0% found this document useful (0 votes)
103 views21 pages

Course Outline For DevOps

The document outlines the course content for a AWS 3in1 and Google Cloud certification training course. The AWS training covers 24 topics related to various AWS services like compute, storage, database, security etc. along with hands-on labs. Similarly, the Google Cloud training covers 2 topics providing an overview and details of billing, IAM and projects on Google Cloud along with hands-on labs. Both courses aim to prepare students for AWS and Google Cloud certification exams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views21 pages

Course Outline For DevOps

The document outlines the course content for a AWS 3in1 and Google Cloud certification training course. The AWS training covers 24 topics related to various AWS services like compute, storage, database, security etc. along with hands-on labs. Similarly, the Google Cloud training covers 2 topics providing an overview and details of billing, IAM and projects on Google Cloud along with hands-on labs. Both courses aim to prepare students for AWS and Google Cloud certification exams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Sherdil IT Academy

AWS 3in1 Course


Trainer(s) = Muhammad Usman Khan / Muhammad Rafay Saeed
==============================================================================

Course Content(s)

S.No Topics Training Method

1. Course & Exam Introduction Theory

2. AWS Regions & Availability Zone Theory


● Global footprint
● Regions & Availability Zones
● Edge locations
● Regional & local edge cache

3. Introduction to Cloud Computing (Types, Categories & Features) Theory

4. ● 1000 Feet Services Overview (165+ Services) Theory

5. Virtual Private Cloud Deep dive Theory / Hands On Lab


● CIDR Blocks
● Subnets
● Network ACL
● Route & Route tables
● Internet Gateway (IGW)
● NAT Gateway
● VPC Peering
● Security groups
● S3 Endpoint
● Traffic Mirroring
● VPC Flow log

6. Trusted Advisor Theory / Hands On Lab


● Understand the categories
● Core checks
● Support plan
● How to use AWS trusted advisor

7. AWS Cloud trail Theory / Hands On Lab


● About the cloud trail
● Trail history
● Verify user & service audit using cloud trail events
● Create & configure trail with S3 bucket
● Cloudtrail Encryption

1
8. Identity & Access Management (IAM) Theory / Hands On Lab
● About authentication & authorization
● IAM Users, Roles & Policies
● Creation of Users, Groups, Roles & Policies
● AWS & custom managed IAM Policies
● Fine grained Policy verification on IAM users
● MultiFactor Authentication (MFA)
● Creation of JSON based custom Policies & testing
● KMS encryption configuration & implementation
● Identity Provider (IDP) & SAML 2.0 Configuration

9. Simple Storage Service Theory / Hands On Lab


● Create & configure S3 bucket & upload/drag objects
● Bucket versioning & encryption
● Deploy a static website on S3 bucket
● Storage classes
● Lifecycle policies
● Bucket policies (JSON)
● Bucket ACL
● Tagging
● Object Lock
● Cross Region Replication (CRR)
● Cross Origin Resource Sharing (CORS)

10. AWS Cloud front Theory / Hands On Lab


● About CDN & cloud front service
● Using of cloud front with origin location like S3 bucket
● Configure S3 based static website with cloud front
● Verify the cloudfront configuration after CDN deployment

11. AWS Cloud Watch Theory / Hands On Lab


● About the usage of Cloudwatch
● Working with metric Namespace, Dimension,metric, timestamp & units
● Dashboard,Events,Logs & Alarm
● Create & configure alarm with SNS based Email & SMS alerts

12. AWS Elastic Compute Cloud (EC2) Theory / Hands On Lab


● About the usage of EC2
● Types & categories of EC2
● On demand, Spot, reserved & scheduled Instances
● AMI , templates & snapshots
● Provisioning of EC2 based WIndows & linux Instances
● Bastion Host & Nat Gateway
● Key pairs & Security groups with port based rules
● Server accessibility using RDP & SSH connection
● Instance templates
● Usage of Internet Gateway & NAT Gateway with EC2
● Instance termination protection
● Using of Instance profile to connect with S3 bucket privately in Linux VM
● Working with Amazon Marketplace
● SSD & HDD Volume & snapshots
● Encryption at rest & in transit
● Data Lifecycle management (DLM)

