Module 1: Introduction to OpenShift Virtualization
Overview of OpenShift Virtualization. Benefits of integrating VMs into OpenShift.
Overview of OpenShift Virtualization. Benefits of integrating VMs into OpenShift.
Integrate Ceph Storage with OpenStack services like Glance and Cinder
Perform day-to-day operations and maintenance tasks on a Ceph Storage
Configure Ceph Storage to provide file storage for clients using
Configure Ceph Storage to provide object storage for clients using
Configure Ceph Storage to provide block storage for clients using
Manage and adjust the CRUSH and OSD maps to optimize
Create and manage components that comprise the object storage cluster,
Manage the Ceph Storage configuration, including primary settings, the use
Deploy a new Ceph Storage cluster and expand the cluster
Describe Ceph Storage architecture, including data organization, distribution, and client
Consolidate and review the skills and knowledge acquired throughout the
Scale and automate compliance checks with Red Hat Satellite.
Identify and address common security vulnerabilities using Red Hat Insights.
Assess and remediate system compliance using OpenSCAP.
Apply SELinux policies to improve security and process confinement.
Deploy AIDE to detect and analyze changes in file systems.
Utilize the Linux kernel's Audit system to record and inspect
Configure PAM to manage authentication and authorization settings.
Implement USBGuard to protect systems from unauthorized USB devices.
Encrypt data on storage devices using LUKS. Manage automatic decryption
Use Ansible Playbooks to remediate configuration and security issues.
Develop strategies to manage security on Linux systems.
Continuous improvement frameworks Leading change in dynamic environments
Strategies for scaling agility Creating alignment between teams and organizational
Building trust and psychological safety Encouraging cross-functional teamwork
The core principles of agility Shifting from command-and-control to servant
Understanding the need for agile leadership Key attributes of effective
Tailoring facilitation approaches for diverse teams Case studies and real-world
Handling conflicts effectively within Agile teams Encouraging constructive communication and
Identifying and addressing team challenges Building trust and cohesion within
Decision-making frameworks Techniques to drive team engagement and collaboration
Definition and role of an Agile Facilitator Core competencies and
Reflecting on personal leadership styles. Adopting agile mindsets and behaviors.
Implementing feedback loops for improvement. Mentoring team members for skill
Enhancing communication among team members and stakeholders. Utilizing collaborative tools
Building and leading effective Scrum teams. Driving organizational change toward
Implementing best coding practices. Encouraging continuous integration and delivery.
Addressing challenges in distributed Scrum teams. Managing technical debt in
Effective team communication strategies. Building psychological safety within teams. Advanced
Principles of Agile architecture. Design patterns and anti-patterns. Creating maintainable
Setting up and using continuous integration pipelines. Automated testing frameworks.
Deep dive into Test-Driven Development (TDD). Behavior-Driven Development (BDD) implementation
Agile frameworks and tools Real-world case studies Applying CSD skills
Incremental and iterative design Managing technical debt Principles of maintainable
Pair Programming Techniques for effective collaboration Handling challenges in pair
Test-Driven Development (TDD) Writing effective unit tests Refactoring with confidence
Principles of Agile and Scrum Roles and responsibilities in Scrum
Leveraging metrics for product and process optimization. Implementing feedback loops
Applying Scrum in distributed and large-scale teams. Exploring frameworks like
Building strong partnerships with stakeholders. Managing stakeholder expectations effectively.
Prioritization techniques for maximum business value. Managing dependencies in large-scale
Crafting and communicating a compelling product vision. Aligning product strategy
Leveraging feedback for ongoing improvement. Implementing practices for sustainable product
Understanding frameworks for scaling Scrum. Coordinating multiple Scrum teams for
Advanced backlog prioritization techniques. Addressing dependencies and risks in backlog
Building strong relationships with stakeholders. Techniques for effective communication and
Enhancing product vision and strategy. Defining metrics for value and
Measuring success and adapting to changes Ensuring continuous delivery of
Working with stakeholders and teams Effective communication techniques in Agile
Writing and prioritizing user stories Techniques for backlog refinement
Crafting a compelling product vision Creating a roadmap aligned with
Responsibilities and authority Managing stakeholders and ensuring alignment
Key principles and values of Scrum Roles in a Scrum
Strategies to overcome impediments in complex environments. Tools and techniques
Enhancing collaboration across teams and stakeholders. Building high-performing Scrum teams.
Supporting multiple Scrum teams in a scaled environment. Aligning team
Advanced principles of servant leadership. Strategies to lead organizational change.
Deep dive into coaching techniques. Enhancing facilitation skills for team
Self-assessment to identify strengths and areas for growth. Creating a
Implementing Scrum across multiple teams. Understanding complex systems and organizational
Forming and sustaining effective Agile teams. Mastering development practices and
Differentiating between consulting and coaching roles. Effective conflict intervention strategies.
