Here are the key certifications from Red Hat:
- RHCSA (Red Hat Certified System Administrator) - Certifies core Linux system administration skills
- RHCE (Red Hat Certified Engineer) - Certifies advanced Linux system administration skills for senior system administrators
- RHCVA (Red Hat Certified Virtualization Administrator) - Certifies skills to deploy and manage virtual hosts using Red Hat Enterprise Virtualization
Red Hat certifications validate hands-on skills through performance-based exams, ensuring certified professionals can effectively manage Red Hat solutions.
In case you missed our Red Hat Essentials Training at our offices find attached the slides that were presented. Designed to be the \'helicopter\' view of Red Hat and Open Source and the market opportunity.
This document provides an introduction and overview of Docker and containers. It discusses what containers are, how they differ from virtual machines, and how Docker works. Key points covered include common Docker commands, the Docker architecture, building images with Dockerfiles, and using Docker Compose to run multi-container applications. The benefits of containers for streamlining deployment and rapid scaling are also highlighted.
OpenShift Virtualization allows running virtual machines as containers managed by Kubernetes. It uses KVM with QEMU and libvirt to run virtual machines inside containers. Virtual machines are scheduled and managed like pods through Kubernetes APIs and can access container networking and storage. Templates can be used to simplify virtual machine creation and configuration. Virtual machines can be imported, viewed, managed, and deleted through the OpenShift console and CLI like other Kubernetes resources. Metrics on virtual machine resources usage are also collected.
KVM provides virtualization capabilities using the Linux kernel. It supports full virtualization of x86, PowerPC, s390 and IA-64 architectures using hardware extensions like Intel-VTx and AMD-V. KVM leverages existing Linux components like the scheduler and uses the Linux security model. Guests are scheduled as regular processes. Paravirtualization is used to improve performance through virtio drivers and paravirt_ops. KVM development is ongoing with goals of supporting more hardware features, improving scalability and integrating with management tools like libvirt.
Linux Training For Beginners | Linux Administration Tutorial | Introduction T...Edureka!
This Linux training will take you one step closer to becoming a Linux administrator. The most common and important tasks that a Linux admin is responsible for, is covered in this Linux training video. Below are the topics covered in this tutorial:
1) Linux File Permissions
2) ACLs (Access Control Lists)
3) Shell Scripting
4) Patching In Linux
5) Networking In Linux:-
a) SSH For Remote Host Access
b) SFTP For Remote File Transfer
c) SCP For Remote Folder Transfer
DevOps with Azure, Kubernetes, and Helm WebinarCodefresh
This document discusses DevOps tools for working with containers and Kubernetes. It introduces Helm as a package manager for Kubernetes that allows defining complex Kubernetes applications as charts that can be installed, upgraded, and rolled back easily. Codefresh is presented as a DevOps platform that integrates with Kubernetes and provides built-in steps for working with containers in CI/CD pipelines. The document provides an overview of concepts like containers, Docker, Kubernetes, orchestration, and Helm architecture. It also describes how to get started with installing Helm.
1. O documento apresenta os conceitos básicos do sistema operacional IBM-AIX, incluindo sua história, recursos e comandos.
2. É dividido em 12 módulos que cobrem tópicos como login, navegação no sistema de arquivos, edição de arquivos, permissões, shells e redirecionamento.
3. Inclui também apêndices com referências rápidas de comandos e endereços na Internet sobre Unix.
In case you missed our Red Hat Essentials Training at our offices find attached the slides that were presented. Designed to be the \'helicopter\' view of Red Hat and Open Source and the market opportunity.
This document provides an introduction and overview of Docker and containers. It discusses what containers are, how they differ from virtual machines, and how Docker works. Key points covered include common Docker commands, the Docker architecture, building images with Dockerfiles, and using Docker Compose to run multi-container applications. The benefits of containers for streamlining deployment and rapid scaling are also highlighted.
OpenShift Virtualization allows running virtual machines as containers managed by Kubernetes. It uses KVM with QEMU and libvirt to run virtual machines inside containers. Virtual machines are scheduled and managed like pods through Kubernetes APIs and can access container networking and storage. Templates can be used to simplify virtual machine creation and configuration. Virtual machines can be imported, viewed, managed, and deleted through the OpenShift console and CLI like other Kubernetes resources. Metrics on virtual machine resources usage are also collected.
KVM provides virtualization capabilities using the Linux kernel. It supports full virtualization of x86, PowerPC, s390 and IA-64 architectures using hardware extensions like Intel-VTx and AMD-V. KVM leverages existing Linux components like the scheduler and uses the Linux security model. Guests are scheduled as regular processes. Paravirtualization is used to improve performance through virtio drivers and paravirt_ops. KVM development is ongoing with goals of supporting more hardware features, improving scalability and integrating with management tools like libvirt.
Linux Training For Beginners | Linux Administration Tutorial | Introduction T...Edureka!
This Linux training will take you one step closer to becoming a Linux administrator. The most common and important tasks that a Linux admin is responsible for, is covered in this Linux training video. Below are the topics covered in this tutorial:
1) Linux File Permissions
2) ACLs (Access Control Lists)
3) Shell Scripting
4) Patching In Linux
5) Networking In Linux:-
a) SSH For Remote Host Access
b) SFTP For Remote File Transfer
c) SCP For Remote Folder Transfer
DevOps with Azure, Kubernetes, and Helm WebinarCodefresh
This document discusses DevOps tools for working with containers and Kubernetes. It introduces Helm as a package manager for Kubernetes that allows defining complex Kubernetes applications as charts that can be installed, upgraded, and rolled back easily. Codefresh is presented as a DevOps platform that integrates with Kubernetes and provides built-in steps for working with containers in CI/CD pipelines. The document provides an overview of concepts like containers, Docker, Kubernetes, orchestration, and Helm architecture. It also describes how to get started with installing Helm.
1. O documento apresenta os conceitos básicos do sistema operacional IBM-AIX, incluindo sua história, recursos e comandos.