13. Elastic Load balancer & AutoScaling Theory / Hands On Lab


● ELB & Auto scaling 10,000 Foot Overview

2
● Create Application Load Balancer
● AS Launch Config & AS Group
● Create an EC2 Instance using AS Group
● Building a 2 tier architecture using ELB & AS

14. AWS Route 53 Theory / Hands On Lab


● Route 53 & DNS Load Balancing with Route Policies
● Create DNS record

15. AWS Simple Queue Service Theory / Hands On Lab


● SQS Essentials
● Create Standard and FIFO Queue
● Fanning out Using SNS & SQS
● Message Polling

16. AWS Simple Notification Service Theory / Hands On Lab


● SNS Essentials
● Create Topic and Add Subscribers ( Email & SMS)
● Configure Subscriber using SNS

17. AWS Simple Workflow Service Theory


● SWF Essentials

18. AWS Lambda Theory / Hands On Lab


● Create Lambda Function using provided code
● Test Lambda function
● Create EBS Volume and take automated snapshot using Lambda

19. AWS DynamoDB Theory / Hands On Lab


● Create & configure Primary (Hash) & Sort(Range) Keys.
● Modify Read Capacity Unit (RCU) & Write Capacity Unit (WCU).
● Create multiple sort keys using JSON tree
● Create & configure Local secondary Index (LSI).

20. AWS RDS Theory / Hands On Lab


● Create & configure Subnet Security Group.
● Create & configure MYSQL based RDS with Read replica
● Verify the connectivity using a MYSQL client.

21. AWS Elastic BeansTalk Theory / Hands On Lab


● Create Application environments (Dev, stage)
● Deploy sample Node.js application
● Explorer Different deployment method

22. AWS Cloudformation Theory / Hands On Lab


● About Infrastructure as Code (IaC)
● Create a stack using pre-write JSON code using cloud formation.
● Verify VPC & WordPress servers that were created using Cloud formation stack.
● Drift Detection

23. AWS CICD Theory / Hands On Lab


● Code Start, Code Commit, Code Deploy, Code Build & Code Pipe line Essentials
● Deploy Sample PHP Application using Codestar

24. AWS FSx & AWS Backup Theory / Hands On Lab


● Create Backup Job
● Create SMB based File share using managed AD & FSX

3
25. Demo Topics Theory / Instructor Demo
● System and Session Manager
● AWS Config
● AWS managed Active Directory
● Create ext4 Based file system using EFS
● AWS Kinesis
● Storage Gateway Essentials
● DR & BC for for AWS Services
● API Gateway

26. AWS Cloud Computing White Papers


● Overview of Amazon Web Services
● Overview of Security Processes
● AWS Risk & Compliance Whitepaper
● Storage Options in the Cloud
● Architecting for the AWS Cloud: Best Practices
● Well Architected Framework

27. Final Project

28. Final Overview & Exam Discussion


V1.11 (May 2020)

4
Sherdil IT Academy
Trainer: Muhammad Usman Khan
(Pakistan’s 1st GCP Professional Cloud architect ID = 10074 )

Google Associate Cloud Engineer


Google Professional Cloud Architect
GCP 2 in 1 Course
S.No Content Remarks

1 Introduction & Overview: Theory / Lab


● Google Associate engineer & professional architect exam
● Google Cloud certification Roadmap & pricing
● Basics of Cloud Computing
● Google Cloud Services in details
● Signup & login Google cloud account
● Billing, Projects & IAM Overview
● Pricing Calculator

2 Billing, IAM & Projects Theory / Lab


● Signup & login Google cloud account
● Use GCP Project 1st time
● Use Google cloud Pricing calculator
● Implement labels & quotas
● Link billing account with multiple projects
● Working with IAM, IAM groups, Roles & service accounts

3 Google Cloud Interfaces & deployment tools Theory / Lab


● Install, configure & working on Cloud SDK & cloud shell
● Configure Cloud pub/sub & get message using cloud SDK
● Enabling Cloud API service within the project

4 Google Compute Engine (GCE) Overview Theory / Lab


● Deploying windows & Linux VMs using Google Compute Engine (GCE)
● Custom Images & snapshots
● Disks & VM Storage
● Startup & shutdown scripts
● RDP & SSH login using multiple methods
● Public & private subnet VM
● Bastion host & private VM accessibility
● Cloud NAT testing with private VM
● Compute Engine VM types
● About Preemptible VMs

