Course curriculum
-
1
How to access container based labs
-
Please see the video to learn how you can utilise our containers to perform hands on labs
-
-
2
DevOps Docker Deep Dive
-
Introduction DevOps Administrator
FREE PREVIEW -
Lecture 1 : DevOps Architecture | Trainer Profile | Introduction to Docker
-
Introduction Docker lecture Document
-
Lecture 2 : Docker installation and compose
-
Lecture 3 : Introduction to Docker File and Docker commands
-
Lecture 4: Docker Busy Box and Alpine image concepts with example.
-
Lecture 5 : Understand Docker file and Docker file creation.
-
Lecture 6 : Practical Phase One - Part - 1 - with Solution.
-
Lecture 7 : Docker Pull and Push Commands.
-
Lecture 8 : Create Docker Image from Docker Container
-
Lecture 9 : Docker Port Mapping.
-
Lecture 10 : Deploy an Application In Docker.
-
Lecture 11 : Practical Phase 1 [ Part - 2 ] with Solution.
-
Lecture 12 : Practical Phase 2 with Solution.
-
Lecture 13 : Introduction to Docker Volume.
-
Lecture 14 : Docker Volume type explanation with Hands on.
-
Lecture 15 : Docker Image variants and Change default Docker path.
-
Lecture 16 : Docker Multi stages.
-
Lecture 17 : Hands-On Docker Compose
-
Lecture 18 : Docker Data Container with Hands-On.
-
Lecture 19 : Practical Phase 3 with Solution.
-
Lecture 20 : Docker file understand with useful keywords.
-
Lecture 21 : Docker image push and pull to AWS ECR.
-
Lecture 22 : Deploy Docker app to AWS ECS.
-
Lecture 23 : Docker image push and Pull from GitHub and GitLab repository.
-
Lecture 24 : Practical Phase 4 with Solution.
-
Lecture 25 : GitLab Workflow automation using CICD pipeline.
-
Lecture 26 : Docker image push from GitLab to AWS ECR using CICD pipeline.
-
Lecture 27 : GitHub build image to AWS ECR using CICD pipeline.
-
Lecture 28 : Introduction to Docker Networking.
-
Lecture 29 : Docker Network with Hands On.
-
Lecture 30 : Docker linking with two containers.
-
Lecture 31 : Docker Swarm
-
Lecture 32 : Local repository in Docker.
-
Lecture 33 : Docker Monitoring.
-
Lecture 34 : Docker Secrets | Docker Stack | Jboss Deployment using Docker.
-
Lecture 35 : Docker Alias.
-
Lecture 36 Archive your image and container
-
37 : DevOps admin work profile and interview questions.
-
Docker Quiz
-
Feedback
-
-
3
Bash Script Deep Dive
-
Lecture 1: Introduction to Bash Script.
FREE PREVIEW -
Lecture 2 : Understanding echo and read command.
FREE PREVIEW -
Lecture 3 : Lecture 3: How to write your script and Understanding Debugging MODE
-
Lecture 4 : Introduction to Linux editor | tr | xargs | seq commands
-
Lecture 5 : Conditional Statement in bash script [ PART - 1 ].
-
Lecture 6 : Conditional Statement in Bash script [ PART - 2 ]
-
Lecture 7 Introduction to Nested if condition in Bash script.
-
Lecture 8 : Positional parameter in Bash script
-
Lecture 9 : Introduction to Loops in Bash script.
-
Lecture 10 : For loop in Bash script.
-
Lecture 11 : While loop in Bash script.
-
Lecture 12 : Until Loop in Bash Script.
-
Lecture 13 : Select Loop in Bash script.
-
Lecture 14 : Introduction to Echo commands flag and Advance bash script commands.
-
Lecture 15 : Positional Parameter with shift commands.
-
Lecture 16 : Control and Break statement in Bash script.
-
Lecture 17 : Practical Phase 1 - Solution
-
Lecture 18 : String operation in Bash Script.
-
Lecture 19 : Understanding to Array in Bash script.
-
Lecture 20 : Understanding to Function in Bash Script.
-
Lecture 21 : Filter grep commands in bash script.
-
Lecture 22 : Filter cut commands in bash script.
-
Lecture 23 : AWK commands in Bash script.
-
Lecture 24 : AWK script in Bash script.
-
Lecture 25 : SED commands in bash script.
-
Lecture 26 : Understanding find commands.
-
Lecture 27 : Scheduling task in bash script.
-
Lecture 28 : Realtime Hands-on practical in bash script. [ Part - 1 ]
-
Lecture 29 : Realtime Hands-on practical in bash script. [ Part - 2]
-
Lecture 30 : Practical Phase 2 - Solution.
-
Bash Script Quiz
-
Feedback
-
-
4
Python Automation
-
Lecture 1 : Lecture Introduction to Python.
FREE PREVIEW -
Lecture 3 : Python basic commands and installation Pycharm.
-
Lecture 4 : Variables and Data types in Python.
-
Lecture 5 : Python type casting and print format in Python.
-
Lecture 6 : Escape sequences and comments in Python.
-
Lecture 7 : Condition in Python.
-
Lecture 8 : String operation in python [ Part - 1 ]
-
Lecture 9 : String operation in python [ Part - 2 ]
-
Lecture 10 : List Data structure in python [ Part - 1 ]
-
Lecture 11 : List Data Structure in python [ Part - 2 ]
-
Lecture 12 : Tuple data structure in python.
-
Lecture 13 : Dictionary data structure in Python [ Part - 1 ]
-
Lecture 14 : Dictionary data structure in Python [ Part - 2 ]
-
Lecture 15 : How to work with modules in python.