2. É dividido em 12 módulos que cobrem tópicos como login, navegação no sistema de arquivos, edição de arquivos, permissões, shells e redirecionamento.
3. Inclui também apêndices com referências rápidas de comandos e endereços na Internet sobre Unix.
LibVirt and KVM provide virtualization capabilities on Linux systems. LibVirt uses a standardized API to manage different hypervisors like KVM. KVM allows running virtual machines at native speeds by using hardware virtualization extensions. It provides high density and portability compared to running systems directly on hardware. LibVirt handles tasks like networking, storage, and interfaces through tools like Virsh and Virt-Manager, and advanced topics include security with SELinux, bridged networking, and remote access.
Configuring Domino To Be An Ldap Directory And To Use An Ldap DirectoryEdson Oliveira
This document provides an overview of configuring Domino to use an LDAP directory and to function as an LDAP directory for other applications like IBM WebSphere Portal. It discusses LDAP concepts like objects, attributes and schemas. It then covers configuring the Domino LDAP service, importing users from an LDIF file, enabling write access, and troubleshooting issues. The document concludes with a section on configuring WebSphere Portal to use Domino as the LDAP server by modifying configuration files and scripts.
This document provides an overview of Active Directory Domain Services (AD DS). It describes the physical components of AD DS including domain controllers, the global catalog, and replication. It also describes the logical components including domains, forests, organizational units, and trusts. AD DS provides centralized management of users, computers, and policies on a network. It uses domains and forests to group resources and uses replication to keep information synchronized across domain controllers.
This document provides an overview of a Kubernetes training session. It introduces the trainer's background and experience with Kubernetes. The training covers Kubernetes concepts, production capabilities, workflows, includes a demo, and ends with a question and answer session. Key areas that will be reviewed include security, observability, package management, jobs, and additional capabilities needed for production deployments. Workflows that may be discussed include those for developers, operators, and testers.
The document provides requirements and sample exam questions for the Red Hat Certified Engineer (RHCE) EX294 exam. It outlines 18 exam questions to test Ansible skills. Key requirements include setting up 5 virtual machines, one as the Ansible control node and 4 managed nodes. The questions cover tasks like Ansible installation, ad-hoc commands, playbooks, roles, vaults and more. Detailed solutions are provided for each question/task.
Since its first 1.12 release on July 2016, Docker Swarm Mode has matured enough as a clustering and scheduling tool for IT administrators and developers who can easily establish and manage a cluster of Docker nodes as a single virtual system. Swarm mode integrates the orchestration capabilities of Docker Swarm into Docker Engine itself and help administrators and developers with the ability to add or subtract container iterations as computing demands change. With sophisticated but easy to implement features like built-in Service Discovery, Routing Mesh, Secrets, declarative service model, scaling of the services, desired state reconciliation, scheduling, filters, multi-host networking model, Load-Balancing, rolling updates etc. Docker 17.06 is all set for production-ready product today. Join me webinar organised by Docker Izmir, to get familiar with the current Swarm Mode capabilities & functionalities across the heterogeneous environments.
Linux is an operating system created by Linus Torvalds that enables applications and users to access computer devices. It is similar to Windows and OS X but is unique in being modular and flexible, allowing developers to use many languages. Linux has become very popular, powering major websites and representing a $25 billion ecosystem in 2008 as it is installed on computers and relied on by companies like Google, Twitter, and YouTube.
Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021Alphorm
Azure Active Directory est le point central d’une solution cloud sur Azure ou Microsoft 365.
Cette formation Azure Active directory est axée sur la mise en place d'un annuaire Azure Active directory et également les aspects hybrides avec les extensions des Active Directory locaux vers Azure Active directory avec AAD Connect ainsi que les nouveaux concepts de provisioning tel que le cloud Sync
Cette formation Azure Active directory montre tous les aspects techniques et d'architecture d'Azure Active directory et surtout d'AAD Connect, le moteur de synchronisation vers Azure AD.
Cette formation contient et aborde toutes les fonctionnalités de sécurité Azure Active Directory présente dans Azure AD P1 et P2.
Voici les notions de sécurité abordées dans cette formation :
• Azure MFA
• Conditional Access
• Intégration d’Azure AD et Cloud App Security
• SSPR ( Self Service Password Reset)
• Password Protection
• Azure AD Identity Protection
• PIM (Privileged Identity Management)
• Break Glass Account
• PasswordLess avec FIDO2
•
Dans cette formation Azure Active directory, vous allez apprendre à administrer votre Azure AD en interface graphique via le nouveau portail Admin Center Azure AD et en PowerShell avec le Module Azure AD. Vous allez également apprendre à sécuriser votre environnement Azure Active Directory ainsi que votre environnement Microsoft 365 de manière granulaire et optimal.
Engage.UG 2022 - Domino TOTP/2FA - Best Practices and PitfallsMilan Matejic
This document discusses best practices and pitfalls for implementing Time-based One-Time Password (TOTP) two-factor authentication (2FA) with HCL Domino. It covers topics such as motivation, terminology, how TOTP works, prerequisites, setup instructions, user and administrator workflows, troubleshooting, questions and answers, and references. The document provides detailed steps for configuring TOTP authentication for both Domino servers and Traveler mobile clients.
This document provides an introduction to containers and Docker. It defines key Docker terminology like images, containers, registries and explains Docker's benefits like isolation, portability and scalability. It compares containers to virtual machines and outlines Docker's components including Community Edition for development and Enterprise Edition for production.
This document provides a reference architecture for implementing a Virtual SAN Ready Node environment using Dell hardware and VMware software. It describes the physical and logical architecture, including networking, storage, and server node components. Specific hardware models are recommended, such as Dell R730 servers and Dell networking switches. The architecture supports VMware Horizon, including hybrid deployments with Horizon Air.
Red Hat is an open source software company that provides Linux operating systems, middleware, storage, and cloud computing solutions. Some key facts:
- Red Hat is the #1 provider of open source solutions, with over 90% of Fortune 500 companies using their products.