5 Cloud storage Overview Theory / Lab


● Create & configure cloud storage (storage types)
● Deploy static website & move data between storage bucket
● Assign the user to access the bucket object
● Object versioning
● Bucket & object encryption
● Object change notification
● Audit logging

5
● Lifecycle policies

6 GCP Virtual network & shared VPC Overview Theory / Lab


● Create & configure VPC with multi Region Subnets
● Configuring NAT Gateway using the private subnet
● Deployment of custom routes & firewall rules
● Internal Only private IP, Google private access, Static external & private IP
● Dynamic routing & Network Services tiers
● VPC Peering
● Cloud Router
● Cloud CDN
● Cloud DNS
● Cloud VPN Demo (AWS & GCP Hybrid connectivity)

7 Load Balancer & AutoScaling Overview Theory / Lab


● Deployment of Load balancer & Autoscaling
● Load balancer health check & content-aware
● Load distribution algorithm
● Load balancer session affinity
● Autoscaler & Instance Group Updates
● Load balancer types
● TCP/SSL based load balancers
● Regional Internal & external load balancer
● Attached Autoscaling with Loadbalancer backend service

8 Stack driver & monitoring Overview Theory / Lab


● Google Stack driver logging
● Trace
● Error reporting
● Debug
● System uptime
● Alert configuration with Email & SMS

9 GCP databases Overview Theory / Lab


● About GCP databases
● My SQL & PostgreSQL deployments
● Backup & restore
● High Availability & read replica
● Logging & PointinTIme recovery
● Cloud Spanner Feature, architecture & Performance

10 DigData Overview Theory / Lab


● Cloud big query
● Cloud data proc: architectural & storage components
● Cloud data proc: jobs & workflows
● Cloud data proc: pricing
● Cloud Bigtable: Migration from HBASE
● Cloud Bigtable: Schema designing, application profile & performance
● Cloud Dataflow: Basic & concepts
● Cloud dataflow vs Data proc
● Cloud Datalab
● Cloud pub/sub

11 Google App Engine Theory / Lab


● Services, version & instances
● Standard & flexible environment

6
● App engine app.yaml
● App engine pricing
● Application deployment using a flexible environment
● Traffic splitting
● App engine Security scanner
● How to avoid cloud cost using app engine

12 Google Kubernetes Engine (GKE)


● Fundamentals & overview
● Kubernetes Engine Cluster - Master & Nodes
● POD & Service
● Deployments
● Node Pools
● Auto Scaling
● Regional and Multizone Clusters
● GPU's Support
● Labels & Selectors
● Load Balancing
● Local SSD Support
● Node Images
● Node Repair
● Networking
● Other Concepts
● Other Concepts
● Anthos fundamentals

13 Google Cloud Function & Cloud Run Theory / Lab

14 Deployment of Wordpress Vm using cloud launcher Theory / Lab

15 Application deployment using Deployment Manager (IAC) Theory / Lab

16 Google AI & Machine Learning models Theory

17 Case Studies Overview Theory


● Mountkirk Games
● Dress4Win
● TerramEarth

18 Overview Theory
● Storage Transfer Service
● Data Migration best practice
● Cloud migration
● AWS to GCP migration
● DR concepts
● Cost optimization
● Backup & recovery Method
● Security Method in GCP
● Legal Compliance & Audits

19 Course Summary & exam Preparation Theory


V1.2 (12 May2020)

7
Sherdil IT Academy
Microsoft Azure Infrastructure and Deployment
Trainer: Talal Masood
Microsoft Azure 2 In 1
Course outline
S. Topic Detail
No s s
● Benefits and Considerations
1. Introduction to Azure
● As A Service Offerings
Fundamentals and
● Azure Tools
Security
● Core Identity
● Azure Pricing and Support
● Planning and Managing Cost
● Azure Regions
● Azure Resource Manager
● Defense in Depth
● Security Layers
● Compliance and Security Requirements

● Intro to Accounts and Subscriptions


2. Manage Azure
● Naming and Tagging
Subscriptions and
● Azure Subscriptions Configurations
Security Operations
● RBAC Overview
(Theory) ● Azure Monitor
● Log Analytics
● Azure Security Center Overview
● Azure Policy
● Azure Resource Locks

