KEMBAR78
Master DevOps Engineering Course Outline | PDF | Computer File | Amazon Web Services
0% found this document useful (0 votes)
16 views12 pages

Master DevOps Engineering Course Outline

The document outlines a comprehensive curriculum for various DevOps and cloud engineering topics, including Linux fundamentals, Docker, Kubernetes, Git, CI/CD with Jenkins, and AWS services. It covers essential concepts, tools, and best practices necessary for professionals in these fields. Each section provides detailed insights into installation, configuration, management, and security of systems and applications.

Uploaded by

Mahmudul Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views12 pages

Master DevOps Engineering Course Outline

The document outlines a comprehensive curriculum for various DevOps and cloud engineering topics, including Linux fundamentals, Docker, Kubernetes, Git, CI/CD with Jenkins, and AWS services. It covers essential concepts, tools, and best practices necessary for professionals in these fields. Each section provides detailed insights into installation, configuration, management, and security of systems and applications.

Uploaded by

Mahmudul Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Linux for DevOps & Cloud Engineer

History of Linux & Why Linux?

Linux & DevOps


Introduction to the Linux
Linux Kernel, Boot Sequence, Kernel Space and User Space
Working with Linux Filesystems and Hierarchy
Linux Core Concepts

Package Management
Package Management Distribution
RPM and YUM, DPKG and APT
APT Vs APT GET

Essential Command
Introduction to Shell
Log into local & remote graphical and text mode consoles
Read, Write and use System Documentation
Create, Delete, Copy, and Move Files and Directories
Create and manage hard links & soft links
List, set, and change standard file permissions
Search for files, Search file using Grep
Compare and manipulate file content
Analyse text using basic regular expressions & extended regular Expressions
Archive, backup, compress, Uncompress files & Folder
Shell Script Introduction Example, etc

User and Group Management


Create, delete, and modify local user accounts
Create, delete, and modify local groups and group memberships
Configure user resource limits and user privileges

Configuring network connections and firewalls


Configure networking and hostname resolution statically or dynamically
Start, stop, and check the status of network services
Statically route IP traffic
Synchronise time using other network peers
Ufw configure/Firewall

Service Configuration
Configure SSH servers and clients
SSH Key Pair
Configure an HTTP server
Configure Nginx Web Server & Nginx Reverse Proxy
Configure a database server (MySQL, PostgreSQL, MongoDB)

Storage in Linux
Disk Partitions & File Systems in Linux and NFS Server
LVM
Docker Certified Associate (DCA)
Introduction

Docker Overview
What is Docker? And Why?
What are Containers?
History of Containers
Why Docker & Containers?
Virtual Machines vs Docker Containers

Docker Engine
Getting started with Docker
Docker Architecture
Setup and Install Docker
Docker container lifecycle

Docker Commands
Basic Container Operations
Interacting with a Running Container
Inspecting a Container
Stopping and Removing a Container
Docker Container Operations
Setting a Container Hostname
Restart Policies
Port Binding
Copying Contents into Container & Container to host
Docker Compose
Containerized Nginx, PostgreSQL, MySQL, MongoDB, PhpMyadmin
Publishing Ports

Docker Image Management


Docker Image Registry
Image Addressing Convention
Authenticating to Registries
Removing a Docker Image
Inspecting a Docker Image
Save and Load Images
Image Registry and Operations
Building a custom image
Build HTTPD & Nginx image
Understanding the Docker Hub
How to push images to the Docker Hub
Docker commit method
Build Contexts
COPY vs ADD
CMD vs Entrypoint
Dockerfile Best Practices
Docker Engine Security
Docker Daemon Security
Namespaces and Capabilities
CGroups
Resource Limits CPU
Resource Limits Memory
Resource Limits

Docker Engine Networking


Docker Networking
Namespaces
Process level isolation
Network Namespace
Networking commands

Docker Engine Storage


Docker Storage
Docker Volume
Docker Volumes and Stateful Persistence
Anonymous Volumes
Named Volumes
Bind Mounts
Sharing volumes between containers

Docker Swarm
Section Introduction
Container Orchestration Introduction
Swarm Architecture
Swarm Setup 3 node Cluster
Swarm Operations
Scale your app to run on more nodes
Distribute your app across a cluster
Swarm High Availability

Kubernetes
Kubernetes Introduction
Kubernetes Architecture
PODs
PODs with YAML

Disaster Recovery
Git and GitHub for DevOps Engineer
Getting Started
About Version Control
A Short History of Git
What is Git?

