AAA in AWS
Authentication, Authorization, and Access Control
Authentication, Authorization, and Access Control
Automatic Bug Reporting Tool
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Tasks
Artificial Intelligence and Machine Learning
CloudWatch Alarms and EventBridge
Fully managed 'front-door' for applications
Serverless, interactive analytics service
Fully managed and scalable IAM
Fully managed NoSQL database
Intelligent threat detection
Automated and continual vulnerability management
Real-time streaming data at a large scale
Protecting sensitive data
Fully managed, open-source message brokers
Relational database service
Securing your Amazon RDS Databases
Amazon Simple Storage Service (Amazon S3)
Fully managed Pub/Sub service
Distributed message queuing service
First things you need to know
Azure Analytics
Apache Configuration
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Layer 7 LoadBalancer for your applications
Archiving and backing up files in Linux is essential for data protection and management. Various tools and commands can help you achieve this, including tar, gzip, bzip2, and xz.
Basics of AWS Compute
Tasks
Automated installations help streamline the deployment process by using predefined configurations, making it easier to manage and maintain multiple systems.
Tasks
Automount
awk
Compliance Management with Artifact and Macie
Provision and manage SSL/TLS certificates
Using CLI and SDK
Infrastructure As Code by AWS
Fully managed continuous integration
Private Git repositories in AWS
AWS CodeDeploy
Fully managed continuous delivery
Basics of AWS Compute
Assess, audit, and evaluate configurations
Running containers in AWS
Different database options in AWS
Disaster Recovery Methods
Managed application deployment
Using CLI and SDK
Create and control your cryptographic keys
Build and deploy serverless applications
Centrally manage your secrets
Resources for the exam
Migrate petabyte-scale data to AWS
Use cloud storage with on-prem applications
Optimize costs, performance, etc.
Active Directory in Azure
Fully managed platform as a service (PaaS)
Architecting solutions in Azure
Scalable and secure object storage in the cloud
Virtual machines in Azure
Analyze all your data in a single place
Integration with Azure over a private connection
Managed File Shares and Storage
Azure's Content Delivery Network (CDN)
Serverless compute in Azure
Identity and Access Management
Distributign traffic across backend resources
Serverless workflow integration platform
Block storage for Azure Virtual Machines
Secure yoru Azure resources with MFA.
Migrating applications to Azure
Durable queues for large-volume cloud services.
Azure Security
Highly available storage in the cloud
Storage for non-relational structured data in the cloud
Private networks in Azure
Centralized protection of your web applications
Backup using dd
Bash scripts automate tasks by executing commands in a specific order, making them powerful tools for automating repetitive tasks, managing system configurations, and performing complex operations efficiently in Unix-like operating systems.
There are various ways to setup Red Hat Enterprise Linux (RHEL) for your personal lab:
Cloud Architects
Tasks
The Bootup
The Change of Business Dynamics and Procedure
Introduction
Notes for the Microsoft Azure Security Technologies (AZ-500)
Set up CI/CD pipelines in AWS
Preparing for the CISSP Exam
Overview
Public Cloud
Overview
What is Cloud Native
Software as a Service - SaaS
Amazon CloudTrail
Amazon CloudWatch
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Cockpit is a server administration tool sponsored by Red Hat, focused on providing a modern-looking and user-friendly interface to manage and administer servers.
This is the first-part of a series of bite-sized Linux sessions.
Communications between networks and resources
Components of an Azure LoadBalancer
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Containers in Azure
Thought I'd include this part since I used VirtualBox VMs in some of the labs in this series. I was having issues copying text from my laptop and then pasting them onto the terminal inside the VM (and then vice versa). I've also included some packages that would be helpful. Some setup doesn't come with pre-built packages like vim.
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Logical Volume Groups
Logical Volume Groups
Tasks
This follows the same steps as the previous lab but this time we'll be configuring a custom partitioning. Follow the steps in Lab 1 (under "RHEL on VirtualBox" section) up to Step 9: Confirm the Installation Destination. Note that for this lab, we changed our hostname to tst-rhel-local-2.
Datacenters
Data Processing in Azure
Ways to protect your data in AWS
Database Security
A 10,000 ft view of Microsoft Azure
Distributed Denial of Service (DDoS)
Dynamic Data Masking in Azure SQL
Based on naming convention, pricing, and purpose.
ENIs, ENAs, and the sorts
EBS and EFS
How ELB Works
Securing your Loadbalacers
Overview
RHCSA exam candidates should be able to accomplish the tasks below without assistance. These have been grouped into several categories.
