18. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 5

    • 19. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 6

    • 20. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 7

    • 21. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 8

    • bootstrap.sh

    • Vagrantfile

    • Step by Step Instructions to Provision ETCD cluster

    • 22. ETCD common commands to Strat with

    • 23. How ETCD works with Kubernetes -- DEMO using minikube

    • 24. ETCD Assignment

    • 25. Working with Single Container Pods

    • 26 [Associated with Previous Video] Yaml files demonstrated in Video

    • 27. Multi-container Pods Explained

    • 28. Working with Sidecar Multi-Container Pods Hands-On

    • 29. Working with Ambassador Multi-Container Pods Hands-On

    • 30. Init-Container in Pods Hands-On

    • 31. ReplicaSet Hands-On

    • 32. Deployments Explained

    • 33. Deployments Hands-On

    • 34. Deployments -- Updates and Rollbacks Explained

    • 35. Deployments -- Updates and Rollbacks Hands-On

    • 36. Deployment Strategies Explained

    • 37. Blue-Green Deployment Strategy Hands-On

    • 38. Canary Deployment Strategy Hands-On

    • 39. Service and NodePort Service Explained

    • 40. ClusterIP Service Explained

    • 41. NodePort Service and ClusterIP Service Hands-On

    • 42. Network Policies Explained

    • 43. Developing Network Policies

    • 44. Volumes Explained

    • 45. Volumes in minikube Hands-on

    • 46. Persistent Volumes(PV) Explained

    • 47. Volumes in Kubeadm Hands-On

    • 48. Persistent Volume Claims(PVC) Explained

    • 49. Persistent Volume and Persistent Volume Claim Hands-On (Part - 1)

    • 50. Persistent Volume and Persistent Volume Claim Hands-On (Part - 2)

  • 26

    Kubernetes Security (CKS)

    • 0. Presentation for CKS

    • CKS Presentation

    • 1. Cluster Setup

    • 1. Cluster Setup

    • 1-Using Network Security Policies to Restrict Cluster Level Access

    • 2. Reviewing Security Configuration with CIS Benchmark

    • 2-Reviewing Security Configuration with CIS Benchmark on Minikube

    • 3. Properly Setting Up Ingress Objects with Security Control

    • 3-Properly Setting Up Ingress Objects with Security Control

    • 4 Protecting Node Metadata and Endpoints in a Kubernetes Cluster

    • 5. Minimizing Use and Access to GUI Elements

    • 5. Minimizing Use and Access to GUI Elements

    • 6. Verify platform binaries before deploying

    • 6. Verify platform binaries before deploying

    • 7. Restricting Access to the Kubernetes API Server

    • 7. Restricting Access to the Kubernetes API Server

    • 8 - 9. RBAC - Exercise caution in using service accounts.-

    • 8-Using Role-Based Access Control (RBAC) to Minimize Exposure in Kubernetes

    • 9-Exercising Caution with Service Accounts in Kubernetes

    • 10. Update Kubernetes frequently

    • 11. Minimize host OS footprint

    • 11-Minimizing Host OS Footprint

    • 12. Minimize IAM roles

    • 12-Minimizing IAM Roles in Your AWS Account

    • 13. Minimize external access to the network

    • 13-Minimize external access to the network

    • 14.1 Using Kernel Hardening Tools: App Armor

    • 14.2. Using Kernel Hardening Tools_ seccomp

    • 14.2. Using Kernel Hardening Tools: seccomp

    • 1-Intro-Minimizing-Microservice-Vulnerabilities

    • 1-Introduction-Minimize-Microservice-Vulnerabilities

    • 2-Explaination-Security-Contexts

    • 3-Practical-Security-Contexts

    • 4-Pod Security Policies _ Open Policy Agent

    • Practical Hands On

  • 27

    Devops Cloud Labs(AWS)

    • AWS EC2 Case Studies

      FREE PREVIEW
    • AWS EC2 Overview

    • Amazon EC2 Features

    • AWS EC2 - Pricing

    • AWC EC2 Hands-On Lab

    • 1_AWS Config Case Studies

    • 2_AWS Overview Config

    • 3_AWS Config Features

    • 4_ AWS Config Pricing

    • 5_AWS Config Hands-On Lab

    • 1_AWS OpsWorks Case Studies

    • 2_AWS OpsWorks Overview

    • 3_AWS OpsWorks Features

    • 4_AWS OpsWorks - Pricing

    • 5_AWS Opsworks HOL (LAB)

    • 1_AWS CloudFormation Case Studies

    • 2_ AWS Cloudformation Overview

    • 3_AWS Cloudformation features

    • 4._AWS CloudFormation Pricing

    • 5_AWS Cloud Formation HOL

    • 1_AWS Systems Manager Case Studies

    • 2_AWS System Manager Overview detail

    • 3_AWS System Manager Overview

    • 4_AWS Systems Manager Features

    • 5_AWS System Manager Pricing

    • 1: AWS Lambda Case Studies

    • 2: AWS Lambda OverView

    • 3a: AWS Lambda Features 1

    • 3b: AWS Lambda Features 2

    • 4: AWS Lambda - Pricing

    • 5: AWS Lambda HOL

    • 1_AWS CloudWatch Case Studies

    • 2_AWS CloudWatch Overview

    • 3_Amazon Cloudwatch Features

    • 4_AWS CloudWatch - Pricing

    • 5_AWS CLoudwatch (LAB)

