Trainings & Certifications2021-09-13T15:04:44+00:00

Currently Offered Courses

RHCSA – Red Hat Certified Systems Administrator2021-09-13T14:16:57+00:00
Understand and use essential tools
  • Access a shell prompt and issue commands with correct syntax
  • Use input-output redirection (>, >>, |, 2>, etc.)
  • Use grep and regular expressions to analyze text
  • Access remote systems using SSH
  • Log in and switch users in multiuser targets
  • Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
  • Create and edit text files
  • Create, delete, copy, and move files and directories
  • Create hard and soft links
  • List, set, and change standard ugo/rwx permissions
  • Locate, read, and use system documentation including man, info, and files in /usr/share/doc
Operate running systems
  • Boot, reboot, and shut down a system normally
  • Boot systems into different targets manually
  • Interrupt the boot process in order to gain access to a system
  • Identify CPU/memory intensive processes and kill processes
  • Adjust process scheduling
  • Manage tuning profiles
  • Locate and interpret system log files and journals
  • Preserve system journals
  • Start, stop, and check the status of network services
  • Securely transfer files between systems
Configure local storage
  • List, create, delete partitions on MBR and GPT disks
  • Create and remove physical volumes
  • Assign physical volumes to volume groups
  • Create and delete logical volumes
  • Configure systems to mount file systems at boot by universally unique ID (UUID) or label
  • Add new partitions and logical volumes, and swap to a system non-destructively
Create and configure file systems
  • Create, mount, unmount, and use vfat, ext4, and xfs file systems
  • Mount and unmount network file systems using NFS
  • Extend existing logical volumes
  • Create and configure set-GID directories for collaboration
  • Configure disk compression
  • Manage layered storage
  • Diagnose and correct file permission problems
Deploy, configure, and maintain systems
  • Schedule tasks using at and cron
  • Start and stop services and configure services to start automatically at boot
  • Configure systems to boot into a specific target automatically
  • Configure time service clients
  • Install and update software packages from Red Hat Network, a remote repository, or from the local file system
  • Work with package module streams
  • Modify the system bootloader
Manage basic networking
  • Configure IPv4 and IPv6 addresses
  • Configure hostname resolution
  • Configure network services to start automatically at boot
  • Restrict network access using firewall-cmd/firewall
Manage users and groups
  • Create, delete, and modify local user accounts
  • Change passwords and adjust password aging for local user accounts
  • Create, delete, and modify local groups and group memberships
  • Configure superuser access
Manage security
  • Configure firewall settings using firewall-cmd/firewalld
  • Create and use file access control lists
  • Configure key-based authentication for SSH
  • Set enforcing and permissive modes for SELinux
  • List and identify SELinux file and process context
  • Restore default file contexts
  • Use boolean settings to modify system SELinux settings
  • Diagnose and address routine SELinux policy violations
RHCE [RHEL 7] – Red Hat Certified Engineer for Red Hat Enterprise Linux 72021-09-13T14:22:26+00:00

System configuration and management

  • Use network teaming or bonding to configure aggregated network links between two Red Hat Enterprise Linux systems
  • Configure IPv6 addresses and perform basic IPv6 troubleshooting
  • Route IP traffic and create static routes
  • Use firewalld and associated mechanisms such as rich rules, zones and custom rules, to implement packet filtering and configure network address translation (NAT)
  • Configure a system to authenticate using Kerberos
  • Configure a system as either an iSCSI target or initiator that persistently mounts an iSCSI target
  • Produce and deliver reports on system utilization (processor, memory, disk, and network)
  • Use shell scripting to automate system maintenance tasks

Network services

Network services are an important subset of the exam objectives. RHCE candidates should be capable of meeting the following objectives for each of the network services listed below:

  • Install the packages needed to provide the service
  • Configure SELinux to support the service
  • Use SELinux port labeling to allow services to use non-standard ports
  • Configure the service to start when the system is booted
  • Configure the service for basic operation
  • Configure host-based and user-based security for the service

HTTP/HTTPS

  • Configure a virtual host
  • Configure access restrictions on directories
  • Deploy a basic CGI application
  • Configure group-managed content
  • Configure TLS security

DNS

  • Configure a caching-only name server
  • Troubleshoot DNS client issues

NFS

  • Provide network shares to specific clients
  • Provide network shares suitable for group collaboration
  • Use Kerberos to control access to NFS network shares

SMB

  • Provide network shares to specific clients
  • Provide network shares suitable for group collaboration

SMTP

  • Configure a system to forward all email to a central mail server

SSH

  • Configure key-based authentication
  • Configure additional options described in documentation

