Sale!

Accredited Expert-Level IBM OpenShift Development Mastery Advanced Video Course

Original price was: $180.00.Current price is: $150.00.

Availability: 200 in stock

SKU: MASTERYTRAIL-MNBV-01CXZL480 Category: Brand:

Lesson 1: Introduction to OpenShift
1.1 Overview of OpenShift
1.2 Key Features of OpenShift
1.3 OpenShift vs. Kubernetes
1.4 OpenShift Architecture
1.5 OpenShift Use Cases
1.6 Setting Up Your OpenShift Environment
1.7 OpenShift Command-Line Interface (CLI)
1.8 OpenShift Web Console
1.9 OpenShift Operators
1.10 Hands-On: Deploying a Simple Application

Lesson 2: OpenShift Cluster Management
2.1 Understanding OpenShift Clusters
2.2 Creating and Managing Clusters
2.3 Cluster Scaling
2.4 Cluster Upgrades
2.5 Cluster Monitoring
2.6 Cluster Logging
2.7 Cluster Security
2.8 Cluster Backup and Restore
2.9 Cluster Networking
2.10 Hands-On: Managing an OpenShift Cluster

Lesson 3: OpenShift Projects and Namespaces
3.1 Introduction to Projects and Namespaces
3.2 Creating and Managing Projects
3.3 Project Quotas and Limits
3.4 Project Network Policies
3.5 Project Role-Based Access Control (RBAC)
3.6 Project Monitoring
3.7 Project Logging
3.8 Project Backup and Restore
3.9 Project Best Practices
3.10 Hands-On: Working with Projects

Lesson 4: OpenShift Pods and Containers
4.1 Understanding Pods and Containers
4.2 Creating and Managing Pods
4.3 Pod Lifecycle
4.4 Pod Health Checks
4.5 Pod Resource Requests and Limits
4.6 Pod Affinity and Anti-Affinity
4.7 Pod Security Policies
4.8 Pod Monitoring
4.9 Pod Logging
4.10 Hands-On: Deploying and Managing Pods

Lesson 5: OpenShift Deployments
5.1 Introduction to Deployments
5.2 Creating and Managing Deployments
5.3 Deployment Strategies
5.4 Rolling Updates
5.5 Blue-Green Deployments
5.6 Canary Deployments
5.7 Deployment Health Checks
5.8 Deployment Monitoring
5.9 Deployment Logging
5.10 Hands-On: Implementing Deployment Strategies

Lesson 6: OpenShift Services and Networking
6.1 Understanding Services
6.2 Creating and Managing Services
6.3 Service Types
6.4 Service Discovery
6.5 Network Policies
6.6 Ingress Controllers
6.7 External DNS
6.8 Service Mesh
6.9 Service Monitoring
6.10 Hands-On: Configuring Services and Networking

Lesson 7: OpenShift Storage
7.1 Understanding Persistent Storage
7.2 Persistent Volume Claims (PVCs)
7.3 Persistent Volumes (PVs)
7.4 Storage Classes
7.5 Dynamic Provisioning
7.6 Storage Monitoring
7.7 Storage Backup and Restore
7.8 Storage Best Practices
7.9 Storage Security
7.10 Hands-On: Managing Storage

Lesson 8: OpenShift ConfigMaps and Secrets
8.1 Understanding ConfigMaps
8.2 Creating and Managing ConfigMaps
8.3 Using ConfigMaps in Pods
8.4 Understanding Secrets
8.5 Creating and Managing Secrets
8.6 Using Secrets in Pods
8.7 Secrets Management Best Practices
8.8 Secrets Monitoring
8.9 Secrets Security
8.10 Hands-On: Working with ConfigMaps and Secrets

Lesson 9: OpenShift Operators
9.1 Introduction to Operators
9.2 Creating and Managing Operators
9.3 Operator Lifecycle Manager (OLM)
9.4 Custom Resource Definitions (CRDs)
9.5 Operator Patterns
9.6 Operator Monitoring
9.7 Operator Logging
9.8 Operator Best Practices
9.9 Operator Security
9.10 Hands-On: Deploying Operators

Lesson 10: OpenShift Security
10.1 Understanding OpenShift Security
10.2 Role-Based Access Control (RBAC)
10.3 Network Policies
10.4 Pod Security Policies
10.5 Secrets Management
10.6 Security Context Constraints
10.7 Security Monitoring
10.8 Security Auditing
10.9 Security Best Practices
10.10 Hands-On: Implementing Security Measures