-
Lecture 16 : OS module in python [ Part - 1 ]
-
Lecture 17 : OS module in python [ Part - 2 ]
-
Lecture 18 : OS module in python [ Part - 3 ]
-
Lecture 19 : OS Module in python [ Part - 4 ]
-
Lecture 20 : Platform module in Python.
-
Lecture 21 : Command line arguments module in python.
-
Lecture 22 : Python Loop [ Part - 1 ]
-
Lecture 23 : Python Loop [ Part - 2 ]
-
Lecture 24 : Practical Session - Phase one Solution.
-
Lecture 25 : Control Statement in python.
-
Lecture 26 : Practical session - Phase two solution.
-
Lecture 27 : Python Function [ Part - 1 ]
-
Lecture 28 : Python Function [ Part - 2 ]
-
Lecture 29 : Exception Handling [ Part - 1 ]
-
Lecture 30 : Exception Handling [ Part - 2 ]
-
Lecture 31 : Datetime module in python [ Part - 1 ]
-
Lecture 32 : Datetime module in python [ Part - 2 ]
-
Lecture 33 : File Handling [ Part - 1 ]
-
Lecture 34 : File handling [ Part - 2 ]
-
Lecture 35 : File handling [ Part - 3 ]
-
Lecture 36 : File handling [ Part - 4 ]
-
Lecture 37 : File Handling [ Part - 5 ]
-
Lecture 38 : File Handling [ Part - 6 ]
-
Lecture 39 : Email module [ Part - 1 ]
-
Lecture 40 : Email Module [ Part - 2 ]
-
Lecture 41 : Scheduler in python [ Part - 1 ]
-
Lecture 42 : Regular expression in python [ Part - 1 ]
-
Lecture 43 : Regular expression in Python [ Part - 2 ]
-
Lecture 44 : Regular Expression in Python [ Part - 3 ]
-
Lecture 45 : Regular Expression in Python [ Part - 4 ]
-
Lecture 46 : Regular Expression in Python [ Part - 5 ]
-
Lecture 47 : Remote Server Module in Python [ Part - 1 ]
-
Lecture 48 : Remote Server Module in Python [ Part - 2 ]
-
Lecture 49 : Remote server module in python [ Part - 3 ]
-
Lecture 50 : Remote server module in python [ Part - 4 ]
-
Lecture 51 : remote server module in Python [ Part - 5 ]
-
Lecture 52 : Working with Database module in Python [ Part -1 ]
-
Lecture 53 : Working with Database module in python [ Part -2 ]
-
Lecture 54 : Working with Database module In python [ Part - 3 ]
-
Lecture 55 : Working with database module in Python [ Part - 4 ]
-
Lecture 56 : Working with database module in Python [ Part -5 ]
-
Lecture 57 : Real-World Project [ Part -1 ]
-
Lecture 58 : Real-World Project [ Part - 2 ]
-
Lecture 59 : Real-World Project [ Part - 3 ]
-
Quiz
-
Feedback
-
-
5
Python Selenium
-
Lecture 1 : Introduction to Python Selenium.
FREE PREVIEW -
Lecture 2 : Python Selenium Architecture.
FREE PREVIEW -
Lecture 3 : Installation Python selenium.
-
Lecture 4 : Working with Different browser [ part - 1 ]
-
Lecture 5 : Working with Different Browser [ Part - 2 ]
-
Lecture 6 : Working with Web Driver Manager.
-
Lecture 7 : Web Elements in Python Selenium [ Part - 1 ]
-
Lecture 8 : Web Elements in Python Selenium [ Part - 2 ]
-
Lecture 9 : Web Elements in Python Selenium [ Part - 3 ]
-
Lecture 10 : Web Elements in Python Selenium [ Part - 4 ]
-
Lecture 11 : Synchronization issue [ Part - 1 ]
-
Lecture 12 : Synchronization issue [ Part - 2 ]
-
Lecture 13 : Synchronization issue [ Part -3 ]
-
Lecture 14 : Working with Different elements [ Part - 1 ]
-
Lecture 15 : Working with Different elements [ Part - 2 ]
-
Lecture 16 : Working with Different elements [ Part - 3 ]
-
Lecture 17 : Working with Different elements [ Part - 4 ]
-
Lecture 18 : CSS Selectors in Python Selenium.