- They have over 7,000 employees worldwide and annual revenue of over $1 billion.
- Their solutions include Red Hat Enterprise Linux, JBoss middleware, OpenShift PaaS, and CloudForms management tools.
This document provides an overview of Active Directory Domain Services (AD DS) and instructions for installing domain controllers. It covers the following key points:
- AD DS has both logical components like domains, forests and organizational units, as well as physical components like domain controllers and global catalog servers.
- A domain controller authenticates users, authorizes access, and holds a copy of the domain database. At least two domain controllers are recommended for availability.
- Domain controllers use Kerberos authentication and the global catalog stores partial attributes for objects across forests to enable cross-forest queries.
- Installing a domain controller can be done from Server Manager, on Server Core, by upgrading an existing controller, or using install
This is an introduction session to containers and docks. Why do we need this technology, why is it different from virtualization and how you can use it for your next project.
Docker allows building, shipping, and running applications in portable containers. It packages an application with all its dependencies into a standardized unit for software development. Major cloud providers and companies support and use Docker in production. Containers are more lightweight and efficient than virtual machines, providing faster launch times and allowing thousands to run simultaneously on the same server. Docker simplifies distributing applications and ensures a consistent environment.
Red Hat Linux Certified Professional step by step guide Tech ArkitRavi Kumar
Introduction to course outline and certification
Managing files & directories
Basic Commands ls, cp, mkdir, cat, rm and rmdir
Getting help from using command line (whatis, whereis, man, help, info, –help and pinfo)
Editing Viewing of text files (nano, vi and vim)
User Administration Creating, Modifying and Deleting
Controlling services & daemons
Listing process
Prioritize process
Analyze & storing logs
Syslog Server & Client configuration
Compressing files & directories (tar and zip)
Copying files & directories to remote servers
Yum & RPM
Search files and directories
File & Directory links (Soft Links and Hard Links)
Managing of physical storage
Logical Volume Manager
Access Control List (ACL)
Scheduling of future Linux tasks
SELinux
NFS Server and Client configuration
Firewall
Securing the NFS using kerberos
LDAP client configuration
Setting UP ldap users home directory
Accessing the network storage using (CIFS) samba
Samba Multiuser Access
Using Virtualized systems
Creating virtual Machines
Automated installation of Redhat Linux
Automated Installation using Kickstart
Linux Booting Process
Root password Recovery
Fixing Partition Errors – Using Enter into Emergency Mode
Using Regular Expressions with grep
Understand and use essential tools for handling files, directories, command-line environments, and documentation
Operate running systems, including booting into different run levels, identifying processes, starting and stopping virtual machines, and controlling services
Configure local storage using partitions and logical volumes
Create and configure file systems and file system attributes, such as permissions, encryption, access control lists, and network file systems
Deploy, configure, and maintain systems, including software installation, update, and core services
Manage users and groups, including use of a centralized directory for authentication
Manage security, including basic firewall and SELinux configuration
Configuring static routes, packet filtering, and network address translation
Setting kernel runtime parameters
Configuring an Internet Small Computer System Interface (iSCSI) initiator
Producing and delivering reports on system utilization
Using shell scripting to automate system maintenance tasks
Configuring system logging, including remote logging
Configuring a system to provide networking services, including HTTP/HTTPS, File Transfer Protocol (FTP), network file system (NFS), server message block (SMB), Simple Mail Transfer Protocol (SMTP), secure shell (SSH) and Network Time Protocol (NTP)
This document compares Oracle Exadata and Teradata architectures. It summarizes that Exadata uses a two-tier architecture with shared memory and disk, while Teradata uses a shared-nothing architecture. It notes several advantages of Teradata including unconditional parallelism, linear scalability, and more automatic workload management compared to Exadata which requires more manual workload separation and resource tuning. The document also discusses higher support costs and a steeper learning curve for Exadata compared to Teradata.
Linux Containers(LXC) allow running multiple isolated Linux instances (containers) on the same host.
Containers share the same kernel with anything else that is running on it, but can be constrained to only use a defined amount of resources such as CPU, memory or I/O.
A container is a way to isolate a group of processes from the others on a running Linux system.
This document provides information about Red Hat training courses and certifications. It includes:
- An overview of Red Hat's industry-leading training courses, which are designed around real-world job roles to maximize skills transfer.
- Details on Red Hat's performance-based certification program, which assesses hands-on skills and is highly regarded in the IT industry.
- A listing and descriptions of Red Hat's certification tracks, including RHCSA, RHCE, RHCVA, and Certificates of Expertise specializations.
- Information on different training paths available to suit varied experience levels and backgrounds.
Upgrade your skill set related to the varied backgrounds of Linux Essentials to understand the distinguished fundamental concepts related to Red Hat Training and Certifications in the vicinity of Delhi NCR. Get the info regarding open-source software detailing knowledgeable Red Hat Courses through an explanatory curriculum possessing all basic fundamentals under the guidance of professional system administrators as well as system engineers. https://www.bytec0de.com/red-hat/
LibVirt and KVM provide virtualization capabilities on Linux systems. LibVirt uses a standardized API to manage different hypervisors like KVM. KVM allows running virtual machines at native speeds by using hardware virtualization extensions. It provides high density and portability compared to running systems directly on hardware. LibVirt handles tasks like networking, storage, and interfaces through tools like Virsh and Virt-Manager, and advanced topics include security with SELinux, bridged networking, and remote access.
Configuring Domino To Be An Ldap Directory And To Use An Ldap DirectoryEdson Oliveira
This document provides an overview of configuring Domino to use an LDAP directory and to function as an LDAP directory for other applications like IBM WebSphere Portal. It discusses LDAP concepts like objects, attributes and schemas. It then covers configuring the Domino LDAP service, importing users from an LDIF file, enabling write access, and troubleshooting issues. The document concludes with a section on configuring WebSphere Portal to use Domino as the LDAP server by modifying configuration files and scripts.