Navigating team dynamics effectively. Guiding teams through productive discussions
Exploring the evolution of Agile methodologies. Identifying and addressing common
Adapting Scrum for larger projects and organizations. Driving innovation and
Servant leadership and team dynamics. Handling challenges and conflict resolution.
Sprint planning, daily stand-ups, and retrospectives. Backlogs, increments, and the
ScrumMaster, Product Owner, and Development Team. The role of leadership
Overview of Agile principles and values. Key benefits of Scrum
Exam preparation strategies. Mock tests and review sessions.
Aligning enterprise architecture with business strategies. Case studies on TOGAF
Architecture patterns and best practices. Stakeholder management and communication.
Establishing effective governance frameworks. Roles and responsibilities in architecture governance.
Phases of the ADM and their practical application. Iteration and
Overview of TOGAF standards. Understanding the enterprise continuum and architecture
Phases of the TOGAF ADM. Applying ADM in Business Architecture
Application of the Business Scenario method. Integrating scenarios into the
Role in Enterprise Architecture. Techniques and best practices.
Understanding Value Streams. Value stream mapping and its applications.
Concept and modeling techniques. Developing Business Capability maps.
Definition and importance. Relation to Enterprise Architecture.
Overview of Enterprise Architecture. Introduction to the TOGAF framework.
Exam structure and key focus areas. Study tips and practice
Techniques for conducting risk analyses using Open FAIR™. Case studies
Detailed study of the Risk Analysis (O-RA) Standard. Exploration of
Overview of The Open Group and Open FAIR™ standards. Importance
Real-world applications of O-AA Lessons learned and success stories
Collaborative approaches Ensuring alignment with business objectives
Developing Agile architectures Continuous architectural refactoring
Agile strategy and organization Data, information, and AI integration
Definition and scope Importance in Digital and Agile Transformation
Tips and guidance for passing the IT4IT™ 3 Foundation Certification
Comparison with ITIL, COBIT, and TOGAF Case studies and practical
IT service lifecycle phases and processes Tools and automation for
Strategy to Portfolio (S2P): IT strategy and portfolio management Requirement
Overview of The Open Group and IT4IT™ standards Importance of
Integrating emerging technologies Case studies and real-world applications
Creating adaptive organizational structures Encouraging continuous learning and innovation
Ensuring compliance and operational integrity Implementing robust governance frameworks
Managing digital product lifecycles Aligning product goals with business strategy
Understanding the need for digital practices Overview of DPBoK principles
Exam structure and tips Practice questions and mock tests
Case studies and workshops Best practices for implementation
Techniques for model analysis Alignment with business strategies
Extensions and viewpoints Stakeholder communication
Layers and relationships Core modeling techniques
Overview of ArchiMate® Key elements and structure
Tips and strategies for certification success Practice tests and review
Real-world case studies Hands-on modeling exercises
Cross-layer relationships Viewpoints and stakeholders
Motivation extension Strategy extension
Layers: Business, Application, and Technology Relationships and elements
Overview of ArchiMate 3 and its purpose Key features and
Key focus areas for the exam. Practice questions and mock
Overview of the Technical Reference Model (TRM). Introduction to the
The concept of the Enterprise Continuum. Role in architecture re-use.
Architectural views, viewpoints, and stakeholders. Building Blocks and their application.
ADM phases and cycle overview. Deliverables of each ADM phase.
Overview of TOGAF® and its relevance. The TOGAF® architecture framework.
Exam Format and Requirements Practice Questions and Mock Tests Exam
Governance Structures and Processes Risk Management in Enterprise Architecture Implementation
Architecture Continuum Solution Continuum Tools and Techniques
ADM Phases and Objectives Iteration and Levels of ADM Deliverables
Architecture Development Method (ADM) TOGAF Reference Models Architecture Repository
Overview of Enterprise Architecture Key Concepts and Definitions Benefits of
Study tips and strategies for the recertification exam. Practice questions
Working with semi-structured and unstructured data. Data sharing and collaboration.
Data encryption and masking. Governance, auditing, and monitoring.
Query performance analysis and tuning. Utilizing materialized views and caching
Best practices for data loading and unloading. Advanced data transformation
Review of Snowflake architecture and key features. Updates on recent
Leveraging Snowflake's advanced data governance features. Managing lifecycle of objects
Using Snowflake's Information Schema and Account Usage. Implementing logging and
Setting up multi-cluster warehouses. Managing workloads using resource monitors. Advanced
Monitoring and tuning query performance. Managing warehouses for optimal cost
Implementing role-based access control (RBAC). Managing data security and encryption.
Practical lab sessions to reinforce learning. Automated lab work checks
Implementing Time Travel and Cloning. Exploring data sharing and the
Creating file formats and loading data into tables. Applying data
Creating and configuring databases and warehouses. Managing tables, schemas, and
Navigating the Snowflake Web Interface. Understanding and setting user roles.