-
Lecture 19 : XPATH in Python Selenium [ Part - 1 ]
-
Lecture 20 : XPATH in Python Selenium [ Part - 2 ]
-
Lecture 21 : XPATH in Python Selenium [ Part - 3 ]
-
Lecture 22 : Handling complex elements in Python Selenium [ Part - 1 ]
-
Lecture 23 : Handling complex elements in Python Selenium [ Part - 2 ]
-
Lecture 24 : Handling complex elements in Python Selenium [ Part - 3 ]
-
Practical Assignments
-
Lecture 25 : Options in Python Selenium [ Part - 1 ]
-
Lecture 26 : Screenshot in Python Selenium [ Part - 1 ]
-
Lecture 27 : Screenshot in Python Selenium [ Part - 2 ]
-
Lecture 28 : Screenshot in Python Selenium [ Part - 3 ]
-
Lecture 29 : Pytest in python Selenium [ Part - 1 ]
-
Lecture 30 : Pytest in python selenium [ Part - 2 ]
-
Lecture 31 : Pytest in python selenium [ Part - 3 ]
-
Lecture 32 : Pytest in python selenium [ Part - 4 ]
-
Lecture 33 : Practical Session 33 [ Part - 1 ]
-
Lecture 34 : practical Session [ Part - 2 ]
-
Lecture 35 : Practical Session [ Part - 3 ]
-
Lecture 36 : Selenium Grid [ Part - 1 ]
-
Lecture 37 : Selenium Grid [ Part - 2 ]
-
Lecture 38 : Selenium Grid [ Part - 3 ]
-
Lecture 39 : Selenium grid with docker [ Part - 1 ]
-
Lecture 40 : Selenium grid with Docker [ Part - 2 ]
-
Lecture 41 : Python Selenium with Jenkins and GitHub [ Part - 1 ]
-
Lecture 42 : Python Selenium with Jenkins and GitHub [ Part - 2 ]
-
Lecture 43 : Python Selenium with Jenkins and GitHub [ Part - 3 ]
-
Quiz
-
Feedback
-
-
6
JIRA With Python
-
Lab environment
-
Lecture 1 Introduction to JIRA
FREE PREVIEW -
Lecture 1 JIRA with Python.pdf
FREE PREVIEW -
Lecture 1.txt
FREE PREVIEW -
Lecture 2 Setup JIRA
-
Notes :- Lecture 2
-
Lecture 3 Understanding JIRA dashboard
-
Notes :- Lecture 3
-
Lecture 4 JIRA advance search and filter
-
Lecture 4.txt
-
Lecture 5 JIRA advance search and filter part 2
-
Notes:- Lecture 5
-
Lecture 6 JIRA Dashboards
-
Notes :- Lecture 6
-
Lecture 7 JIRA admin part 1
-
Lecture 7
-
Lecture 8 JIRA admin part 2
-
Notes :- Lecture 8
-
Lecture 9 JIRA admin part 3
-
Notes :- Lecture 9
-
Lecture 10 JIRA admin part 4
-
Notes :- Lecture 10
-
Notes :- Lecture 11 JIRA admin part 5
-
Notes :- Lecture 11
-
Lecture 12 JIRA with python
-
Notes :- Lecture 12
-
Lecture 13 JIRA with python part 2
-
Notes :- Lecture 13
-
Lecture 14 JIRA with python part 3
-
Notes :- Lecture 14
-
Lecture 15 JIRA with python part 4
-
Notes :- Lecture 15
-
.py
-
Lecture 16 JIRA with python part 5
-
Lecture 17 JIRA with python part 6
-
Lecture 18 Practical Session
-
Lecture 19 Practical Session
-
Notes :- Lecture 19
-
.py
-
Feedback
-
-
7
Python Flask
-
Lecture 1 Introduction to Flask
FREE PREVIEW -
Lecture 1 Flask Introduction
FREE PREVIEW -
Lecture 2 Introduction and understanding methods
FREE PREVIEW -
What is API ?
-
Lecture 2
-
Lecture 2
-
Lecture 3 Understand API with example
-
Lecture 4 Understand API with example part 2
-
Idea - lecture 4
-
Lecture 5 Installation Flask setup
-
Lecture 6 Database connectivty with Flask
-
Lecture 7 _ Database connectivty with Flask part 2
-
Lecture 8 Fetching data from database in Flask
-
Lecture 9 Setup Website with Flask
-
Lecture 10 Setup Website with Flask part 2
-
Lecture 11 Searchwise data in Flask
-
Lecture 12 Jira integration with Flask Part 1
-
Lecture 13 Jira integration with Flask Part 2
-
Lecture 14 Session management in Flask part 1
-
Lecture 15 Session management in Flask part 2
-
Lecture 16 Session management in Flask part 3
-
Lecture 17 Deploy Python Flask Application on Docker part 1
-
Lecture 18 Deploy Python Flask Application on Docker part 2
-
Lecture 19 Deploy Python Flask Application on Docker part 3
-
Lecture 20 Practical Assignment part 1
-
Lecture 21 Practical Assignment part 2
-
Project
-
Feedback
-
-
8
Vagrant
-
Lecture 1 Vagrant Introduction
FREE PREVIEW -
Lecture 1 Vagrant Introduction
FREE PREVIEW -
Lecture 2 Installation Vagrant
-
Lectur 2
-
Lecture 3 Creating OS using vagrant
-
Lecture 3
-
Lecture 4 Understanding box in vagrant
-
Lecture 4
-
Lecture 5 Understanding box in vagrant part 2
-
Lecture 5
-
Lecture 6 Networking in vagrant
-
Lecture 7 Syncing foder in vagrant env
-
Lecture 8 Provision in vagrant
-
Lecture 9 File Provision in vagrant
-
Lecture 10 Shell Provision in vagrant
-
Lecture 11 Automated Setup using vagrant
-
Lecture 12 managing multivm using vagrant
-
Feedback
-
-
9
Ansible
-
Lecture 1 : Introduction to Ansible
FREE PREVIEW -
Lecture 2 : Ansible Architecture.
FREE PREVIEW -
Lecture 3 : Installation of Ansible.
-
Lecture 4 : Setup of Ansible.
-
Lecture 5 : Understanding of Ansible.cfg file structure.
-
Lecture 6 : Ansible Ad-Hoc command line [ Part - 1 ]
-
Lecture 7 : Ansible Ad-Hoc command line [ Part - 2 ]
-
Lecture 8 : Ansible Ad-Hoc command line [ Part - 3 ]
-
Lecture 9 : Ansible facts [ Part - 1 ]
-
Lecture 10 : Ansible Facts [ Part - 2 ]
-
Lecture 11 : Ansible Variables
-
Lecture 12 : Understanding Ansible Playbook
-
Lecture 13: Basic Ansible playbook execution [ Part - 1 ]
-
Lecture 14: basic Ansible playbook execution [ Part - 2 ]
-
Lecture 15 : Printing message using ansible playbook
-
Lecture 16 : Copy and Fetch module in ansible playbook.
-
Lecture 17 : Understanding inventory in Ansible.