    • 1_AWS codedeploy Case Studies

    • 2_AWS CodeDeploy Overview

    • 3_AWS CodeDeploy Features

    • 4_AWS CodeDeploy - Pricing

    • 5_AWS Code Deploy HOL

    • 1_AWS S3 Case Studies

    • 2_AWS S3 Overview

    • 3_AWS - S3 - Pricing

    • 4_S3 HOL

    • 1_AWS CloudFront Case Studies

    • 2_AWS Cloudfront Overview

    • 3_AWS CloudFront Features

    • 4_AWS - CloudFront Pricing

    • 5_AWS Cloudfront HOL

    • 1_AWS codecommit Case Studies

    • 2_AWS CodeCommit Overview

    • 3_AWS Code Commit Features

    • 4_AWS CodeCommit - Pricing

    • 5_AWS Code Commit HOL

    • AWS cloudtrail Case Studies

    • AWS CloudTrail Overview

    • AWS CloudTrail - Pricing

    • AWS Cloudtrail Hands-On Lab

    • AWS Elastic Beanstalk Case Studies

    • AWS Elastic-Bean-Stalk Overview

    • Elastic Beanstalk Features

    • AWS Elastic Beanstalk - Pricing

    • Elastic Beanstalk Hands-On Lab

    • AWS codepipeline Case Studies

    • AWS CodePipeline Overview

    • Code pipeline Features

    • AWS CodePipeline - Pricing

    • AWS Xray Case Studies

    • AWS X-Ray Overview

    • X-Ray Features

    • AWS X-Ray - Pricing

    • AWS codestar Case Studies

    • AWS CodeStar Overview

    • CodeStar Features

    • AWS CodeStar - Pricing

    • AWS RDS Case Studies

    • AWS RDS Overview

    • Amazon RDS Features

    • AWS - RDS - Pricing

    • AWS- RDS Hands-On Lab

    • AWS Elastic Container Service Case Studies

    • AWS Elastic Container Service Overview

    • Amazon Elastic Container Service Features

    • AWS Elastic Container Service (ECS) - Pricing

    • AWS Elastic Container Service Hands-On Lab

    • AWS Fargate Case Studies

    • AWS Fargate Overview

    • AWS - Fargate - Pricing

    • AWS App Runner Case Studies

    • AWS App Runner Overview

    • Aws App Runner Features

    • AWS - AppRunner - Pricing

    • AWS Systems Manager Case Studies

    • AWS System Manager Overview

    • Systems Manager Features

    • AWS System Manager - Pricing

    • AWS Systems Manager Hands-On Lab

    • AWS EC2 Image Builder Case Studies

    • AWS EC2 Image Builder Overview

    • AWS MicroServices Overview

    • AWS Microservices features

  • 28

    Kubernetes & Cloud-Native Security Associate (KCSA)

    • 1. Course Introduction _ Prerequisite

    • 2 - The 4Cs of Cloud Native Security

    • 2 - Understanding the 4Cs of Cloud Native Security

    • 3 - A Cloud Provider and Infrastructure Security

    • 3 - Cloud Provider Infrastructure Security

    • 4 - Controls and Frameworks

    • 4 Controls and Frameworks

    • 5-1 Isolation Techniques

    • 5 - Isolation Techniques

    • 5-2 Isolation Techniques Checklist

    • 6 - Artifact Repository and Image Security

    • 6-1 Introduction to Artifact Repository and Image Security

    • 7 - Workload and Application Code Security

    • 7-1 Workload and Application Code Security

    • Section 2 : Kubernetes Cluster Component Security

    • 2.1. API Server part 1

    • 2.1. API Server part 2

    • 2.1. API Server

    • 2.2. Controller Manager

    • 2.2. Controller Manager

    • 2.3. Scheduler

    • 2.3. Scheduler

    • 2.4. kubelet

    • 2.4. kubelet

    • 2.5. Container Runtime

    • 2.5. Container Runtime

    • 2.6. KubeProxy

    • 2.6. Kube Proxy

    • 2.7. Pod

    • 2.7. Pod

    • 2.8. Etcd

    • 2.8. Etcd

    • 2.9. Continer Networking

    • 2.9. Container Networking

    • 2.10. Client Security

    • 2.10. Client Security

    • 2.11. Storage

    • 2.11. Storage

    • Section 3 Kubernetes Security Fundamentals

    • 3.1. Pod Security Standards

    • 3.1. Pod Security Standards

    • 3.2. Pod Security Admissions

    • 3.2. Pod Security Admissions

    • 3.3. Authentication

    • 3.3. Authentication

    • 3.4. Authorization

    • 3.4. Authorization

    • 3.5. Secrets

    • 3.5. Secrets

    • 3.6. Isolation and Segmentation

    • 3.6. Isolation and Segmentation

    • 3.7. Audit Logging

    • 3.7. Audit Logging

    • 3.8. Network Policy

    • Section 4 Kubernetes Threat Model

    • 4.1. Kubernetes Trust Boundaries and Data Flow

    • 4.1 Kubernetes Trust Boundaries and Data Flow

    • 4.2. Persistence

    • 4.2. Persistence

    • 4.3. Denial of Service

    • 4.3. Denial of Service

    • 4.4. Malicious Code Execution and Compromised Applications in Containers

    • 4.4. Malicious Code Execution and Compromised Applications in Containers

    • 4.5. Attacker on the Network

    • 4.5. Attacker on the Network

    • 4.6. Access to Sensitive Data

    • 4.6. Access to Sensitive Data

    • 4.7. Privilege Escalation

    • 4.7. Privilege Escalation

    • Section 5 Platform Security - 1. Supply Chain Security

    • 2. Image Repository

    • 3. Observability _ Service Mesh

    • 4. PKI

    • 5. Connectivity _ Admission Control

    • 1. Compliance Frameworks

    • 2. Threat Modelling Frameworks

    • 3. Supply Chain Compliance

    • 4. Automation and Tooling

    • 5. Conclusion