This 13.5-hour course prepares security practitioners to use Splunk Enterprise Security (ES). Students identify and track incidents, analyze security risks, use predictive analytics, and discover threats.
-
This 3 virtual day course is designed for administrators who are responsible for getting data into Splunk Indexers. The course provides the fundamental knowledge of Splunk forwarders and methods to get remote data into Splunk indexers. It covers installation, configuration, management, monitoring, and troubleshooting of Splunk forwarders and Splunk Deployment Server components.
-
This course teaches application developers how to set up a Controller application and effectively use Controller in their organization’s consolidation process. Students will also design and generate financial reports using Controller. Through a series of lectures and hands-on exercises, students will set up a Controller application by creating the necessary structures (such as accounts and companies), and then test the application to ensure that it works properly. Students will also learn how to work with currency translation, allocations, inter-company transactions, investments in subsidiaries, advanced formula calculations, and user-defined business rules, as well as define configuration settings and user access to the application.
-
This 3-days instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity.
The student will be exposed to Ethereum’s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development.
The Ethereum Development Training Course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. Due to the technical programming lab content covered in this course, it is not recommended for those without programming knowledge and experience.
-
This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms.
-
This dynamic Blockchain Security course covers all known aspects of Blockchain security that exist in the Blockchain environment today. This course provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. The in-depth lab sessions will provide the student with practical, real world tools for not only recognizing security threats, but mitigation and prevention as well.
-
This MR-9CP-CISV3: Cloud Infrastructure and Services Version 3 course provides an overview of digital transformation, role of Cloud to help organizations address the current IT challenges to meet their overall digital transformation objectives. This “cloud essentials” course will help to gain the knowledge on technologies, processes, and mechanisms required to build a cloud infrastructure.
This course takes an open approach, and uses the Cloud Reference Architecture to describe the concepts and technologies related to cloud computing, which is further illustrated and reinforced with DELL EMC product examples. The course follows the U.S. National Institute of Standards and Technology as a guide for all definitions of cloud computing.
-
Deploy SAP HANA on Red Hat Enterprise Linux for SAP Solutions in a high availability environment.
Learn how to deploy, protect, and scale SAP infrastructure with Red Hat Enterprise Linux for SAP Solutions. This course teaches best practices for deploying SAP HANA and SAP S/4HANA in a high availability configuration. In addition, you will discover how to efficiently automate deployments with Red Hat Ansible Automation Platform and Red Hat supported Ansible roles specific to SAP.
-
Design, build, and deploy containerized applications on Red Hat OpenShift
Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications (DO288) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster.
Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.
The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.
This course is based on Red Hat OpenShift 4.14.
-
Performance tuning and capacity planning for Red Hat Enterprise Linux
Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.
This course is based on Red Hat® Enterprise Linux 8.
Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.
-
Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.
Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Manage complex Red Hat Ansible automation workflows at scale and prevent single points of failure.
The Managing Enterprise Automation with Red Hat Ansible Automation Platform (DO467) course is intended for experienced Ansible automation engineers, DevOps practitioners, and Linux system administrators seeking to deploy, control, and support centralized automation execution on a large scale.
Students will use Red Hat Ansible Automation Platform 2 to scale up Ansible automation. They will deploy automation controller to centrally manage automation workflows, automation mesh to scale up and distribute execution capacity, and private automation hub to manage Ansible Content Collections and automation execution environments for use by automation developers. Large scale automation cluster design and approaches to ensure high availability of Ansible Automation Platform will also be discussed.
This course is based on Red Hat Ansible Automation Platform 2.2.