GitHub
Account Setup and Configuration
Contributing and Maintaining a Project
Managing an organization

Git Basic
Git workflow
Git Init, Git Add, Git Commit
Git Clone, Git Ignore, Git Fork
Git Repository
Git Index, Git Head
Git Origin Master & Git Remote
Getting a Git Repository
Viewing the Commit History
Working with Remotes
Working with Git Tags and Release

Undoing changes
Git Checkout
Git Revert, Git Reset & Git Rm
Git Cherry-pick

Git Branching
Branches in a Nutshell
Basic Branching and Merging
Branching Workflows
Branch Management & Remote Branches
Git on the Server
Getting Git on a Server
Generating Your SSH Public Key
Generating Token
Setting Up the Server
GitLab & GitHub

Distributed Git
Distributed Workflows
Contributing and Maintaining a Project
Git Push & Pull Git Fetch, Rebase

Git Best Practices


Micro commit & Meaningful commit
Git Standard Workflow
Github Pages for your Personal Resume
Certified Kubernetes Administrator (CKA)
Pre-Requisites
Linux Basic
Docker
YAML
Setting up a basic lab environment with VMware Workstation

Course Introduction:
Core Concepts
What is the CKA Exam
Why Get Certified
CKA Exam Domains

Kubernetes and Container Fundamentals:


Kubernetes Installation
Installation Options
MiniKube & Install Minikube
Clusters & Kubectl Basics
Install a Kubernetes Cluster using kubeadm

Core Concept:
Cluster Architecture
Docker-vs-ContainerD
ETCD for Beginners
ETCD in Kubernetes
ETCD – Commands
Kube API Server
Kube Controller Manager
Kube Scheduler
Kubelet
Kube Proxy
Pods
Pods with YAML
ReplicaSets
Deployments
Services
Namespaces
Daemonset

Scheduling:
Scheduling Section Introduction
Manual Scheduling
Labels and Selectors
Taints and Tolerations
Node Selectors
Node Affinity
Taints and Tolerations vs Node Affinity
Resource Limits
Static Pods
Multiple Schedulers
Configuring Scheduler Profiles
Logging and Monitoring:
Logging and Monitoring Section Introduction
Monitor Cluster Components
Managing Application Logs

Application Lifecycle Management:


Application Lifecycle Management
Rolling Updates and Rollbacks
Configure Applications
Commands and Arguments in Docker
Commands and Arguments in Kubernetes
Environment Variables
ConfigMaps
Secrets
Multi Container Pods
Multi-container Pods Design Patterns
Init Containers

Cluster Maintenance:
OS Upgrades
Kubernetes Software Versions
Cluster Upgrade Introduction
Backup and Restore Methods
Working with ETCDCTL

Security:
Kubernetes Security Primitives
Authentication
TLS Introduction
TLS Basics & TLS in Kubernetes
TLS in Kubernetes - Certificate Creation
View Certificate Details
Certificates API
KubeConfig
API Groups
Authorization
Role Based Access Controls
Cluster Roles
Service Accounts
Image Security
Security Contexts
Network Policies
Developing network policies
Storage:
Introduction to Docker Storage
Storage in Docker
Volume Driver Plugins in Docker
Container Storage Interface
Volumes
Persistent Volumes
Persistent Volume Claims
Using PVC in Pods
Storage Class

Networking:
Switching, Routing, Gateways CNI in kubernetes
DNS
CoreDNS
Network Namespaces
Docker Networking
CNI
Cluster Networking
Pod Networking
CNI in kubernetes
CNI weave ipam
weave
Ingress - Annotations and rewrite-target

Design and Install a Kubernetes Cluster:


Design a Kubernetes Cluster
Choosing Kubernetes Infrastructure
Configure High Availability
ETCD in HA

Troubleshooting

Exam Practice, Tips & Tricks


CI/CD Pipelines with Jenkins

Introduction
Software Development processes
What is Continuous Integration
What is Continuous Delivery
What is Continuous Deployment
Why Jenkins
Jenkins platform overview

Jenkins Getting Started


Installing Jenkins
Running Jenkins in a Docker container
Domain Integration via Nginx
Credential management
Jenkins home directory

Jenkins Plugins and Integrations


What are plugins
Install, Uninstall and Update Plugins

Jenkins Job
Creating a Freestyle Build Job
Build Triggers and Build Steps
Pre-Build and Post-Build Actions
Running New Build Job
Setting Up Email Notifications
SMTP Plugins and Configurations
Jenkins with Shell Script Build System