NTP

  • Synchronize time using other NTP peers

Database services

  • Install and configure MariaDB
  • Backup and restore a database
  • Create a simple database schema
  • Perform simple SQL queries against a database
RHCE [RHEL 8] – Red Hat Certified Engineer for Red Hat Enterprise Linux 82021-09-13T14:22:43+00:00

Be able to perform all tasks expected of a Red Hat Certified System Administrator

  • Understand and use essential tools
  • Operate running systems
  • Configure local storage
  • Create and configure file systems
  • Deploy, configure, and maintain systems
  • Manage users and groups
  • Manage security

Understand core components of Ansible

  • Inventories
  • Modules
  • Variables
  • Facts
  • Plays
  • Playbooks
  • Configuration files
  • Use provided documentation to look up specific information about Ansible modules and commands

Install and configure an Ansible control node

  • Install required packages
  • Create a static host inventory file
  • Create a configuration file
  • Create and use static inventories to define groups of hosts
  • Manage parallelism

Configure Ansible managed nodes

  • Create and distribute SSH keys to managed nodes
  • Configure privilege escalation on managed nodes
  • Validate a working configuration using ad hoc Ansible commands

Script administration tasks

  • Create simple shell scripts
  • Create simple shell scripts that run ad hoc Ansible commands

Create Ansible plays and playbooks

  • Know how to work with commonly used Ansible modules
  • Use variables to retrieve the results of running a command
  • Use conditionals to control play execution
  • Configure error handling
  • Create playbooks to configure systems to a specified state

Use Ansible modules for system administration tasks that work with:

  • Software packages and repositories
  • Services
  • Firewall rules
  • File systems
  • Storage devices
  • File content
  • Archiving
  • Scheduled tasks
  • Security
  • Users and groups

Work with roles

  • Create roles
  • Download roles from an Ansible Galaxy and use them

Use advanced Ansible features

  • Create and use templates to create customized configuration files
  • Use Ansible Vault in playbooks to protect sensitive data

Create and use templates to create customized configuration files Work with Ansible variables and facts Create and work with roles Download roles from an Ansible Galaxy and use them Manage parallelism Use Ansible Vault in playbooks to protect sensitive data Use provided documentation to look up specific information about Ansible modules and commands

As with all Red Hat performance-based exams, configurations must persist after reboot without intervention.

CCNA Security2021-09-13T14:22:50+00:00
  • Secure Design Principles
  • Cisco IOS Firewalls
  • Cisco ASA
  • Cisco Layer 2 Security
CCNA Routing & Switching2021-09-13T14:22:54+00:00
  • Supermodels (Network Supermodels, That Is)
  • Ethernet And Cabling
  • Hubs, History, and Why Hubs Are History
  • Config Modes, IOS Help, Intro To VLANs
  • Memories, Boots, and Passwords
  • IP Addressing, Binary, and Intro To Routing
  • Switches, Default Gateways, Telnet
  • TCP and UDP
  • DHCP, DNS, and ARP
  • Static Routing, Pings, and Hub-And-Spoke Networks
  • Distance Vector In General, RIPv2 In Particular
  • Subnetting Success
  • Access Lists
  • The Network Time Protocol
  • NAT and PAT
  • IPv6
  • This And That
  • VTP (VLAN Trunking Protocol)
  • The Spanning Tree Protocol
  • Etherchannels
  • The Rapid Spanning-Tree Protocol
  • OSPF
  • EIGRP
  • OSPF, EIGRP, and RIP For IPv6
  • First-Hop Redundancy Protocols
  • PTP WANs, VPNs, and GRE
  • Fun With L3 Switches
  • Surviving Quality Of Service
  • Network Monitoring
  • Cloud Computing and Software-Defined Networking
  • IPv6 ACLs
  • Intro To:
    • Metro Ethernet
    • MPLS
    • MPLS VPN
    • Switch Stacking
    • The Cisco Switching Model
    • Chassis Aggregation
    • AAA Authentication
    • Dot1x Port-Based Authentication
    • Telnet
    • SSH
    • and more
  • The Border Gateway Protocol
  • Specific Attacks And Defenses
  • Privilege Levels
  • Protecting The Control Plane
  • VPN Section
  • Firewalls
  • The IPS and IDS
  • AAA
  • CCNA Security: IPv6
  • CCNA Security: This n’ That
AWS CSA – Amazon Web Services Certified Solutions Architect2021-09-13T14:23:07+00:00
  • Designing resilient architectures
  • Defining performant architectures
  • Specifying secure applications and architectures
  • Designing cost-optimized architectures
  • Defining operationally excellent architectures
Go to Top