1. Azure Trial Account Creation


3. Manage Azure
2. Quotas, Cost Analysis and Tagging
Subscriptions and
3. Monitoring, Alerts, Activity log
Security Operations
4. Billing Alerts
(Labs) 5. Cost Management
6. Subscription Policies
7. Implement Role-Based Access
8. Azure Monitor and Alerts
9. Log Analytics
10. Prevent and Respond to Threats in Azure
Security Center
11. Implement Azure Policy
12. Implement a Resource Lock

8
● Network Overview
4. Azure Virtual Networks
● Network Security Overview
and Security (Theory)
● Network Security Groups (NSGs)
● Cross Site Connectivity
● Azure Load Balancing Services
● Azure Firewall
● Distributed Denial of Service (DDoS)

1. Create VNets and Subnets via the Azure


5. Azure Virtual Networks
Portal and PowerShell
and Security (Labs)
2. Configure User-Defined Routes and VNet
Peering
3. Create and Configure a NSG
4. Cross Site Connectivity
5. Create and Configure an Azure Load
Balancer
6. Configure Azure DNS
7. Configure App Gateway
8. Configure Azure Firewall

● Virtual Machines (VMs) Overview


6. Host Operations and
● VM Configuration, Networking, Storage
Security (Theory)
● VM Availability, Scalability, Extensions
● Azure Disk Encryption
● VM Security Best Practices
● Containers Overview
● Azure Kubernetes Service (AKS)
● Container Scanning

1. Create and Connect to Azure VM


7. Host Operations and
2. Deploying Virtual Machine Images, Custom
Security (Labs)
Images, Linux
3. Configuring Virtual Machines
4. Create Key Vault for Disk Encryption
5. Configure Disk Encryption
6. Azure Security Center and VM
Management
7. VM Hardening in Security Center
8. Install Docker and Git for Windows
9. Prepare Application for Azure Kubernetes
Service (AKS)
10. Create and Secure Azure Container
Registry
11. Create Kubernetes Cluster
12. Run Application on Kubernetes

● Storage Account Overview


8. Storage and Data
● Manage Permissions
Services with Security
● Encryption Keys and Key Vault
(Theory)
● Key Vault Overview
● Azure SQL Services
● Design Auditing and Caching Strategies
● Cosmos DB
● Types of Data
● Azure Backup and Recovery Services

9
1. Create a Storage Account via Portal
9. Storage and Data
2. Use Storage Explorer with Azure Storage
Services with Security
3. Create and Manage SAS
(Labs)
4. Azure File and Sync Services
5. Creating an Azure SQL Database
6. SQL Long Term Backup Retention
7. Implement Security for Azure Data Lake
Store
8. Configure Azure Backup and Recovery
Services

Azure Active Directory for Workloads ● Azure Active Directory (AD) Overview
10.
● AD Connect Overview
(Theory)
● Authentication Options
● Service Principals
● Identity Protection
● Privileged Identity Management (PIM)

11. Azure Active Directory for Workloads 1. Create Azure AD Tenant


2. Move Subscription to another Directory
(Labs)
3. Create Users and Groups
4. Implementing AD Connect
5. Monitoring with AD Connect Health
6. Create a Service Principal
7. App Registration
8. Configure Identity Protection
9. Configure Privileged Identity Management

V1.0 (5th February

10
Sherdil IT Academy
Alibaba Cloud 3in1
Trainer = Muhammad Usman Khan

Course outline
S.No Content T L EXAM

Intro to Cloud Computing ● ACA/ACP

Overview of Alibaba Cloud Services ● ACA/ACP

Alibaba Cloud certification Roadmap & pricing ● ACA/ACP

Alibaba Cloud Regions and Availability Zones ● ● ACA/ACP

Signup & login Alibaba Cloud Account ● ● ACA/ACP

Networking ● ●

● Design a Virtual Private Cloud (VPC) in detail ● ● ACP

● Route, Routing table & Subnets ● ● ACP

● Configure NAT Gateway ● ● ACP

● Optional Components with VPC ● ● ACP

● Design a complete VPC with HA (Complete Lab) ● ACP

● VPC Final Review with Exam Discussion ● ACP

● Server Load Balancer (SLB) in detail ● ● ACP

● Alibaba Cloud CDN & Alibaba Cloud DNS in detail ● ● ACP

Elastic Computing Services (ECS)