-
Lecture 18 : Copy and Fetch script data [ Part - 1 ]
-
Lecture 19 : Copy and Fetch script data [ Part - 2 ]
-
Lecture 20 : Copy and Fetch script data [ Part - 3 ]
-
Lecture 21 : Copy and Fetch script data [ Part - 4 ]
-
Lecture 22: Collect remote output in using ansible playbook.
-
Lecture 23: Collect remote output and storing to CSV file
-
Lecture 24 : When condition in ansible playbook [ Part - 1 ]
-
Lecture 25 : When condition in ansible playbook [ Part - 2 ]
-
Lecture 26 : When condition in ansible playbook [ Part - 3 ]
-
Lecture 27: Data types in ansible playbook [ Part - 1]
-
Lecture 28: Data types in ansible playbook [ Part - 2]
-
Lecture 29: Data types in ansible playbook [ Part - 3 ]
-
Lecture 30 : Reading the variable using ansible playbook [ Part - 1 ]
-
Lecture 31 : Reading the variable using ansible playbook [ Part - 2 ]
-
Lecture 32 : Command line arguments using ansible playbook
-
Lecture 33: Operators in ansible playbook.
-
Lecture 34: Loop in ansible playbook [ Part - 1 ]
-
Lecture 35: Loop in ansible playbook [ Part - 2 ]
-
Lecture 36 : Execution specific tasks using ansible playbook
-
Lecture 37 : Ansible vaults
-
Lecture 38: Ansible roles.
-
Lecture 39 : Managing EC2 services using Ansible [ Part - 1 ]
-
Lecture 40 : Managing EC2 services using Ansible [ Part - 2 ]
-
Lecture 41 : Managing EC2 services using Ansible [ Part - 3 ]
-
Lecture 42 : Windows machine connection with Ansible [ Part - 1 ]
-
Lecture 43 : Windows machine connection with Ansible [ Part - 2 ]
-
Lecture 44: Practical Assignment.
-
Feedback
-
-
10
DevOps Open Source Tools
-
Chapter#2 Chef
-
1-What is Chef_Workstation_Chef server and Node Architecture
FREE PREVIEW -
2-Installation chef-workstation on ( Centos-7_Ubuntu-AWS machine)
-
3-Hands on lab_Create Cookbook and Reipe in Chef workstation
-
4-Hands on lab install apache and ngnix in ruby script
-
3-4_All Recipe
-
5-Deep Dive Hands on lab_What is Attribute in chef
-
5-Notes_Deep Dive Hands on lab
-
7-Part_2_What is run list, How to execute multiple Recipe and Cookbook
-
7-Include Recipe
-
8-How we connect workstation to chef-server
-
8-How to share folder and files in VMware Virtual_Machine
-
8-How to share folder and files in VMware Virtual_Machine
-
9-Connect Chef Server with Nodes on Linux
-
10-From the chef workstation upload cookbook on the chef server and attach run_list
-
11-Automare Node and create web server_Part_1
-
12-Automare Node and create web server_Part_2
-
12-Automare Node and create web server_Part_2
-
13-What is Role_How to Delete Chef-cookbook-nodes and clients part_1
-
13-What is Role part_1
-
14-Create Role in Chef, Create 5 Instan in AWS Linux Machhine_Part-2
-
15-What is Role_How to Connect 5-Node from Chef-Server_Part-3-
-
15-What is Role part_2
-
16-What is Role, How to attach role from Node_Part-4
-
17-What is a role, How to fully automate in 5 nodes in 1 minute_Part-5
-
Chef Interview Question
-
Chapter#5 Splunk
-
1-Introduction to Splunk Understanding Splunk_s Capabilities and Features
-
2-Why We Need Splunk tool and Splunk Fundamentals Introduction to Splunk and its Capabilities
-
3-How Splunk Changed the Game A Look at the History of Splunk
-
4-Splunk Architecture Explained Key Components and Design Principles
-
5-Installing Splunk_ Step-by-step installation process of Splunk on a Windows machine
-
6-Comprehensive Splunk Installation on AWS Linux and Ubuntu A Complete Walkthrough
-
7-Applying for a Splunk License Step-by-Step Instructions for Obtaining and Applying a Splunk License
-
8-Introduction to the Splunk Interface Overview of the Splunk user interface and its components
-
9-Installing the License Step-by-step guide to install the license in Splunk on AWS Ubuntu
-
10-A Beginner's Guide_Importing Data, dashboards to monitor and visualize data trends
-
A Beginner's Guide_Importing Data, dashboards to monitor and visualize data trends
-
11-Using Filters and Fields Filtering and refining search results using field extractions and search filters
-
12-Part_1_Combining Commands Using multiple search commands together to create more complex search queries
-
13-Part_2_Combining Commands Using multiple search commands together to create more complex search queries
-
14-Using Apps and Add-ons Exploring the features and functionality of installed apps and add-ons in Splunk
-
15-Monitoring Website Availability and Downtime with Splunk
-
Feedback
-
-
11
Team-City (DevOps Open Source Tools)
-
1: TeamCity Introduction
FREE PREVIEW -
2: TeamCity Installation as Docker Container and on Window OS
-
3: TeamCity Installation on Ubuntu
-
4: Configure and Run TeamCity First Build
-