This document provides an overview of Active Directory Domain Services (AD DS). It describes the physical components of AD DS including domain controllers, the global catalog, and replication. It also describes the logical components including domains, forests, organizational units, and trusts. AD DS provides centralized management of users, computers, and policies on a network. It uses domains and forests to group resources and uses replication to keep information synchronized across domain controllers.
This document provides an overview of a Kubernetes training session. It introduces the trainer's background and experience with Kubernetes. The training covers Kubernetes concepts, production capabilities, workflows, includes a demo, and ends with a question and answer session. Key areas that will be reviewed include security, observability, package management, jobs, and additional capabilities needed for production deployments. Workflows that may be discussed include those for developers, operators, and testers.
The document provides requirements and sample exam questions for the Red Hat Certified Engineer (RHCE) EX294 exam. It outlines 18 exam questions to test Ansible skills. Key requirements include setting up 5 virtual machines, one as the Ansible control node and 4 managed nodes. The questions cover tasks like Ansible installation, ad-hoc commands, playbooks, roles, vaults and more. Detailed solutions are provided for each question/task.
Since its first 1.12 release on July 2016, Docker Swarm Mode has matured enough as a clustering and scheduling tool for IT administrators and developers who can easily establish and manage a cluster of Docker nodes as a single virtual system. Swarm mode integrates the orchestration capabilities of Docker Swarm into Docker Engine itself and help administrators and developers with the ability to add or subtract container iterations as computing demands change. With sophisticated but easy to implement features like built-in Service Discovery, Routing Mesh, Secrets, declarative service model, scaling of the services, desired state reconciliation, scheduling, filters, multi-host networking model, Load-Balancing, rolling updates etc. Docker 17.06 is all set for production-ready product today. Join me webinar organised by Docker Izmir, to get familiar with the current Swarm Mode capabilities & functionalities across the heterogeneous environments.
Linux is an operating system created by Linus Torvalds that enables applications and users to access computer devices. It is similar to Windows and OS X but is unique in being modular and flexible, allowing developers to use many languages. Linux has become very popular, powering major websites and representing a $25 billion ecosystem in 2008 as it is installed on computers and relied on by companies like Google, Twitter, and YouTube.
Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021Alphorm
Azure Active Directory est le point central d’une solution cloud sur Azure ou Microsoft 365.
Cette formation Azure Active directory est axée sur la mise en place d'un annuaire Azure Active directory et également les aspects hybrides avec les extensions des Active Directory locaux vers Azure Active directory avec AAD Connect ainsi que les nouveaux concepts de provisioning tel que le cloud Sync
Cette formation Azure Active directory montre tous les aspects techniques et d'architecture d'Azure Active directory et surtout d'AAD Connect, le moteur de synchronisation vers Azure AD.
Cette formation contient et aborde toutes les fonctionnalités de sécurité Azure Active Directory présente dans Azure AD P1 et P2.
Voici les notions de sécurité abordées dans cette formation :
• Azure MFA
• Conditional Access
• Intégration d’Azure AD et Cloud App Security
• SSPR ( Self Service Password Reset)
• Password Protection
• Azure AD Identity Protection
• PIM (Privileged Identity Management)
• Break Glass Account
• PasswordLess avec FIDO2
•
Dans cette formation Azure Active directory, vous allez apprendre à administrer votre Azure AD en interface graphique via le nouveau portail Admin Center Azure AD et en PowerShell avec le Module Azure AD. Vous allez également apprendre à sécuriser votre environnement Azure Active Directory ainsi que votre environnement Microsoft 365 de manière granulaire et optimal.
Engage.UG 2022 - Domino TOTP/2FA - Best Practices and PitfallsMilan Matejic
This document discusses best practices and pitfalls for implementing Time-based One-Time Password (TOTP) two-factor authentication (2FA) with HCL Domino. It covers topics such as motivation, terminology, how TOTP works, prerequisites, setup instructions, user and administrator workflows, troubleshooting, questions and answers, and references. The document provides detailed steps for configuring TOTP authentication for both Domino servers and Traveler mobile clients.
This document provides an introduction to containers and Docker. It defines key Docker terminology like images, containers, registries and explains Docker's benefits like isolation, portability and scalability. It compares containers to virtual machines and outlines Docker's components including Community Edition for development and Enterprise Edition for production.
This document provides a reference architecture for implementing a Virtual SAN Ready Node environment using Dell hardware and VMware software. It describes the physical and logical architecture, including networking, storage, and server node components. Specific hardware models are recommended, such as Dell R730 servers and Dell networking switches. The architecture supports VMware Horizon, including hybrid deployments with Horizon Air.
Red Hat is an open source software company that provides Linux operating systems, middleware, storage, and cloud computing solutions. Some key facts:
- Red Hat is the #1 provider of open source solutions, with over 90% of Fortune 500 companies using their products.
- They have over 7,000 employees worldwide and annual revenue of over $1 billion.
- Their solutions include Red Hat Enterprise Linux, JBoss middleware, OpenShift PaaS, and CloudForms management tools.
This document provides an overview of Active Directory Domain Services (AD DS) and instructions for installing domain controllers. It covers the following key points:
- AD DS has both logical components like domains, forests and organizational units, as well as physical components like domain controllers and global catalog servers.
- A domain controller authenticates users, authorizes access, and holds a copy of the domain database. At least two domain controllers are recommended for availability.
- Domain controllers use Kerberos authentication and the global catalog stores partial attributes for objects across forests to enable cross-forest queries.
- Installing a domain controller can be done from Server Manager, on Server Core, by upgrading an existing controller, or using install
This is an introduction session to containers and docks. Why do we need this technology, why is it different from virtualization and how you can use it for your next project.
Docker allows building, shipping, and running applications in portable containers. It packages an application with all its dependencies into a standardized unit for software development. Major cloud providers and companies support and use Docker in production. Containers are more lightweight and efficient than virtual machines, providing faster launch times and allowing thousands to run simultaneously on the same server. Docker simplifies distributing applications and ensures a consistent environment.