Pipelines
What is a Jenkins file
Build a Jenkins file
Run Jenkins job to pull code from Git
Run a Sample Pipeline
Scripted Pipeline vs Declarative Pipeline
Declarative Pipeline
Jenkins Pipeline with Python Project
Build a Multistage Pipeline

Build Agents
What are Build Agents
Using an Ubuntu Server as a Build Agent

Jenkins High availability


AWS Certified Solutions Architect Associate (SAA-C03)

MODULE 1: Introduction
AWS Free tier
Aws Account Overview, Creation, Billing Alarm, Budget
Aws Command Line Interface
MODULE 2: AWS Identity and Access Management What
is IAM.
User, Group. Policy, Role
MFA
Console Access, Cli Access
AWS Cloud shell
IAM Best Practices
Access Evaluation Tools
MODULE 3: EC2
What is EC2
Launch Linux instance and connect via ssh and EC2 instance connect
AMI
EC2 User Data and Metadata
IAM Roles for EC2
Placement Groups
Public, Private and Elastic IP Addresses
ENI
Spot Instances & Spot Fleet
NAT Gateways and NAT Instances
Nitro Instances and Nitro Enclaves
MODULE 3: Elastic Load Balancing and Autoscaling
Load Balancing and High Availability
ALB, CLB NLB
Elastic Load Balancer Sticky Session, Connection Draining
EC2 Autoscaling & Scaling Policies
Stickiness
MODULE 4: VPC
VPC Overview
CIDR, Private vs Public IP
Subnet, Internet Gateway, Route Table
Bastion Hosts
Nat Instance, Nat Gateway
NACL, Security Groups
VPC Peering
VPC Endpoints
VPC Flow Logs
AWS Direct Connect
AWS Transit Gateway
MODULE 5: S3
Overview
Buckets And Objects
StorageClasses
Bucket Policy
S3 Website Overview
S3 Versioning & S3 Replication
S3 Lifecycle
S3 Select & Glacier Select
S3 Event Notifications
S3 Encryption
S3 CORS
S3 MFA Delete
S3 Access Logs
S3 pre-signed URLs
MODULE 6: CloudFront and Global accelerator
CloudFront Overview
CloudFront with S3
CloudFront - Geo Restriction
CloudFront - Cache Invalidation
AWS Global Accelerator Overview
Signed URL
MODULE 7: Block and File Storage
Block vs File vs Object Storage
EBS Volume Types
EBS Snapshot
EC2 Instance Store Volumes
Amazon Elastic File System (EFS)
MODULE 8: More On Storage
AWS Snow Family
Amazon FSx
AWS Transfer Family
DataSync
MODULE 9: Route 53
Overview
Registering a domain
Records
TTL
CNAME vs Alias
Routing Policies
MODULE 10: Database And Data analytics
Overview
RDS, Aurora, DynamoDB, RedShift
ElastiCache
S3
DocumentDB, Neptue, EMR
Athena
Aws Glue
Elastic search
MODULE 11: Serverless Services
Overview
Lambda
SQS, SNS, SES
Step Function
Api Gateway
Kinesis
Cognito
MODULE 12: Infrastructure Deployment
CloudFormation
Elastic Beanstalk
MODULE 13: ECS and EKS
Introduction
Docker Containers and Microservices
Amazon ECS Launch Types
Amazon Elastic Container Registry (ECR)
Amazon Elastic Kubernetes Service (EKS)
AWS App Runner
MODULE 14: Infrastructure Deployment
CloudFormation
Elastic Beanstalk
MODULE 15: Monitoring And Audit
CloudWatch Metrics
CloudWatch logs
CloudWatch Alarms
Event Bridge
CloudTrail
AWS Config
CloudTrail vs CloudWatch vs Config X-
ray
MODULE 16: Security
Encryption 101
Directory Service
Identity Providers and Federation
KMS
SSM Parameter Store Overview
Cloud HSM
AWS Certificate Manager
Web Application Firewall (WAF)
Shield
Macie,Inspector,Guard Duty
MODULE 17: ML
Rekognition, Polly
Lex, SageMaker
Kendra, Translate, Transcribe
Personalize, Textract
MODULE 18: Migration And Disaster Recovery
Database Migration Service (DMS)
AWS Backup
AWS DataSync
AWS Snow Family

You might also like