Search This Blog

Wednesday, February 28, 2018

Red Hat Certificate of Expertise EX413 and EX276 Certification Course Training DVD



Red Hat Certificate of Expertise in Server Hardening  Course
EX413
Duration : 6h 20m

Introduction 
the Identify the Common of Red Hat Vulnerabilities and Exposures 
the Verify the Package Security and Validity 
the Identify and Employ Standards-based Practices 
the Configure Defaults for the File Systems' 
the Install and the Use Intrusion Detection's 
the Manage the User the Account and the Password Security 
of PAM - the Pluggable the Authentication the Modules 
the Configure Console Security 
the Configure the System-wide Acceptable The the Use Notifications 
Install and Configure Identity Management Service 
Configure Remote System Logging Services 
Configure System Auditing Services 
Network Scanning Tools and IPTables 
Conclusion

Red Hat Certificate of Expertise in Containerized Application Development 
EX276
Duration : 04:09:24 

01. Introduction 
 01. Introduction to Linux Academy
 02. Prerequisites
 03. About Lab Servers and Following Along - Part 1
04. About Lab Servers and Following Along - Part 2
 02. Containers 
 01. Knowledge Refresh.mp4 
02. Provision a Database Server Using Container Technology
 03. Runnign Containers Locally 
 01. Link Containers
 02. Get Container Logs
 03. Listen to Docker Events on the Docker Host
 04. Use Docker Inspect
05. Share Data Between Containers - Expose Containers
 06. Persistent Storage for Containers
07. the Host  and the Container Security Basic Practicesthe Best 
08. Solution: Using Containers is orchestrating Kubernetes
 04. Images Related 
 01. Image for What are Registries
 02 . Image Design the Best Practises
 03. Working with Images
04.  the Create the Custom Images
 05. Design and Code a dockerfile to the Build a the Custom Imagethe Container 
06. the Manage the  Lifecycle of an Image from Creation to Deletion
 05. Managing Images Related 
 01. Design for the Container Images Related Deploymentthe Application 
02.  the Custom Images Related for the Multiple the Container the Application the Deployment 
 03. Understand Private Registry Security.mp4
04. the Interact  with Many Different Registries
 05. Understand and the Use Image Tags and the Push and Pull Images Related from or to Registries
06.the Back up closeup an Image Via the Layers and The Metadata versus Container State
 06. Conclusion 


======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

No comments:

Post a Comment