Red Hat Linux Certified Professional step by step guide Tech ArkitRavi Kumar
Introduction to course outline and certification
Managing files & directories
Basic Commands ls, cp, mkdir, cat, rm and rmdir
Getting help from using command line (whatis, whereis, man, help, info, –help and pinfo)
Editing Viewing of text files (nano, vi and vim)
User Administration Creating, Modifying and Deleting
Controlling services & daemons
Listing process
Prioritize process
Analyze & storing logs
Syslog Server & Client configuration
Compressing files & directories (tar and zip)
Copying files & directories to remote servers
Yum & RPM
Search files and directories
File & Directory links (Soft Links and Hard Links)
Managing of physical storage
Logical Volume Manager
Access Control List (ACL)
Scheduling of future Linux tasks
SELinux
NFS Server and Client configuration
Firewall
Securing the NFS using kerberos
LDAP client configuration
Setting UP ldap users home directory
Accessing the network storage using (CIFS) samba
Samba Multiuser Access
Using Virtualized systems
Creating virtual Machines
Automated installation of Redhat Linux
Automated Installation using Kickstart
Linux Booting Process
Root password Recovery
Fixing Partition Errors – Using Enter into Emergency Mode
Using Regular Expressions with grep
Understand and use essential tools for handling files, directories, command-line environments, and documentation
Operate running systems, including booting into different run levels, identifying processes, starting and stopping virtual machines, and controlling services
Configure local storage using partitions and logical volumes
Create and configure file systems and file system attributes, such as permissions, encryption, access control lists, and network file systems
Deploy, configure, and maintain systems, including software installation, update, and core services
Manage users and groups, including use of a centralized directory for authentication
Manage security, including basic firewall and SELinux configuration
Configuring static routes, packet filtering, and network address translation
Setting kernel runtime parameters
Configuring an Internet Small Computer System Interface (iSCSI) initiator
Producing and delivering reports on system utilization
Using shell scripting to automate system maintenance tasks
Configuring system logging, including remote logging
Configuring a system to provide networking services, including HTTP/HTTPS, File Transfer Protocol (FTP), network file system (NFS), server message block (SMB), Simple Mail Transfer Protocol (SMTP), secure shell (SSH) and Network Time Protocol (NTP)
This document compares Oracle Exadata and Teradata architectures. It summarizes that Exadata uses a two-tier architecture with shared memory and disk, while Teradata uses a shared-nothing architecture. It notes several advantages of Teradata including unconditional parallelism, linear scalability, and more automatic workload management compared to Exadata which requires more manual workload separation and resource tuning. The document also discusses higher support costs and a steeper learning curve for Exadata compared to Teradata.
Linux Containers(LXC) allow running multiple isolated Linux instances (containers) on the same host.
Containers share the same kernel with anything else that is running on it, but can be constrained to only use a defined amount of resources such as CPU, memory or I/O.
A container is a way to isolate a group of processes from the others on a running Linux system.
This document provides information about Red Hat training courses and certifications. It includes:
- An overview of Red Hat's industry-leading training courses, which are designed around real-world job roles to maximize skills transfer.
- Details on Red Hat's performance-based certification program, which assesses hands-on skills and is highly regarded in the IT industry.
- A listing and descriptions of Red Hat's certification tracks, including RHCSA, RHCE, RHCVA, and Certificates of Expertise specializations.
- Information on different training paths available to suit varied experience levels and backgrounds.
Upgrade your skill set related to the varied backgrounds of Linux Essentials to understand the distinguished fundamental concepts related to Red Hat Training and Certifications in the vicinity of Delhi NCR. Get the info regarding open-source software detailing knowledgeable Red Hat Courses through an explanatory curriculum possessing all basic fundamentals under the guidance of professional system administrators as well as system engineers. https://www.bytec0de.com/red-hat/
Taashee is a 100% Linux and Open source software (OSS) company. Taashee uniquely offers a one-stop solution for all Linux and OSS related projects. We have a dedicated team of certified Linux engineers and passionate developers to handle any kind of projects related to implementation or development on Linux.
Taashee helps its customers to fully utilize the power of Linux and Open Source technologies. This results in, higher stability, higher security and higher performance with lower cost and lesser administrative overheads compared to Microsoft based solution. Even for long-time Unix users, who are stuck with limited and proprietary solutions, we offer migration services to switch over to Enterprise-grade Red Hat.
We specialize in high-availability and high-performance clusters; remote and on-site system management and maintenance services; Linux consulting services; Druid and Asterisk based VoIP solutions; Telco-grade Mail servers with uptime of as much as 99.999%; Application design and development using Open Source Technologies. Besides this, we provide comprehensive Jboss related services like: Development, Deployment, Clustering, Production-level optimization, Security etc & also Virtualization.
This document discusses migrating virtual machines from VMware to Red Hat Enterprise Virtualization. It finds that over 70% of customers are considering using multiple virtualization platforms. Red Hat Enterprise Virtualization offers several benefits compared to VMware, including open source flexibility, industry-leading performance, robust enterprise features, and lower costs. The document outlines the migration process, which involves assessment, preparation, evaluation, execution and testing phases. Tools are available to automate the conversion of VMware VMs to the Red Hat Enterprise Virtualization format.
Taashee is a 100% Linux and Open source software (OSS) company. Taashee uniquely offers a one-stop solution for all Linux and OSS related projects. We have a dedicated team of certified Linux engineers and passionate developers to handle any kind of projects related to implementation or development on Linux.
Taashee helps its customers to fully utilize the power of Linux and Open Source technologies. This results in, higher stability, higher security and higher performance with lower cost and lesser administrative overheads compared to Microsoft based solution. Even for long-time Unix users, who are stuck with limited and proprietary solutions, we offer migration services to switch over to Enterprise-grade Red Hat.