● Alibaba ECS essentials & Components ● ACA/ACP

● ECS Scale in, Scale-up VS Scale-out the concept ● ● ACA/ACP

● Launch ECS with Template & Custom Image ● ● ACA/ACP

● Block Storage devices Types & Its Encryption ● ● ACA/ACP

● Private, Public & Elastic IP Address ● ● ACA/ACP

● Create and Launch ECS Linux & Windows Instance ● ● ACA/ACP

11
● Create Image & Snapshot ● ● ACA/ACP

● Server Load balancer (SLB) & Autoscaling concepts ● ACA/ACP

● Create an ECS Instance using AS Group ● ● ACA/ACP

● ECS & AS group Q/A & discussions ● ACA/ACP

Object Storage Service (OSS)

● Object Storage Service (OSS) essentials & components ● ACA/ACP

● OSS Permissions (Bucket Policies) ● ACA/ACP

● OSS Storage Types (Standard, IA, Archive) ● ACA/ACP

● Website hosting with OSS ● ACA/ACP

● Object Storage Service (OSS) exams Q/A discussions ● ACA/ACP

Database (RDS)

● RDS essentials ● ACA/ACP

● RDS LAB (MySql) ● ACA/ACP

Management and Monitoring

● RAM essentials and best practices ● ACA/ACP

● RAM Policies, MFA and Roles ● ● ACA/ACP

● RAM users and groups ● ● ACA/ACP

● Create a user, group with RAM policies (Lab) ● ● ACA/ACP

● RAM Exam Q/A Discussions ● ACA/ACP

● Cloud Monitor ● ● ACA

Alibaba Cloud china gateway

● Alibaba cloud china gateway intro ACA/ACP

Security (Optional part)

● Game Shield (Network security) ● ACA Cloud Security

● DDoS Protection (Basic, Pro, Premium) [Network security] ● ACA Cloud Security

● Cloud Firewall (Network security) ● ACA Cloud Security

● Alibaba Cloud SSL Certificate Service (Application security) ● ACA Cloud Security

