Linkedin Learning – Red Hat Certified Engineer EX294 Cert Prep 2 Using Ansible Playbooks Online Class

Linkedin Learning – Red Hat Certified Engineer EX294 Cert Prep 2 Using Ansible Playbooks Online Class-ZH
English | Size: 252.12 MB
Category: Tutorial


Looking to earn the Red Hat Certified Engineer (RCHE) certification? In this course, the second installment in a three-part series, learn how to create and work with Ansible playbooks as you prepare to take and ace the RHCE (EX294) exam Grant McWilliams shares tips for managing YAML files, explains how to work with variables to retrieve results after you run a command, and shows how to use Jinja2 template files. He goes over looping methods in Ansible, including how to loop with lists dictionaries, and conditionals. He also demonstrates how to use blocks to group tasks, as well as how to manage errors. Tune into this course, as well as the other two installments in this series, to learn what you need to know to walk into the test center feeling confident

Linkedin Learning – CSSLP Cert Prep 2 Secure Software Requirements

Linkedin Learning – CSSLP Cert Prep 2 Secure Software Requirements-XQZT
English | Size: 154.01 MB
Category: Tutorial


Specific, achievable security requirements are critical ingredients in the creation of any application. In this course, the second installment in the CSSLP Cert Prep series instructor Jerod Brennen dives into the subject of security requirements to prepare you for the second domain of the Certified Secure Software Lifecycle Professional (CSSLP) exam: Secure Software Requirements. Jerod discusses how to properly define what an app must be and do in order to remain secure. He covers how to approach security, privacy, and data classification requirements for applications. Plus, he goes over how to validate your requirements, including how to use a security requirement traceability matrix (SRTM) to determine how well an app adheres to your security requirements

Lynda – CompTIA Cloud Cert Prep 2 CV0 002 Storage Compute Networking and Security

Lynda – CompTIA Cloud Cert Prep 2 CV0 002 Storage Compute Networking and Security-APoLLo
English | Size:
Category: TUTORIAL


Earning the CompTIA Cloud+ certification shows potential employers that you possess the skills needed to perform effectively when dealing with cloud-based infrastructure services. In this course, review key cloud storage, compute, networking, and security concepts as you prepare for the CompTIA Cloud+ (CV0-002) certification exam. Instructor Tom Carpenter goes over the different types of cloud storage, as well as storage management and security options. Tom covers the basics of cloud compute, including how to determine what your deployment will demand from cloud compute and how to monitor usage to assess the effectiveness of your deployment. He also dives into the topic of cloud networking and explains how to create a functional security policy, leverage key security tools to protect your network, and more. Upon wrapping up this course, you’ll be prepared to tackle the first exam domain, Configuration and Deployment, as well as domain two, Security.

Linkedin Learning – Cisco DevNet Associate Cert Prep 2 Understanding and Using APIs

Linkedin Learning – Cisco DevNet Associate Cert Prep 2 Understanding and Using APIs-XCODE
English | Size: 133.90 MB
Category: Tutorial


Earning the Cisco DevNet Associate certification allows you to validate your ability to develop and maintain applications that are built on top of Cisco platforms. In this course, learn about using APIs to access network device features and services as you study for the Understanding and Using APIs domain of the Cisco DevNet Associate certification. Instructor Eric Chou details how to identify the basic components of API documentation and construct a request accordingly; reviews common usage patterns related to webhooks; and provides an introduction to API constraints. Eric also shares approaches for troubleshooting errors given the HTTP response code, details some of the most common API styles, and examines the three most common API authentication mechanisms and their advantages and disadvantages.