We specialize in high-availability and high-performance clusters; remote and on-site system management and maintenance services; Linux consulting services; Druid and Asterisk based VoIP solutions; Telco-grade Mail servers with uptime of as much as 99.999%; Application design and development using Open Source Technologies. Besides this, we provide comprehensive Jboss related services like: Development, Deployment, Clustering, Production-level optimization, Security etc & also Virtualization.
The intersection of Traditional IT and New-Generation ITKangaroot
Keynote from Franz Meyer - VP, EMEA Strategic Business Development Red Hat about "The intersection of Traditional IT and New-Generation IT : the Red Hat Open Hybrid Journey". This presentation was given during the Open Source Cloud Day of Kangaroot & Red Hat.
Overview of the core elements of the alliance. Presented to enterprise customers at the Microsoft NorCal MTC on November 11th, 2016
Kevin McCauley
Red Hat
To keep up with the ever-growing demand of business, developers need to accelerate the process of concept-to-production, without compromising the integrity of their product. Overcoming this challenge requires a platform that empowers developers to consistently build, deploy and manage containerized services and applications, and do so with confidence. In this webinar, Nicholas Gerasimatos and David Duncan will discuss the different services that Red Hat OpenShift on AWS has to offer and why they have gained the trust of over 90% of Fortune 500 companies. Red Hat OpenShift on AWS provides a secure, flexible and easy-to-manage application infrastructure to expedite time-to-market and streamline operations.
Join us to learn:
• Overview of how Red Hat OpenShift functions on the AWS Cloud
• Understand the features and benefits of running Red Hat OpenShift on AWS
• How to get started using Red Hat OpenShift
Who Should Attend: Developers,Technology and Business Decision Makers.
LINFORGE provides concise summaries in 3 sentences or less that provide the high level and essential information from the document. The document is a presentation about LINFORGE that provides an overview of the company, its services, certifications, partnerships, and customer case studies. It discusses LINFORGE's history and growth since 2001, its open source expertise and certifications, and examples of how it has helped customers through solutions involving virtualization, storage, monitoring, and other areas.
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the July Edition:
• Dell Technologies Accelerates HCI Portfolio Growth; Simplifies Path To Vmware-Based Clouds.
• Huawei Releases 3GPP R14-Based Commercial NB-IoT Solution.
• Leading The Software-defined Future - Sayantan Dev, Vice President, VCG, Redington Value.
• Avaya Brings Enterprise-Level Communication Capabilities To SMBs.
• Symantec Introduces Cloud-Based Network Security Solution With Web Isolation.
• Veritas Announces New Data Protection And Governance Offerings For Microsoft 365 Solution.
• Red Hat Unveils Next-Generation Process Automation Offering.
• Vmware Delivers Network Functions Virtualization Platform For 5G And Multi-Cloud Telco Networks
• Fujitsu Enhances Cloud Services Portfolio.
• Trend Micro Launches Managed Detection And Response Service.
• Cyberark Presents New Privileged Access Security As A Service Offering.
• Nutanix Introduces New Velocity Partner Program.
Bhadale group of companies Red Hat partner services catalogueVijayananda Mohire
This is our offering based on our partnership with Red Hat. We offer various services like design of Open shift, and opensource based solutions along with IBM partner offers for hybrid cloud
VMworld 2013: Virtualization and Converged Infrastructure Solutions VMworld
VMworld 2013
Brent Allen, HP
Trey Layton, VCE
Lucas Nguyen, VMware
John Power, IBM
Andy Rhodes, Dell
Jeff Schneider, Lenovo
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Open Hybrid Cloud.
A presentation given by Erik Geensen, responsible for Cloud, Platform and Virtualization at Red Hat Benelux, at the OPEN'14 conference in Belgium.
Εταιρική Παρουσίαση: Ανδρέας Τσαγκάρης, Chief Technology Officer, Performance Technologies
Τίτλος: «OpenShift and IBM Cloud Paks on Power for Digital transformation»
Bilcare Cost Effectively Scales For Business GrowthBilcare Research
Bilcare Research Cost-Effectively Scales for Business Growth with Red Hat Enterprise Linux with Integrated Virtualization. For More log on to White Papers http://www.bilcare.com/
En rh - cito - research-why-you-should-put-red-hat-under-your-sap-systems whi...CMR WORLD TECH
Red Hat Enterprise Linux has become the default choice for running SAP applications due to several key factors:
1) Linux and open source software have conquered the enterprise by providing cost savings, high performance, and reliability compared to proprietary Unix systems that SAP was traditionally run on.
2) SAP applications are designed for a distributed architecture which Linux and commodity servers provide through horizontal scaling, allowing for faster performance and lower costs.
3) SAP and Red Hat have a close partnership where Red Hat provides long-term stability and support that meets the needs of mission critical enterprise applications like SAP.
Sprint replaced its costly proprietary middleware with JBoss Enterprise Middleware from Red Hat in order to significantly reduce costs while gaining more flexibility and agility. This allowed Sprint to save $4 million annually and refocus funds on business initiatives rather than just maintaining infrastructure. Sprint also used the migration as an opportunity to modernize its platform and infrastructure through virtualization and open source software. The project improved developer productivity and reduced time-to-market while establishing a more flexible and cost-effective foundation.
Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network.[1] At the foundation of cloud computing is the broader concept of converged infrastructure and shared services.
Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. For example, a cloud computer facility that serves European users during European business hours with a specific application (e.g., email) may reallocate the same resources to serve North American users during North America's business hours with a different application (e.g., a web server). This approach should maximize the use of computing power thus reducing environmental damage as well since less power, air conditioning, rackspace, etc. are required for a variety of functions. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. Stay involved
with Red Hat
Training &
Certification
Red Hat Training News is a monthly e-newsletter that
connects you to the information and offerings you can
use to get the most from your Red Hat technology.