● Web Application Firewall (WAF) [Application security] ● ACA Cloud Security

12
● Server Guard (Server security) ● ACA Cloud Security

● ActionTrail ● ACA Cloud Security


Updated: 03-04-2020

13
Sherdil IT Academy
Sherdil Certified DevOps Engineer (SCDE)
Trainer(s) = Zaheer Hussain / Muhammad Adnan

Course outline
S.No Content Theory Lab

Linux Essentials

1 Introduction ●

2 Differences between Windows, OS X, and Linux ●

3 Installation ● ●

4 File system ● ●

5 Linux Basic Commands ● ●

6 Shell scripting ● ●

7 Directory structure / permission ● ●

8 Storage / configuration ● ●

9 Archiving and compression ● ●

10 System monitoring tools ● ●

11 Job scheduling ● ●

12 services ● ●

13 Rpm / yum ● ●

Git

14 Version Control System ●

15 Git Introduction ●

16 Installation of Git ● ●

14
17 Configuration of Git ● ●

18 Local Repository ● ●

19 Initializing Git Repository ● ●

20 Git Basic Example ● ●

21 Git Tag ● ●

22 Git branch ● ●

23 Git Merge ● ●

24 Git Stash ● ●

25 Git Revert ● ●

26 Git Diff ● ●

27 Git Clone ● ●

28 Securing Git using ssh-keys ● ●

29 Git Reset ● ●

30 Git GC / Prune ● ●

31 Git Remote Repository ● ●

32 Git Logs ● ●

33 Git Command Alias ● ●

Docker

34 Introduction to Docker

35 Install & Setup Docker on Linux ● ●

36 Remove, Downgrade, Upgrade ● ●

37 Storage & Logging driver ● ●

38 Docker Registry ● ●

39 Docker Images ● ●

15
40 Docker Containers ● ●

41 Docker Diagnose ● ●

42 Dockerfile ● ●

43 Docker Compose ● ●

44 Docker Compose & Swarm ●

45 Docker Stack ● ●

46 Swarm Backup and Restore (Manager) ● ●

47 Docker Networking ● ●

48 Docker Services ● ●

49 Docker Volume ● ●

50 Docker Jenkins ●

51 Docker Swarm vs Kubernetes ●

Jenkins

52 Introduction

53 Download and Install Jenkins

54 Jenkins Configuration

55 Jenkins Plugins

56 Security Management

57 Freestyle jobs

58 Integration of Jenkins with GIT

16
59 Build Java Code

60 Building a Jenkins Pipeline (CI/CD)

Kubernetes

61. Core Concepts ●

61.1 Cluster Architecture ●

61.2 Kubernetes API primitives ●

61.3 Services and other network primitives ● ●

62. Scheduling ● ●

62.1 Use label selectors to schedule Pods. ● ●

62.2 Understand the role of DaemonSets. ● ●

62.3 ● ●
Understand how resource limits can affect Pod
scheduling.

62.4 ● ●
Understand how to run multiple schedulers and how
to configure Pods to use them.

62.5 Manually schedule a pod without a scheduler. ● ●

62.6 Display scheduler events. ● ●

62.7 Know how to configure the Kubernetes scheduler. ● ●

63. Logging/Monitoring ● ●

63.1 ● ●
Understand how to monitor all cluster components.

17
63.2 Understand how to monitor applications. ● ●

63.3 Manage cluster component logs. ● ●

63.4 Manage application logs. ● ●

64. Application Lifecycle Management ●

64.1 ●
Understand Deployments and how to perform rolling
updates and rollbacks.

64.2 Know various ways to configure applications. ● ●

64.3 Know how to scale applications. ● ●

64.4 ● ●
Understand the primitives necessary to create a self-
healing application.

65. Cluster Maintenance ● ●

65.1 Understand Kubernetes cluster upgrade process. ● ●

65.2 Facilitate operating system upgrades. ● ●

65.3 Implement backup and restore methodologies ● ●

66. Security ● ●

66.1 ● ●
Know how to configure authentication and
authorization.

66.2 Understand Kubernetes security primitives. ● ●

66.3 Know to configure network policies ● ●

66.4 ● ●
Create and manage TLS certificates for cluster
components.

66.5 Work with images securely. ● ●

18
66.6 Define security contexts. ● ●

66.7 Secure persistent key value store. ● ●

67. Storage ● ●

67.1 ● ●
Understand persistent volumes and know how to
create them.

67.2 Understand access modes for volumes. ● ●

67.3 Understand persistent volume claims primitive. ● ●

67.4 Understand Kubernetes storage objects. ● ●

67.5 ● ●
Know how to configure applications with persistent
storage.

68. Networking ● ●

68.1 ●
Understand the networking configuration on the
cluster nodes.

68.2 Understand Pod networking concepts. ● ●

68.3 Understand service networking. ● ●

68.4 Deploy and configure network load balancer. ● ●

68.5 Know how to use Ingress rules. ● ●

68.6 Know how to configure and use the cluster DNS. ● ●

68.7 Understand CNI. ●

69. Installation, Configuration & Validation ● ●

69.1 Design a Kubernetes cluster. ● ●

19
69.2 Install Kubernetes masters and nodes. ● ●

69.3 Configure secure cluster communications. ● ●

69.4 Configure a Highly-Available Kubernetes cluster. ● ●

69.5 ● ●
Know where to get the Kubernetes release binaries.

69.6 ● ●
Provision underlying infrastructure to deploy a
Kubernetes cluster.

69.7 Choose a network solution. ●

69.8 ●
Choose your Kubernetes infrastructure configuration.

69.9 Run end-to-end tests on your cluster. ● ●

69.10 Analyse end-to-end tests results. ● ●

69.11 Run Node end-to-end tests. ● ●

69.12 ● ●
Install and use kubeadm to install, configure, and
manage Kubernetes clusters.

70. Troubleshooting ● ●

70.1 Troubleshoot application failure. ● ●

70.2 Troubleshoot control plane failure. ● ●

70.3 Troubleshoot worker node failure. ● ●

70.4 Troubleshoot networking. ● ●

Ansible

20
71 About Ansible

72 How to Install Ansible

72 Configuring SSH and Sudo for Ansible

73 The Ansible Configuration File

74 Setting Up the Ansible Inventory

75 The Ansible Command

76 The Shell and Command Modules

77 Ansible course summary


V1.0 (29th March 2020)

21

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy