Red Hat Certificate of Expertise in Server Hardening Course
EX413
Duration : 6h 20m
Introduction
the Identify the Common of Red Hat Vulnerabilities and Exposures
the Verify the Package Security and Validity
the Identify and Employ Standards-based Practices
the Configure Defaults for the File Systems'
the Install and the Use Intrusion Detection's
the Manage the User the Account and the Password Security
of PAM - the Pluggable the Authentication the Modules
the Configure Console Security
the Configure the System-wide Acceptable The the Use Notifications
Install and Configure Identity Management Service
Configure Remote System Logging Services
Configure System Auditing Services
Network Scanning Tools and IPTables
Conclusion
Red Hat Certificate of Expertise in Containerized Application Development
EX276
Duration : 04:09:24
01. Introduction
01. Introduction to Linux Academy
02. Prerequisites
03. About Lab Servers and Following Along - Part 1
04. About Lab Servers and Following Along - Part 2
02. Containers
01. Knowledge Refresh.mp4
02. Provision a Database Server Using Container Technology
03. Runnign Containers Locally
01. Link Containers
02. Get Container Logs
03. Listen to Docker Events on the Docker Host
04. Use Docker Inspect
05. Share Data Between Containers - Expose Containers
06. Persistent Storage for Containers
07. the Host and the Container Security Basic Practicesthe Best
08. Solution: Using Containers is orchestrating Kubernetes
04. Images Related
01. Image for What are Registries
02 . Image Design the Best Practises
03. Working with Images
04. the Create the Custom Images
05. Design and Code a dockerfile to the Build a the Custom Imagethe Container
06. the Manage the Lifecycle of an Image from Creation to Deletion
05. Managing Images Related
01. Design for the Container Images Related Deploymentthe Application
02. the Custom Images Related for the Multiple the Container the Application the Deployment
03. Understand Private Registry Security.mp4
04. the Interact with Many Different Registries
05. Understand and the Use Image Tags and the Push and Pull Images Related from or to Registries
06.the Back up closeup an Image Via the Layers and The Metadata versus Container State
06. Conclusion
======================================================================
This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV
This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV
======================================================================
No comments:
Post a Comment