Recommendations
Tasks
Tasks
SCP
Using security groups in Azure
Tasks
Firewalld is a Linux management tool that provides a simpler alternative to the low-level and complex nftables, which replaced iptables in modern Linux kernels. It offers an easier way to manage firewall rules and configurations on Linux systems.
Securing your AWS Account
A guide in designing and running workloads in the cloud
The /etc/passwd file stores user account information. Each line in this file represents a single user and contains seven fields separated by colons (
Understanding Mounts
Amazon FSx and AWS DataSync
FTP Server
Linux Hierarchy System
Streams and Redirects
Tasks
Identity and Access Management
Securing your AWS Infrastructure
Iptables is a command-line firewall utility that uses policy chains to allow or block traffic. When a connection tries to establish itself on your system, iptables looks for a rule in its list to match it to. If it doesn’t find one, it resorts to the default action.
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Run code without provisioning servers
Tasks
The Linux kernel is the core of the Linux operating system, acting as a bridge between the hardware and software. It interacts with hardware devices through drivers, known as modules, which are essential for the system's functionality.
NIC Naming
Tasks
Logging and monitoring options in AWS
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Logs for Hardware - dmesg
Tasks
CloudWatch Logs and Insights
Tools for managing Azure resources
Detecting and remediating incidents
Tasks
A 10,000 ft view of Microsoft Azure
Overview
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Remote Filesystems
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Tasks
Networking Security
New Subscription shows Zero Credit
What is RPCBIND?
Tasks
Package Managers
Managing disk partitions is a critical task for organizing and utilizing storage effectively. Tools like parted, gparted, and fdisk are commonly used for partitioning disks.
Managing Permissions in Linux
Before we go to mounting the disks persistently, we need to know about these two things:
Planning your costs in Azure
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
These labs are based on Sander Van Vugt's O'Reailly course, "Red Hat Certified System Administrator (RHCSA), 3/e"
These labs are based on Sander Van Vugt's O'Reailly course, "Red Hat Certified System Administrator (RHCSA), 3/e"
Lab 01 - Checking Jobs
Lab 01 - Grep
These are some of the scenarios that I haven't tried to simulate yet.
Lab 01 - Cron
Lab 01 - Resizing Partitions
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Connecting privately through a network interface
ps command
Tasks
Reducing costs in your Azure solutions
From locally-redundant to geo-zone-redundant storage
Tasks
Tasks
Resizing Logical Volume Management (LVM) allows you to increase the storage capacity of your logical volumes as needed. This is particularly useful when you start running out of space on your disks.
Limiting the access on your S3 Buckets
Tasks
Running Virtual Machines on RHEL
Methods to encrypt S3
Optimize your S3 Buckets
Securing your S3 Bucket
S3 Storage Classes
Samba Server
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Tasks
Cron
Tasks
Securing Azure Solutions with Azure Active Directory
Some of the scenario questions here are based on Kodekloud's CKA course labs.
To check for high-priority, security updates, run the command below.
The Need for SELinux
Tasks
Server management done by the Cloud
Server management done by the Cloud
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Decided to come back to this again after I installed VirtualBox again on my personal laptop, downloaded the RHEL 8 iso file from developer.redhat.com site and run a VM. I also remember the reason why i stop using VirtualBox. My laptop had a 4gb ram back then and launching VMs quickly make my laptop laggy.
In this lab, we'll set up the Webmin YUM repository on your system. Webmin is a web-based interface for system administration for Unix. Using any modern web browser, you can set up user accounts, Apache, DNS, file sharing, and much more. By setting up the YUM repository, you can easily install and update Webmin through your package manager.
Service Level Agreement and Lifecycle Policy
Difference between the three services
Tasks
SSH key-based login is a method to securely connect to remote systems without using a password. Instead, it uses a pair of cryptographic keys: a private key, kept on your local machine, and a public key, placed on the remote server. This enhances security by eliminating the need for password-based authentication.
Some of the scenario questions here are based on Kodekloud's CKAD course labs.
Some of the scenario questions here are based on Kodekloud's CKA course labs.
Tasks
Disk Layout
Comparing AWS Storage Options
Storage Security
The Project Plan and Time Management
Overview
Snapshots
Study Plan for CompTIA Security+
Swap Partitions
Tasks
Systemd
Tasks
A guide to successful cloud adoption
Cloud Computing
Tasks
Interrupting Bootup
Tools for troubleshooting, governance, and ensuring compliance
Cloud Migration
Task 01
Tasks
Tasks
VDO
Peering between virtual networks
Seamless integration between on-premise and the cloud
Security through Managed Firewall and API Gateway features
File Editors
Zero Trust Concepts