5: Gradle Docker Project in TeamCity with complete Build Steps and Connections
-
6: Triggers in TeamCity
-
7: Mapping TeamCity with Jenkins Final Lecture
-
-
12
Test Sigma (DevOps Open Source Tools)
-
1_introduction
-
2_Overview first Test Case
-
3_Test suite and test plan
-
4_IF-Statement loops reuse Steps
-
5_Cross Browsing And Creating Agent To Run On Local Device
-
6_Rest Api https Methods
-
7_Get Request
-
8_Post Request
-
9_Put And Delete Request
-
10_Sequential Request Store Response
-
11_Environment Variables
-
Assigning security Group To Instance
-
-
13
Gradle (DevOps Open Source Tools)
-
1-Getting Started with Gradle__A Beginner_s Guide
-
2- 9_Reasons Why You Need Gradle for Efficient Build Automation
-
3-From Ant and Maven to__Gradle__A Brief History of Build Automation Tools
-
4-how to install Gradle in Windows
-
5-How to install Gradle on AWS Ubuntu Machine
-
-
14
Terraform (DevOps Open Source Tools)
-
1_Terraform Introduction
-
2_Terraform Installation Windows_Linux
-
3_Terraform Basics Demos for Providers And Terraform Initialization - Made with Clipchamp
-
4_Terraform Basics AWS Setup
-
5_Terraform Basics Create Instance Through Terraform
-
6_Terraform Basics Centralized File For-Credentials
-
7_Terraform Basics Setting Environment Variables of Credentials
-
8_Terraform Basics Creating Multiple Instances
-
9_Terraform Basics_Terraform State file
-
10_Detailed Coverage Of Variables
-
11_Terraform variables List And Map
-
12_terraform Functions and tfvar files
-
13_ Create keyPair-through terraform
-
14_Assign pair to Instance
-
15_Use of terraform validate and fmt commands_create sg_through terraform_useOfLoops
-
16_Assigning security Group_ToInstance
-
17:_Passing User's Data Through Terraform -
-
18_Provisioner: Use Of File Provisioner
-
20_initialization 2
-
21_User_Date_Through_Terraform - Made with Clipchamp
-
Terraform Tool
-
-
15
Puppet (DevOps Open Source Tools)
-
1-Introduction to Puppet
-
2 - Puppet Learning VM
-
3 - Installing Puppet Open-Source on VirtualBox in local machine
-
4 - Puppet Important Configurations and Config files
-
5 - Puppet resource Syntax and Example lab
-
Puppet resource Syntax and Example lab (Code)
-
6 - Puppet Resources Manifest files Different and Default Agent Assigning and Variables
-
7 - Using Loops and Conditions in Puppet Manifest
-
puppet 7.23.0 Docmentation
-
-
16
New Relic (DevOps Open Source Tools)
-
1 - Introduction to New Relic and its OverView
-
Introduction
-
2 - Installation on Linux and Windows to start getting Infrastructure Logs
-
-
17
Circleci (DevOps Open Source Tools)
-
1-Introduction
-
2-Yaml
-
3-pythonProjectTesting
-
4-NodejsConfiguration
-
-
18
Consul (DevOps Open Source Tools)
-
1. Introduction to Consul
-
Introduction
-
2. Installing Consul Server and its Important Configuration Files
-
3. Installing Consul Agent and connecting with Server
-
4. Consul Service registration and DNS Resolving
-
6. Configuring Health Checks in Consul
-
5. Service Register DeRegister and put get modify data in consul
-
-
19
git_github (DevOps Open Source Tools)
-
Intro
-
Staging
-
Gitcheckout gitlog gitdiff git rm Made with Clipchamp
-
Gitignor Branches
-
Github
-
Git Revert Reset Github Actions
-
-
20
Sensu (DevOps Open Source Tools)
-
1-Introduction to Sensu Monitoring Tool
-
2-How to Create Sensu_Server on AWS ubuntu Machine
-
3-How to Install Sensu_Server on AWS ubuntu Machine
-
4-Install sensu agent and Cli on aws Ubuntu machine
-
-
21
Jenkins & Maven (DevOps Open Source Tools)
-
What is jenkins
-
Jenkins installation
-
Jenkins automate the job
-
Jenkin-pipeline - Project
-
Introduction Of Maven
-
Maven-installation
-
Life-cycle
-
How Maven work
-
Maven project
-
Maven-project
-
-
22
Nagios (DevOps Open Source Tools)
-
1-What is Continuous_Monitoring and Whay we need Continuous-Monitoring
-
2-What is Nagios and Countinuous Monitoring
-
3-Continuous_Monitoring, History of Nagios and why we need Nagios tool
-
4-Features of Nagios_Tools And Phases of Continuous Monitoring
-
5-Deep Dive Understand in Nagios Architecture_Nagios How does it work
-
6-How to create Nagios_Server on AWS-Amazon-Linux-Machine
-
7-(Part-1) Installation Nagios-Server on Amazon AWS Linux Machine
-
8-(Part-2) Installation Nagios-Server on Amazon AWS Linux Machine
-
9-Installation on AWS Amazon Linux Machine Nagios Client Nrpe-Agent Configuration
-
10-Client Monitoring on AWS Amazon Linux Machine and Nagios Client Nrpe-Agent Configuration
-
11-All Commands
-
12-How to send alert SMS SMTP (Simple Mail Transfer Protocol) from Nagios in Gmail Account
-
13-Create Windows-Client and Monitor Windows-Clients from Nagios Core
-
-
23