Lesson 11: OpenShift Monitoring and Logging
11.1 Understanding Monitoring
11.2 Setting Up Monitoring
11.3 Prometheus Integration
11.4 Grafana Integration
11.5 Understanding Logging
11.6 Setting Up Logging
11.7 Elasticsearch Integration
11.8 Kibana Integration
11.9 Monitoring and Logging Best Practices
11.10 Hands-On: Configuring Monitoring and Logging

Lesson 12: OpenShift CI/CD Pipelines
12.1 Introduction to CI/CD
12.2 Setting Up CI/CD Pipelines
12.3 Jenkins Integration
12.4 Tekton Pipelines
12.5 GitOps with Argo CD
12.6 CI/CD Best Practices
12.7 CI/CD Monitoring
12.8 CI/CD Logging
12.9 CI/CD Security
12.10 Hands-On: Implementing CI/CD Pipelines

Lesson 13: OpenShift Multi-Tenancy
13.1 Understanding Multi-Tenancy
13.2 Setting Up Multi-Tenancy
13.3 Namespace Isolation
13.4 Resource Quotas
13.5 Network Policies
13.6 RBAC for Multi-Tenancy
13.7 Monitoring Multi-Tenancy
13.8 Logging Multi-Tenancy
13.9 Multi-Tenancy Best Practices
13.10 Hands-On: Configuring Multi-Tenancy

Lesson 14: OpenShift Service Mesh
14.1 Introduction to Service Mesh
14.2 Setting Up Service Mesh
14.3 Istio Integration
14.4 Traffic Management
14.5 Security Policies
14.6 Observability
14.7 Service Mesh Best Practices
14.8 Service Mesh Monitoring
14.9 Service Mesh Logging
14.10 Hands-On: Implementing Service Mesh

Lesson 15: OpenShift Serverless
15.1 Introduction to Serverless
15.2 Setting Up Serverless
15.3 Knative Integration
15.4 Event-Driven Architecture
15.5 Scaling Serverless Applications
15.6 Serverless Monitoring
15.7 Serverless Logging
15.8 Serverless Best Practices
15.9 Serverless Security
15.10 Hands-On: Deploying Serverless Applications

Lesson 16: OpenShift Hybrid Cloud
16.1 Understanding Hybrid Cloud
16.2 Setting Up Hybrid Cloud
16.3 Multi-Cloud Deployments
16.4 Hybrid Cloud Networking
16.5 Hybrid Cloud Storage
16.6 Hybrid Cloud Security
16.7 Hybrid Cloud Monitoring
16.8 Hybrid Cloud Logging
16.9 Hybrid Cloud Best Practices
16.10 Hands-On: Configuring Hybrid Cloud

Lesson 17: OpenShift Disaster Recovery
17.1 Understanding Disaster Recovery
17.2 Setting Up Disaster Recovery
17.3 Backup and Restore Strategies
17.4 High Availability
17.5 Failover Mechanisms
17.6 Disaster Recovery Monitoring
17.7 Disaster Recovery Logging
17.8 Disaster Recovery Best Practices
17.9 Disaster Recovery Security
17.10 Hands-On: Implementing Disaster Recovery

Lesson 18: OpenShift Performance Tuning
18.1 Understanding Performance Tuning
18.2 Resource Requests and Limits
18.3 Horizontal Pod Autoscaling
18.4 Vertical Pod Autoscaling
18.5 Cluster Autoscaling
18.6 Performance Monitoring
18.7 Performance Logging
18.8 Performance Best Practices
18.9 Performance Security
18.10 Hands-On: Tuning Performance

Lesson 19: OpenShift Advanced Networking
19.1 Understanding Advanced Networking
19.2 Network Policies
19.3 Service Mesh
19.4 Ingress Controllers
19.5 External DNS
19.6 Network Monitoring
19.7 Network Logging
19.8 Network Best Practices
19.9 Network Security
19.10 Hands-On: Configuring Advanced Networking

Lesson 20: OpenShift Advanced Storage
20.1 Understanding Advanced Storage
20.2 Persistent Volume Claims (PVCs)
20.3 Persistent Volumes (PVs)
20.4 Storage Classes
20.5 Dynamic Provisioning
20.6 Storage Monitoring
20.7 Storage Logging
20.8 Storage Best Practices
20.9 Storage Security
20.10 Hands-On: Managing Advanced Storage

Lesson 21: OpenShift Advanced Security
21.1 Understanding Advanced Security
21.2 Role-Based Access Control (RBAC)
21.3 Network Policies
21.4 Pod Security Policies
21.5 Secrets Management
21.6 Security Context Constraints
21.7 Security Monitoring
21.8 Security Auditing
21.9 Security Best Practices
21.10 Hands-On: Implementing Advanced Security