Overview of cloud data warehousing. Snowflake's architecture and key features.
Setting up and managing account structures. Security best practices and
Implementing cloning and time travel. Data sharing techniques.
Handling JSON, XML, and other semi-structured data formats. Using Snowflake's
Executing DDL (Data Definition Language) queries. Executing DML (Data Manipulation
Performance optimization strategies. Managing concurrency and workload.
Methods for data loading and unloading. Best practices for data
Snowflake architecture and key features. Overview of the Snowflake user
Real-world use cases and problem-solving Project-based assessment
Access control and role management Data encryption and compliance Data
Virtual warehouses and performance tuning Cloning and data recovery features
Loading structured and semi-structured data Querying data using Snowflake SQL
Creating a Snowflake account Navigating the web interface Overview of
Overview of Snowflake architecture Key features and differentiators Use cases
Evaluating performance metrics Identifying bottlenecks and optimization opportunities Best practices
Designing scalable compute architectures Optimizing compute resources for data workloads
Designing near real-time data streams Implementing end-to-end streaming solutions Monitoring
Data transformation techniques Replication across multiple cloud platforms Data sharing
Sourcing data from Data Lakes Integrating APIs for data acquisition
Exam structure and key topics Practice questions and review sessions
Best practices for query optimization Ensuring data security and compliance
Time series forecasting Real-time analytics Sentiment analysis with Snowflake
Building predictive models using Snowflake Integrating with ML libraries like
Importing and cleansing data Advanced transformations using SQL and Python
Overview of Snowflake’s Data Cloud Key features for data scientists
Real-world scenarios Interactive problem-solving sessions Architecting end-to-end solutions
Designing for scalability Disaster recovery planning Multi-region deployments
Data encryption and masking Role-based access control Compliance considerations
Query performance tuning Resource management strategies Monitoring and troubleshooting
Key architectural components Data modeling techniques Storage and compute separation
Preparing data for business presentations. Creating effective data visualizations. Utilizing
Conducting descriptive and diagnostic analyses. Applying statistical methods for data
Writing and troubleshooting advanced SQL queries. Utilizing window functions and
Performing complex data transformations. Building data models within Snowflake. Optimizing
Understanding data ingestion methods in Snowflake. Techniques for efficient data
System Resource Usage and Billing Managing Virtual Warehouses Resource Monitors
Understanding Micro-Partitions Data Clustering Scaling Virtual Warehouses
Snowflake SQL Support for Data Analysis: SQL Analytic Functions User-Defined
Snowflake Objects & Commands: Data Description Language (DDL) Data Manipulation
Snowflake Architecture and Overview: Technical Overview Cloud Services Layer Storage
Creating reusable components and frameworks. Establishing standards and processes for
Addressing performance, scalability, and reliability concerns. Implementing monitoring and operational
Designing Mule applications for various deployment scenarios. Applying development methodologies
Anypoint Platform deployment options: MuleSoft-hosted vs. customer-hosted. Configuring and selecting
High-level design principles for integration solutions. Selecting appropriate Mule components
Roles and responsibilities of an Integration Architect. Overview of Anypoint
Tools and techniques for monitoring Performance analysis and optimization
Meeting API quality goals Testing and validation strategies
Setting up organizational structures Platform configuration and management
Deploying to CloudHub Deployment strategies and best practices
Implementing API governance Managing API policies
Designing APIs using Process, Experience, and System Layers Best practices
Understanding application network basics Principles of API-led connectivity
Techniques for effective problem identification Gathering and analyzing business requirements
Practice exams and preparation tips Final review of key concepts
Strategies for customer-centric delivery Measuring the success of implemented solutions
Frameworks for proposal creation Presenting impactful solutions to stakeholders
Understanding the V2MOM framework Integrating customer success in strategies
Overview of Salesforce Catalyst Importance in business consulting
Building workflows with Salesforce Flow. Coordinating processes with Flow Orchestration.
Designing and building RPA processes. Deploying and managing RPA bots.
Creating flows to connect systems. Utilizing connectors and action steps.
Building integrations with Anypoint Studio. Connecting to various data sources.
API design using RAML. Implementing APIs with Anypoint Studio. Testing
Understanding hyperautomation concepts. Overview of Salesforce and MuleSoft integration.
Continuous integration and deployment Managing application versions
Securing data in transit and at rest Implementing authentication and
Implementing monitoring solutions Troubleshooting and debugging
Tuning application performance Ensuring high availability
Managing API lifecycle Applying security policies
Designing modular applications Implementing reusable components
Deploying applications to Anypoint Platform. Monitoring and managing APIs and
Understanding batch processing in Mule. Configuring batch jobs and steps.
Controlling message flow within Mule applications. Implementing error handling strategies.