Kubernetes & Cloud Native Associate (KCNA)
-
KCNA Intro
FREE PREVIEW -
1. Re-cap - What is a Docker
-
2. Re-cap - What are Containers
-
3. Demo - Docker
-
4. Container Orchestration
-
5. Kubernetes Architecture
-
6. Kubernetes Components
-
7. What is CRI - a brief History_1
-
8. What is POD
-
Notes - What is POD
-
9. Demo - POD
-
10. POD with yaml
-
11. Demo - POD with yml
-
POD with YAML
-
12. Replica sets
-
13. Demo - Replica sets
-
Replica Sets
-
14. Deployments
-
Deployments
-
14a. Use Cases - Deployments
-
15. Demo - Deployments
-
16. Rolling Updates and Rollbacks
-
17. Imperative vs Declarative
-
Imperative vs Declarative
-
18. Namespaces
-
3-Scheduling - 19. Manual Scheduling
-
20. Labels _ Selectors
-
21. Taints _ Tolerations
-
Notes - Taints & Tolerations
-
22. Node Selectors
-
23. Node Affinity
-
Node Affinity
-
24. Taints _ Tolerations vs Node
-
25. Resouce Limits
-
26. DaemonSets
-
27. Static Pods
-
28. Multiple Schedulers
-
29. Security - Kubernetes Security
-
30. Authentication
-
31. Authorization
-
32. Cluster Roles
-
33. Service Accounts
-
34. Network Policies
-
35. Cluster Networking
-
36. Pod Networking
-
37. DNS in Kunernetes
-
38. Sidecars
-
39. Envoy
-
40. Monolithic vs Microservices
-
41 Service Mesh
-
42. Autoscaling
-
43. Horizontal Pod Autoscaler
-
44. Vertical Pod Autoscaler
-
45. Cluster Auto Scaler
-
46. Serverless
-
47. Open Standards
-
48.Observability Fundamentals
-
49. SLI-SLO-SLA
-
50. Cost Management
-
51. Conclusion
-
-
24
Kubernetes Application Developer
-
Chapter 0 Introduction To The Course
FREE PREVIEW -
Skills & Opportunities
FREE PREVIEW -
1.1 Introduction
FREE PREVIEW -
Chapter 2 2.1. Containers Overview
FREE PREVIEW -
2.2. Container Orchestration
-
2.3. Kubernetes Architecture
-
3.1: Introduction to all tools
-
3.2: Cluster configuration using kind tool
-
3.3: Cluster configuration using minikube
-
3.4: Cluster configuration using kubeadm
-
setup-hosts.sh
-
update-dns.sh
-
Vagrantfile
-
Websites where you can practice kubernetes
-
Working with Single Container Pods 5.1.1
-
Working with Multi-container Pods 5.1.2.1
-
Working with Sidecar Multi-Container Pods 5.1.2.2
-
Working with Ambassador Multi-Container Pods 5.1.2.3
-
Init-Container Pods Hands-On 5.1.3
-
Replication Controller Explained 5.2.1
-
Replication Controller Hands-On 5.2.2
-
ReplicaSet Hands-On 5.3
-
Deployment Explained 5.4.1
-
Deployments Hands-On 5.4.2
-
Deployments -- Updates and Rollbacks Explained 5.4.3
-
Deployments -- Updates and Rollbacks Hands-On 5.4.4
-
Deployment Strategies Explained 5.4.5
-
Blue-Green Deployment Strategy Hands-On
-
Canary Deployment Strategy Hands-On 5.4.7
-
Namespaces Explained 5.5.1
-
Namespaces Hands-On 5.5.2
-
Jobs Explained 5.6.1
-
Jobs Hands-On 5.6.2
-
CronJob Explained & Hands-On 5.7.1
-
Imperative Commands in Kubernetes Explained 5.8.1
-
Imperative Commands in Kubernetes Hands-On 5.8.2
-
Imperative Commands For Kubernetes
-
Chapter 6 Pre-requisite -- Commands & Arguments in Docker
-
Commands & Arguments in Kubernetes Hands-On
-
Working with Environment Variables
-
Configmaps Explained
-
Configmap Hands-On
-
Secrets Explained
-
Secrets Hands-On
-
Pre-requisite -- Docker Security Explained
-
Security Context Explained & Hands-On
-
Service Accounts Explained
-
Service Account Hands-On
-
Resource Requirements Explained
-
Resource Requirements Hands-On
-
Taints and Tolerations Explained
-
Taints and Tolerations Hands-On
-
Node Selector Explained
-
Working with Node Selector
-
Node Affinity Explained
-
Node Affinity Hands-On
-
Taints and Tolerations vs Node Affinity
-
Labels, Selectors and Annotations Explained
-
Labels, Selectors and Annotations Hands-On
-
Chapter 7- 1. Readiness Probe Explained
-
2. Liveness Probe Explained
-
3. Readiness and Liveness Probe Hands-On
-
4. Container Logging Explained & Hands-On
-
5. Monitoring and Debugging Applications Explained
-
6. Monitoring and Debugging Applications Hands-On (Part-1)
-
7. Monitoring and Debugging Applications Hands-On (Part-2)
-
Chapter 8- 1. Service and Node Port Service Explained
-
2. ClusterIP Service Explained
-
3. NodePort Service and ClusterIP Service Hands-On
-
4. Ingress Networking Explained (Part - 1)
-
5. Ingress Networking Explained (Part - 2)
-
6. Ingress Hands-On (Part - 1)
-
7. Ingress Hands-On (Part - 2)
-
8. Ingress Hands-On (Other Clusters)
-
9. Network Policies Explained
-
10. Developing Network Policies
-
11. Network Policies Hands-On (Part - 1)
-
12. Network Policies Hands-On (Part - 2)
-
13. Network Policies Hands-On (Part - 3)
-
14. Network Policies Hands-On (Part - 4)
-
Feedback
-
-
25
Kubernetes Administrator
-
1. Section Introduction