Lesson 22: OpenShift Advanced Monitoring and Logging
22.1 Understanding Advanced Monitoring
22.2 Prometheus Integration
22.3 Grafana Integration
22.4 Elasticsearch Integration
22.5 Kibana Integration
22.6 Monitoring Best Practices
22.7 Logging Best Practices
22.8 Security Monitoring
22.9 Security Logging
22.10 Hands-On: Configuring Advanced Monitoring and Logging

Lesson 23: OpenShift Advanced CI/CD Pipelines
23.1 Understanding Advanced CI/CD
23.2 Jenkins Integration
23.3 Tekton Pipelines
23.4 GitOps with Argo CD
23.5 CI/CD Monitoring
23.6 CI/CD Logging
23.7 CI/CD Security
23.8 CI/CD Best Practices
23.9 Advanced CI/CD Strategies
23.10 Hands-On: Implementing Advanced CI/CD Pipelines

Lesson 24: OpenShift Advanced Multi-Tenancy
24.1 Understanding Advanced Multi-Tenancy
24.2 Namespace Isolation
24.3 Resource Quotas
24.4 Network Policies
24.5 RBAC for Multi-Tenancy
24.6 Monitoring Multi-Tenancy
24.7 Logging Multi-Tenancy
24.8 Multi-Tenancy Best Practices
24.9 Multi-Tenancy Security
24.10 Hands-On: Configuring Advanced Multi-Tenancy

Lesson 25: OpenShift Advanced Service Mesh
25.1 Understanding Advanced Service Mesh
25.2 Istio Integration
25.3 Traffic Management
25.4 Security Policies
25.5 Observability
25.6 Service Mesh Monitoring
25.7 Service Mesh Logging
25.8 Service Mesh Best Practices
25.9 Service Mesh Security
25.10 Hands-On: Implementing Advanced Service Mesh

Lesson 26: OpenShift Advanced Serverless
26.1 Understanding Advanced Serverless
26.2 Knative Integration
26.3 Event-Driven Architecture
26.4 Scaling Serverless Applications
26.5 Serverless Monitoring
26.6 Serverless Logging
26.7 Serverless Best Practices
26.8 Serverless Security
26.9 Advanced Serverless Strategies
26.10 Hands-On: Deploying Advanced Serverless Applications

Lesson 27: OpenShift Advanced Hybrid Cloud
27.1 Understanding Advanced Hybrid Cloud
27.2 Multi-Cloud Deployments
27.3 Hybrid Cloud Networking
27.4 Hybrid Cloud Storage
27.5 Hybrid Cloud Security
27.6 Hybrid Cloud Monitoring
27.7 Hybrid Cloud Logging
27.8 Hybrid Cloud Best Practices
27.9 Advanced Hybrid Cloud Strategies
27.10 Hands-On: Configuring Advanced Hybrid Cloud

Lesson 28: OpenShift Advanced Disaster Recovery
28.1 Understanding Advanced Disaster Recovery
28.2 Backup and Restore Strategies
28.3 High Availability
28.4 Failover Mechanisms
28.5 Disaster Recovery Monitoring
28.6 Disaster Recovery Logging
28.7 Disaster Recovery Best Practices
28.8 Disaster Recovery Security
28.9 Advanced Disaster Recovery Strategies
28.10 Hands-On: Implementing Advanced Disaster Recovery

Lesson 29: OpenShift Advanced Performance Tuning
29.1 Understanding Advanced Performance Tuning
29.2 Resource Requests and Limits
29.3 Horizontal Pod Autoscaling
29.4 Vertical Pod Autoscaling
29.5 Cluster Autoscaling
29.6 Performance Monitoring
29.7 Performance Logging
29.8 Performance Best Practices
29.9 Performance Security
29.10 Hands-On: Tuning Advanced Performance

Lesson 30: OpenShift Advanced Networking
30.1 Understanding Advanced Networking
30.2 Network Policies
30.3 Service Mesh
30.4 Ingress Controllers
30.5 External DNS
30.6 Network Monitoring
30.7 Network Logging
30.8 Network Best Practices
30.9 Network Security
30.10 Hands-On: Configuring Advanced Networking

Lesson 31: OpenShift Advanced Storage
31.1 Understanding Advanced Storage
31.2 Persistent Volume Claims (PVCs)
31.3 Persistent Volumes (PVs)
31.4 Storage Classes
31.5 Dynamic Provisioning
31.6 Storage Monitoring
31.7 Storage Logging
31.8 Storage Best Practices
31.9 Storage Security
31.10 Hands-On: Managing Advanced Storage