Creating Mule applications. Connecting to databases, files, web services, and
Basics of RESTful API design. Defining API resources, methods, and
Understanding application networks and their benefits. Introduction to Anypoint Platform
Practice exams and tips for certification success
Securing APIs and integrations Implementing reusable and scalable solutions
Deploying Mule applications to CloudHub Managing APIs using API Manager
Implementing error handling strategies Debugging Mule applications
Using DataWeave for transformations Handling complex data formats
Overview of Mule applications Implementing flows and sub-flows Connecting to
API design principles Creating API specifications using RAML
Overview of API-led connectivity Introduction to the Anypoint Platform
Organization and site creation. WLAN template configuration. Subscription management and
Overview of Mist RESTful API, WebSocket API, and Webhooks API.
Implementing location-based services with BLE and vBLE technologies.
Understanding Marvis Actions and queries.
Utilizing monitoring and analytics tools.
Onboarding and managing Juniper access points. Provisioning and managing switches
Managing administrative and user accounts. Understanding account roles and authentication
Navigating the Mist Cloud user interface.
Use cases and solutions with Mist Wireless and Wired Access
Evolution of AI and machine learning. Advantages of Mist AI
Exploring the Juniper Extension Toolkit components. Utilizing service APIs and
Introduction to YANG data models. Implementing OpenConfig for standardized configurations.
Developing commit, op, and event scripts. Understanding SLAX and its
Utilizing Ansible for configuration management. Introduction to SaltStack and its
Writing Python scripts for automating network tasks. Introduction to PyEZ
Overview of data serialization formats: YAML, JSON. Implementing Jinja2 for
Understanding NETCONF protocol. Utilizing XML API for device configuration and
Introduction to network automation. Benefits and challenges of automation in
Location-based services and analytics IoT integration with MistAI Case studies
Common wireless issues and solutions Using AI tools for proactive
Monitoring network health and performance Managing users and devices Security
Setting up MistAI access points Configuring wireless SSIDs and policies
Overview of MistAI architecture Features of AI-driven wireless networks Benefits
Attack Detection and Prevention Utilizing packet captures and security logs
Chassis Clustering Redundancy groups and priorities High availability configurations IPsec
Applying QoS features to optimize network performance Traffic classification and
Implementing data center security best practices Configuring access controls and
Implementing DCI solutions between data centers EVPN signaled VXLAN Layer
Deploying EVPN/VXLAN overlays Configuring Anycast Gateways Inter-VRF routing and load
Building IP Clos fabrics Implementing BGP in data center environments
Virtual Chassis Fabric (VCF) configurations Multi-Chassis Link Aggregation (MC-LAG) Interchassis
On-box and event scripts Configuration management tools Zero Touch Provisioning
Selective packet processing. Filter-based forwarding.
Integration and configuration. Mitigation strategies.
Remote access and hub-and-spoke VPNs. Public Key Infrastructure (PKI) and
Persistent NAT and DNS doctoring. IPv6 NAT configurations.
Transparent and mixed modes. Secure wire and MACsec implementation.
Administrative roles and security profiles. Communication between logical systems.
Troubleshooting security policies. Monitoring security zones.
Overview of Layer 2 authentication mechanisms. Configuration of access control
Advanced Ethernet switching features. Implementation of MSTP and VSTP. Layer
Components and operation of IP multicast. IGMP and PIM sparse-mode
BGP route selection process. Next hop resolution and BGP attributes.
IS-IS configuration and troubleshooting. OSPFv2 and OSPFv3 operations. Routing policy
Benefits of chassis clustering. Configuration and troubleshooting of SRX clusters.
Understanding SSL Proxy concepts. Configuration and troubleshooting of SSL Proxy.
Configuration of Sky ATP and JATP. Integration with SRX Series
Policy management using Junos Space Security Director. Managing security objects
IPS database management. Configuration of custom attack objects.
Application Firewall and Application Quality of Service (AppQoS). Application Identification
Session management and Application Layer Gateways (ALGs). Policy logging and
Overview of security challenges in modern networks. Introduction to Juniper's
Implementing HA strategies in enterprise networks. Configuring VRRP and other
Overview of IP tunneling mechanisms. Configuring GRE and IP-IP tunnels.
BGP fundamentals and use cases. Establishing and managing BGP sessions.
OSPF concepts and operations. Configuring and optimizing OSPF.
Understanding routing instances and RIB groups. Configuring load balancing and
Implementing port security features. Mitigating common Layer 2 security threats.
Overview of STP and its variants. Configuring and troubleshooting STP.
Switching concepts and operations. Configuring and managing VLANs.
Understanding routing policies and their applications. Configuring and applying firewall
Overview of static and dynamic routing concepts. Configuring and monitoring
Monitoring device performance and traffic statistics. Performing system maintenance and