FREE PREVIEW -
2. Kubernetes Architecture -- Part 1
-
3. Kubernetes Architecture -- Part 2
-
4. Kubernetes Architecture -- Part 3
-
5. Understanding ETCD -- Part 1
-
6. Understanding ETCD -- Part 2
-
7. Understanding ETCD -- Part 3
-
8. Understanding ETCD -- Part 4
-
9. Understanding ETCD -- Part 5
-
10. ETCD Demo
-
11. How ETCD works with Kubernetes -- Part 1
-
12. How ETCD works with Kubernetes -- Part 2
-
13. How ETCD Works with Kubernetes -- Slides
-
14. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 1
-
15. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 2
-
16. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 3
-
17. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 4
-
18. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 5
-
19. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 6
-
20. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 7
-
21. Project -- Creating HIghly Available ETCD cluster -- Demo -- Part 8
-
bootstrap.sh
-
Vagrantfile
-
Step by Step Instructions to Provision ETCD cluster
-
22. ETCD common commands to Strat with
-
23. How ETCD works with Kubernetes -- DEMO using minikube
-
24. ETCD Assignment
-
25. Working with Single Container Pods
-
26 [Associated with Previous Video] Yaml files demonstrated in Video
-
27. Multi-container Pods Explained
-
28. Working with Sidecar Multi-Container Pods Hands-On
-
29. Working with Ambassador Multi-Container Pods Hands-On
-
30. Init-Container in Pods Hands-On
-
31. ReplicaSet Hands-On
-
32. Deployments Explained
-
33. Deployments Hands-On
-
34. Deployments -- Updates and Rollbacks Explained
-
35. Deployments -- Updates and Rollbacks Hands-On
-
36. Deployment Strategies Explained
-
37. Blue-Green Deployment Strategy Hands-On
-
38. Canary Deployment Strategy Hands-On
-
39. Service and NodePort Service Explained
-
40. ClusterIP Service Explained
-
41. NodePort Service and ClusterIP Service Hands-On
-
42. Network Policies Explained
-
43. Developing Network Policies
-
44. Volumes Explained
-
45. Volumes in minikube Hands-on
-
46. Persistent Volumes(PV) Explained
-
47. Volumes in Kubeadm Hands-On
-
48. Persistent Volume Claims(PVC) Explained
-
49. Persistent Volume and Persistent Volume Claim Hands-On (Part - 1)
-
50. Persistent Volume and Persistent Volume Claim Hands-On (Part - 2)
-
-
26
Kubernetes Security (CKS)
-
0. Presentation for CKS
-
CKS Presentation
-
1. Cluster Setup
-
1. Cluster Setup
-
1-Using Network Security Policies to Restrict Cluster Level Access
-
2. Reviewing Security Configuration with CIS Benchmark
-
2-Reviewing Security Configuration with CIS Benchmark on Minikube
-
3. Properly Setting Up Ingress Objects with Security Control
-
3-Properly Setting Up Ingress Objects with Security Control
-
4 Protecting Node Metadata and Endpoints in a Kubernetes Cluster
-
5. Minimizing Use and Access to GUI Elements
-
5. Minimizing Use and Access to GUI Elements
-
6. Verify platform binaries before deploying
-
6. Verify platform binaries before deploying
-
7. Restricting Access to the Kubernetes API Server
-
7. Restricting Access to the Kubernetes API Server
-
8 - 9. RBAC - Exercise caution in using service accounts.-
-
8-Using Role-Based Access Control (RBAC) to Minimize Exposure in Kubernetes
-
9-Exercising Caution with Service Accounts in Kubernetes
-
10. Update Kubernetes frequently
-
11. Minimize host OS footprint
-
11-Minimizing Host OS Footprint
-
12. Minimize IAM roles
-
12-Minimizing IAM Roles in Your AWS Account
-
13. Minimize external access to the network
-
13-Minimize external access to the network
-
14.1 Using Kernel Hardening Tools: App Armor
-
14.2. Using Kernel Hardening Tools_ seccomp
-
14.2. Using Kernel Hardening Tools: seccomp
-
1-Intro-Minimizing-Microservice-Vulnerabilities
-
1-Introduction-Minimize-Microservice-Vulnerabilities
-
2-Explaination-Security-Contexts
-
3-Practical-Security-Contexts
-
4-Pod Security Policies _ Open Policy Agent
-
Practical Hands On
-
-
27
Devops Cloud Labs(AWS)
-
AWS EC2 Case Studies
FREE PREVIEW -
AWS EC2 Overview
-
Amazon EC2 Features
-
AWS EC2 - Pricing
-
AWC EC2 Hands-On Lab
-
1_AWS Config Case Studies
-
2_AWS Overview Config
-
3_AWS Config Features
-
4_ AWS Config Pricing
-
5_AWS Config Hands-On Lab
-
1_AWS OpsWorks Case Studies
-
2_AWS OpsWorks Overview
-
3_AWS OpsWorks Features
-
4_AWS OpsWorks - Pricing
-
5_AWS Opsworks HOL (LAB)
-
1_AWS CloudFormation Case Studies
-
2_ AWS Cloudformation Overview
-
3_AWS Cloudformation features
-
4._AWS CloudFormation Pricing
-
5_AWS Cloud Formation HOL
-
1_AWS Systems Manager Case Studies
-
2_AWS System Manager Overview detail
-
3_AWS System Manager Overview
-
