You searched for: ""

  • 2 Days ILT, VILT

    Learn the essential skills to migrate virtual machines to Red Hat OpenShift Virtualization.

    The Migrating Virtual Machines to Red Hat OpenShift Virtualization with Ansible Automation Platform (DO346) course provides the essential knowledge to migrate virtual machines to Red Hat OpenShift Virtualization by using carefully selected content from Managing Virtual Machines in Red Hat OpenShift Virtualization (DO316) and Automate and Manage Red Hat OpenShift Virtualization with Ansible (DO336). This Red Hat course provides a shorter learning path for IT professionals to migrate their virtualized workloads to OpenShift Virtualization.

    This course provides the following information and skills:

    • An introduction to key OpenShift and Kubernetes concepts, such as nodes, pods, and operators
    • Skills to deploy the OpenShift Virtualization operator
    • Skills to configure networking and storage for virtual machines
    • Strategies to migrate virtual machines from another hypervisor to OpenShift Virtualization by using the migration toolkit for virtualization operator and Ansible Automation Platform

    This course is based on OpenShift Container Platform 4.16, OpenShift Virtualization 4.16, and Ansible Automation Platform 2.4.

  • 1 Day ILT, VILT

    Learn how to migrate existing CentOS Linux servers to supported versions of Red Hat Enterprise Linux.

    The RH174: Managing CentOS Migrations and RHEL Upgrades course will enable customers to transition successfully from CentOS Linux to Red Hat Enterprise Linux. It also enables them to upgrade from one major version of RHEL to the next. This course provides an overview of the migration process and discusses how to avoid and mitigate risks. “Managing CentOS Migrations and RHEL Upgrades” will help users to move from CentOS Linux to RHEL, or to upgrade to a newer version of RHEL.

  • 5 Days ILT, VILT

    Deploy SAP HANA on Red Hat Enterprise Linux for SAP Solutions in a high availability environment.

    Learn how to deploy, protect, and scale SAP infrastructure with Red Hat Enterprise Linux for SAP Solutions. This course teaches best practices for deploying SAP HANA and SAP S/4HANA in a high availability configuration. In addition, you will discover how to efficiently automate deployments with Red Hat Ansible Automation Platform and Red Hat supported Ansible roles specific to SAP.

  • 2 Days ILT, VILT

    Use Red Hat OpenShift to manage OpenStack services and RHEL compute nodes that run VM-based workloads.

    The CL170: OpenStack Administration: Control Plane Management course helps Red Hat OpenStack cluster administrators to manage the health and performance of OpenStack control plane services, to troubleshoot issues by inspecting Kubernetes operators and workloads, and to configure OpenStack control plane services by using Kubernetes custom resources.

    This course is based on Red Hat OpenShift Services on OpenStack 18.

  • 2 Days ILT, VILT

    Learn how to deploy, access, and perform day-to-day operations to a ROSA cluster.

    This course teaches IT operations staff how to deploy a public Red Hat OpenShift Service on AWS (ROSA) cluster for experimentation and to provision projects for development teams to work within. IT operations staff will learn how to perform day-to-day operation of ROSA clusters and support application teams which use that cluster. IT operations staff can then apply the same skills and similar procedures to private ROSA clusters of their organizations.

  • 2 Days ILT, VILT

    Create and configure production-grade ROSA clusters as part of a larger AWS customer’s footprint.

    Creating and Configuring Production ROSA Clusters (CS220) teaches how to configure ROSA clusters as part of pre-existing AWS environments and how to integrate ROSA with AWS services commonly used by IT operations teams, such as Amazon CloudWatch.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining
    information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

  • 3 Days ILT, VILT

    Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

    Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:

    • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
    • Assess compliance based on industry-standard benchmarks and get remediation guidance
    • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

    RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

  • -30%

    GCP-DWBQ: Data Warehousing with BigQuery: Storage Design, Query Optimization, and Administration

    Original price was: RM7,200.00.Current price is: RM5,040.00.
    3 Days ILT, VILT

    In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.

    Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.

    Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.

  • 4 Days ILT, VILT

    Designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course.

  • 4 Days ILT, VILT

    Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM.

    The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM. The course reviews XSIAM intricacies, from fundamental components to advanced strategies and automation techniques, including skills needed to navigate incident handling, optimize log sources, and orchestrate cybersecurity excellence.

  • 2 Days ILT, VILT

    This instructor- led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the  Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution .

    Multiple modules focus on how to leverage the collected data. You will create simple search queries in on e module an d XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact- related data, such as IP and Hash Views. Addition ally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external- data collection capabilities, including the use of Cortex XDR API to receive external alerts.

Go to Top