Subscribe today to receive:
Latest news from Red Hat
Spotlight training courses
Tips and Tricks
Special savings offers
Sign up at redhat.com/training
JOIN OUR FACEBOOK COMMUNITY
www.facebook.com/RedHatCertified
FOLLOW US ON TWITTER
@RedHat_Training
3. Red Hat Training and
Certification
Course Catalog: April 2012–September 2012
About 4 Red Hat Enterprise Virtualization 3
6 Introduction to Red Hat Training
Red Hat Training
8 Training Paths
10 Ways to Train
12 Solution Spotlight: Rackspace Hosting
13 Red Hat Certifications
16 Training Units – Lock in Savings
24 Red Hat Skills Assessment Tool
24 Guaranteed to Run Courses
47 Power Training
Linux Courses 18 Red Hat System Administration I
20 Red Hat System Administration II
22 RHCSA Rapid Track Course
25 Red Hat Linux Troubleshooting
26 Red Hat System Administration III
28 Red Hat Enterprise Linux for Solaris Administrators
30 RHCE Rapid Track Course
UPDATED! 32 Red Hat Enterprise Virtualization
35 Red Hat Cloud Architecture
36 Red Hat Enterprise Security: Network Services
37 Red Hat Enterprise SELinux Policy Administration
39 Red Hat Enterprise Deployment
and Systems Management
40 Red Hat Enterprise Directory Services
and Authentication
41 Red Hat Enterprise Clustering and Storage Management
42 Red Hat Enterprise Performance Tuning
43 Red Hat Developer Courses
4. Break free.
Get virtualization that puts you in control.
Red Hat® Enterprise Virtualization 3 has the features
you need and the flexibility that will carry you into the
future. All at a price you can afford.
Red Hat Enterprise Virtualization 3 is:
Enterprise ready Easy to extend
Red Hat Enterprise Virtualization 3 has more Red Hat Enterprise Virtualization has the same
than 100 new features to improve virtual hardware compatibility as Red Hat Enterprise
machine performance, increase manageability, Linux. Extended reporting, virtual machine
and enhance usability. It also includes scal- consolidation, and chargeback capabilities
ability, performance, and hardware support are a few of the software options available
enhancements inherited from Red Hat from vendors at marketplace.redhat.com.
Enterprise Linux 6. Red Hat Enterprise Our online marketplace helps you learn more
Virtualization Manager is hosted on Red Hat about certified products that integrate with
Enterprise Linux 6, and powered by JBoss® Red Hat Enterprise Virtualization.
Enterprise Application Platform. A simple,
powerful graphical user interface lets you easily Refreshingly open
manage hundreds of hosts with thousands of Red Hat Enterprise Virtualization is built
VMs—ensuring you have everything you need on two open source projects: kernel-based
to virtualize your most challenging workloads. virtual machine (KVM) and oVirt.
KVM is a robust open source project
Fast and scalable providing virtualization at the kernel level.
Red Hat Enterprise Virtualization dominates KVM is supported by leading software vendors,
the independent, industry-standard bench- including Red Hat, IBM, AMD, Intel, HP, and
marks for virtualization (SPECvirt_sc2010®). SuSE. Red Hat Enterprise Virtualization
As of January 1, 2012, Red Hat Enterprise hypervisor is built with KVM.
Virtualization claimed top virtualization
oVirt is an ecosystem of projects offering
performance scores for two- and four-socket
feature-rich datacenter virtualization
servers, and had the only eight-socket server
management. Red Hat has open sourced
scores published. This includes the highest
the entire Red Hat Enterprise Virtualization
overall performance score and the highest
management stack, and donated it to the
scale-up of 552 high-performing virtual
oVirt project. Through oVirt, the open source
machines on a single server.*
4 Register: 1–866–626–2994
or redhat.com/training
5. “ e’ve seen improvements in how we can provide
W
on-demand resources to our artists by leveraging
open source and working with Red Hat.”
Lans Carstensen, principal engineer, DreamWorks Animation
community—including commercial partners is sold on a per-socket basis for the hypervisor
such as IBM, Intel, Cisco, NetApp, SuSE, and and includes the hypervisor, manager, and
Canonical—continues to develop cutting-edge other features—including the power user
open source virtualization management. portal and reports portal.
Red Hat also helped create the Open Red Hat Enterprise Virtualization for
Virtualization Alliance (OVA), a group that Desktops is an addition to Red Hat Enterprise
focuses on fostering interoperable virtual- Virtualization for Servers and is sold in
ization solutions. The OVA’s mission is to packs of 25 concurrent desktop connections.
drive open standards and the adoption of It is available with business-hours and
open virtualization based on KVM. 24x7 support options.
No matter how many servers and desktops
Remarkably affordable you need, Red Hat offers a lower total cost of
Like all Red Hat solutions, Red Hat Enterprise ownership and faster return on investment
Virtualization is purchased by subscription. compared to proprietary solutions.
One yearly price includes access to software,
updates, upgrades, and technical support. Find out more:
Red Hat Enterprise Virtualization for Servers www.redhat.com/promo/rhev3/
* SPEC®, SPECvirt™, and SPECvirt_sc® are trademarks or registered trademarks of
the Standard Performance Evaluation Corp. (SPEC). Competitive numbers reflect
results published on www.spec.org as of January 1, 2012. For the latest SPECvirt_ Register: 1–866–626–2994
sc2010 results visit www.spec.org/osg/virt_sc2010. or redhat.com/training 5
6. Red Hat
Training and Certification
Maximize the deployment and performance
of open source technologies.
The Value of When organizations include Red Hat Training as part of
a deployment and maintenance strategy, they can maximize
Red Hat Training the value and performance of their open source technologies.
Red Hat Training arms IT organizations with the knowledge
and proven, hands-on skills to optimize the performance of
Red Hat and JBoss technologies, enhance productivity, and
mitigate risk.
Red Hat-trained customers are better prepared to:
• Successfully deploy and manage new Red Hat and
JBoss enterprise applications and solutions
• Solve both routine and challenging problems in less time
• Better manage internal resources with cross-trained staff
• Spread best practices within their IT organizations to
improve efficiencies
• Keep IT organizations competitive and reduce turnover
Industry-Leading, With more than 20 Red Hat Enterprise Linux courses, Red Hat
delivers one of the most comprehensive curricula offered in
Role-Based today’s marketplace. Unlike most vendors, Red Hat orients
Training Courses training and certification around real-world job roles and tasks.