Lesson 32: OpenShift Advanced Security
32.1 Understanding Advanced Security
32.2 Role-Based Access Control (RBAC)
32.3 Network Policies
32.4 Pod Security Policies
32.5 Secrets Management
32.6 Security Context Constraints
32.7 Security Monitoring
32.8 Security Auditing
32.9 Security Best Practices
32.10 Hands-On: Implementing Advanced Security

Lesson 33: OpenShift Advanced Monitoring and Logging
33.1 Understanding Advanced Monitoring
33.2 Prometheus Integration
33.3 Grafana Integration
33.4 Elasticsearch Integration
33.5 Kibana Integration
33.6 Monitoring Best Practices
33.7 Logging Best Practices
33.8 Security Monitoring
33.9 Security Logging
33.10 Hands-On: Configuring Advanced Monitoring and Logging

Lesson 34: OpenShift Advanced CI/CD Pipelines
34.1 Understanding Advanced CI/CD
34.2 Jenkins Integration
34.3 Tekton Pipelines
34.4 GitOps with Argo CD
34.5 CI/CD Monitoring
34.6 CI/CD Logging
34.7 CI/CD Security
34.8 CI/CD Best Practices
34.9 Advanced CI/CD Strategies
34.10 Hands-On: Implementing Advanced CI/CD Pipelines

Lesson 35: OpenShift Advanced Multi-Tenancy
35.1 Understanding Advanced Multi-Tenancy
35.2 Namespace Isolation
35.3 Resource Quotas
35.4 Network Policies
35.5 RBAC for Multi-Tenancy
35.6 Monitoring Multi-Tenancy
35.7 Logging Multi-Tenancy
35.8 Multi-Tenancy Best Practices
35.9 Multi-Tenancy Security
35.10 Hands-On: Configuring Advanced Multi-Tenancy

Lesson 36: OpenShift Advanced Service Mesh
36.1 Understanding Advanced Service Mesh
36.2 Istio Integration
36.3 Traffic Management
36.4 Security Policies
36.5 Observability
36.6 Service Mesh Monitoring
36.7 Service Mesh Logging
36.8 Service Mesh Best Practices
36.9 Service Mesh Security
36.10 Hands-On: Implementing Advanced Service Mesh

Lesson 37: OpenShift Advanced Serverless
37.1 Understanding Advanced Serverless
37.2 Knative Integration
37.3 Event-Driven Architecture
37.4 Scaling Serverless Applications
37.5 Serverless Monitoring
37.6 Serverless Logging
37.7 Serverless Best Practices
37.8 Serverless Security
37.9 Advanced Serverless Strategies
37.10 Hands-On: Deploying Advanced Serverless Applications

Lesson 38: OpenShift Advanced Hybrid Cloud
38.1 Understanding Advanced Hybrid Cloud
38.2 Multi-Cloud Deployments
38.3 Hybrid Cloud Networking
38.4 Hybrid Cloud Storage
38.5 Hybrid Cloud Security
38.6 Hybrid Cloud Monitoring
38.7 Hybrid Cloud Logging
38.8 Hybrid Cloud Best Practices
38.9 Advanced Hybrid Cloud Strategies
38.10 Hands-On: Configuring Advanced Hybrid Cloud

Lesson 39: OpenShift Advanced Disaster Recovery
39.1 Understanding Advanced Disaster Recovery
39.2 Backup and Restore Strategies
39.3 High Availability
39.4 Failover Mechanisms
39.5 Disaster Recovery Monitoring
39.6 Disaster Recovery Logging
39.7 Disaster Recovery Best Practices
39.8 Disaster Recovery Security
39.9 Advanced Disaster Recovery Strategies
39.10 Hands-On: Implementing Advanced Disaster Recovery

Lesson 40: OpenShift Advanced Performance Tuning
40.1 Understanding Advanced Performance Tuning
40.2 Resource Requests and Limits
40.3 Horizontal Pod Autoscaling
40.4 Vertical Pod Autoscaling
40.5 Cluster Autoscaling
40.6 Performance Monitoring
40.7 Performance Logging
40.8 Performance Best Practices
40.9 Performance Security
40.10 Hands-On: Tuning Advanced Performance

Reviews

There are no reviews yet.

Be the first to review “Accredited Expert-Level IBM OpenShift Development Mastery Advanced Video Course”

Your email address will not be published. Required fields are marked *

Scroll to Top