4_AWS Systems Manager Features
-
5_AWS System Manager Pricing
-
1: AWS Lambda Case Studies
-
2: AWS Lambda OverView
-
3a: AWS Lambda Features 1
-
3b: AWS Lambda Features 2
-
4: AWS Lambda - Pricing
-
5: AWS Lambda HOL
-
1_AWS CloudWatch Case Studies
-
2_AWS CloudWatch Overview
-
3_Amazon Cloudwatch Features
-
4_AWS CloudWatch - Pricing
-
5_AWS CLoudwatch (LAB)
-
1_AWS codedeploy Case Studies
-
2_AWS CodeDeploy Overview
-
3_AWS CodeDeploy Features
-
4_AWS CodeDeploy - Pricing
-
5_AWS Code Deploy HOL
-
1_AWS S3 Case Studies
-
2_AWS S3 Overview
-
3_AWS - S3 - Pricing
-
4_S3 HOL
-
1_AWS CloudFront Case Studies
-
2_AWS Cloudfront Overview
-
3_AWS CloudFront Features
-
4_AWS - CloudFront Pricing
-
5_AWS Cloudfront HOL
-
1_AWS codecommit Case Studies
-
2_AWS CodeCommit Overview
-
3_AWS Code Commit Features
-
4_AWS CodeCommit - Pricing
-
5_AWS Code Commit HOL
-
AWS cloudtrail Case Studies
-
AWS CloudTrail Overview
-
AWS CloudTrail - Pricing
-
AWS Cloudtrail Hands-On Lab
-
AWS Elastic Beanstalk Case Studies
-
AWS Elastic-Bean-Stalk Overview
-
Elastic Beanstalk Features
-
AWS Elastic Beanstalk - Pricing
-
Elastic Beanstalk Hands-On Lab
-
AWS codepipeline Case Studies
-
AWS CodePipeline Overview
-
Code pipeline Features
-
AWS CodePipeline - Pricing
-
AWS Xray Case Studies
-
AWS X-Ray Overview
-
X-Ray Features
-
AWS X-Ray - Pricing
-
AWS codestar Case Studies
-
AWS CodeStar Overview
-
CodeStar Features
-
AWS CodeStar - Pricing
-
AWS RDS Case Studies
-
AWS RDS Overview
-
Amazon RDS Features
-
AWS - RDS - Pricing
-
AWS- RDS Hands-On Lab
-
AWS Elastic Container Service Case Studies
-
AWS Elastic Container Service Overview
-
Amazon Elastic Container Service Features
-
AWS Elastic Container Service (ECS) - Pricing
-
AWS Elastic Container Service Hands-On Lab
-
AWS Fargate Case Studies
-
AWS Fargate Overview
-
AWS - Fargate - Pricing
-
AWS App Runner Case Studies
-
AWS App Runner Overview
-
Aws App Runner Features
-
AWS - AppRunner - Pricing
-
AWS Systems Manager Case Studies
-
AWS System Manager Overview
-
Systems Manager Features
-
AWS System Manager - Pricing
-
AWS Systems Manager Hands-On Lab
-
AWS EC2 Image Builder Case Studies
-
AWS EC2 Image Builder Overview
-
AWS MicroServices Overview
-
AWS Microservices features
-
-
28
Kubernetes & Cloud-Native Security Associate (KCSA)
-
1. Course Introduction _ Prerequisite
-
2 - The 4Cs of Cloud Native Security
-
2 - Understanding the 4Cs of Cloud Native Security
-
3 - A Cloud Provider and Infrastructure Security
-
3 - Cloud Provider Infrastructure Security
-
4 - Controls and Frameworks
-
4 Controls and Frameworks
-
5-1 Isolation Techniques
-
5 - Isolation Techniques
-
5-2 Isolation Techniques Checklist
-
6 - Artifact Repository and Image Security
-
6-1 Introduction to Artifact Repository and Image Security
-
7 - Workload and Application Code Security
-
7-1 Workload and Application Code Security
-
Section 2 : Kubernetes Cluster Component Security
-
2.1. API Server part 1
-
2.1. API Server part 2
-
2.1. API Server
-
2.2. Controller Manager
-
2.2. Controller Manager
-
2.3. Scheduler
-
2.3. Scheduler
-
2.4. kubelet
-
2.4. kubelet
-
2.5. Container Runtime
-
2.5. Container Runtime
-
2.6. KubeProxy
-
2.6. Kube Proxy
-
2.7. Pod
-
2.7. Pod
-
2.8. Etcd
-
2.8. Etcd
-
2.9. Continer Networking
-
2.9. Container Networking
-
2.10. Client Security
-
2.10. Client Security
-
2.11. Storage
-
2.11. Storage
-
Section 3 Kubernetes Security Fundamentals
-
3.1. Pod Security Standards
-
3.1. Pod Security Standards
-
3.2. Pod Security Admissions
-
3.2. Pod Security Admissions
-
3.3. Authentication
-
3.3. Authentication
-
3.4. Authorization
-
3.4. Authorization
-
3.5. Secrets
-
3.5. Secrets
-
3.6. Isolation and Segmentation
-
3.6. Isolation and Segmentation
-
3.7. Audit Logging
-
3.7. Audit Logging
-
3.8. Network Policy
-
Section 4 Kubernetes Threat Model
-
4.1. Kubernetes Trust Boundaries and Data Flow
-
4.1 Kubernetes Trust Boundaries and Data Flow
-
4.2. Persistence
-
4.2. Persistence
-
4.3. Denial of Service
-
4.3. Denial of Service
-
4.4. Malicious Code Execution and Compromised Applications in Containers
-
4.4. Malicious Code Execution and Compromised Applications in Containers
-
4.5. Attacker on the Network
-
4.5. Attacker on the Network
-
4.6. Access to Sensitive Data
-
4.6. Access to Sensitive Data
-
4.7. Privilege Escalation
-
4.7. Privilege Escalation
-
Section 5 Platform Security - 1. Supply Chain Security
-
2. Image Repository
-
3. Observability _ Service Mesh
-
4. PKI
-
5. Connectivity _ Admission Control
-
1. Compliance Frameworks
-
2. Threat Modelling Frameworks
-
3. Supply Chain Compliance
-
4. Automation and Tooling
-
5. Conclusion
-