Certified instructors actively engage students in task-focused
activities, lab-based knowledge checks, and facilitative discus-
sions. This ensures maximum skills transfer and retention,
which in turn enables increased productivity and a higher
return-on-investment (ROI).
Register: 1–866–626–2994
6 or redhat.com/training
7. Performance-based certifications from Red Hat are among Proving
the most highly regarded in the IT industry. The program’s
success stems from a solid track record of benchmarking and
Competencies
hands-on skills assessment. Since candidates are required to with Red Hat
perform the tasks required in actual IT environments, Red Hat Certifications
customers can be assured that certification professionals on
their teams have demonstrated the skills required to perform
tasks in actual IT environments. Red Hat offers a full hierarchy
of credentials to provide a comprehensive and flexible program
for an entire IT staff.
Red Hat continues to lead the pack in open source curriculum Award-Winning
and certification. IDC consistently ranks Red Hat in the leader
Training and
category in training and certification in its competitive analysis,
IDC MarketScape: Worldwide IT Education and Training Vendor Certification
Analysis. This third-party study assesses OEMs that offer train-
ing, ranking them on strategy and vision.
“ he practical, hands-on nature of Red Hat Training
T
courses provided real value to the transition of our
team’s skills to Linux. All of our system administrators
are Red Hat Certified Engineers (RHCE).”
– Vinod Kutty, associate director,
Distributed Computing, CME Group
Register: 1–866–626–2994
or redhat.com/training 7
8. Red Hat Training Paths
Multiple training paths allow for a wider
variance of student skill sets.
Training Paths In today’s IT infrastructure, professionals are now required
to administer multiple platforms to optimize performance
for Expanded and keep today’s complex datacenters running smoothly.
IT Audiences So whether your team needs an accelerated transition from
Solaris or to cross-train experienced Windows administrators
with the corresponding Linux skills, Red Hat offers multiple
training paths for wider variance of student skill-sets.
WINDOWS ADMIN LINUX/UNIX ADMIN
Red Hat
System Administration I
(RH124)
Red Hat RHCSA
System Administration II Rapid Track Course
with RHCSA Exam with Exam
(RH135) (RH200)
Red Hat Certified Systems Administrator (RHCSA™)
Red Hat
System Administration III
with RHCE Exams
(RH255)
Red Hat Certified Engineer (RHCE®)
Register: 1–866–626–2994
8 or redhat.com/training
9. Red Hat uses a best-of-breed, contemporary teaching Maximum
approach to ensure maximum skills transfer and retention.
Our courses actively engage students in task-focused activi-
Skills Transfer
ties, lab-based knowledge checks, and facilitative discussions. and Retention
In addition, course materials provide job aids, exercise rein-
forcement, and task-based reference material.
SR. LINUX ADMIN SOLARIS ADMIN
Not sure where to start?
Take an online skills
assessment at redhat.com/
training/skills_assessment
Red Hat Enterprise Linux
for Solaris Administrators
(RH290)
RHCE Rapid Track Course RHCE Rapid Track Course
with RHCSA with RHCSA
and RHCE Exams and RHCE Exams
(RH300) (RH300)
Red Hat Certified Engineer (RHCE®)
Register: 1–866–626–2994
or redhat.com/training 9
10. Ways To Train
Whether you need to train a team of IT professionals or
just yourself, we offer a variety of delivery methods and
savings programs to maximize return on investment.
Classroom Training Red Hat offers a robust six-month schedule of classroom
training in more than 40 locations across North America.
That convenience, combined with our high-quality classroom
experience and instructor expertise, helps ensure companies
and individuals will achieve their training goals. When students
attend Red Hat classroom training, they can expect:
• A convenient, comfortable, ready-to-learn environment
• Instruction and access to savvy, experienced
Red Hat-certified instructors
• High-end computer hardware and equipment
• Ability to actively engage with peers in facilitative discussions
The flexibility of our virtual training courses allows IT profes-
Virtual Training
sionals to experience the same industry-recognized classroom
training while maintaining a partial work schedule and achiev-
ing cost savings objectives. This is live, instructor-led training,
taken from your office or home. Team virtual training is avail-
able for companies with staff working across the US
and Canada.
When students take Red Hat virtual training, they can expect:
• Real-time instruction featuring full classroom content
• Courses taught in convenient six-hour increments over
a one-week period
• Virtual lab machines that run actual products—no simulators
or canned presentations
• Enrollment fees that are lower than traditional classroom
fees, and the elimination of travel costs
Register: 1–866–626–2994
10 or redhat.com/training
11. Training teams together is a proven way for IT staff to maxi- Onsite
mize the performance, savings, and management of Red Hat
Enterprise Linux. Available for the entire Red Hat curriculum,
Team Training
onsite training also provides the option of customizing the
course content to meet your specific training requirements.
Whether at your offices, our training venues, or hosted in
a virtual environment, onsite solutions offer flexibility and
cost-effective training options. When teams take onsite
training, they can expect:
• Training in the context of your actual IT environment
• Course discussion, examples, and QAs relevant
to your organization
• Team members will acquire the same arsenal of skills,
providing for enhanced workflow, communications,
and troubleshooting
• The most cost-effective option for training multiple
individuals at once
• Combining staff training provides cost savings on class fees
and staff travel
Planning your team’s training in advance just got a lot Guaranteed
easier and more cost-effective. With our ‘Guaranteed to
Run’ classes, you can rely on the fact that it won’t be
To Run Classes
canceled or rescheduled based on number of attendees.
Now it is even easier to find a Guaranteed to Run class.
Each week Red Hat will post a full three-month schedule
by course in a downloadable PDF.
Visit redhat.com/training/guaranteed_to_run to download
a schedule.
Register: 1–866–626–2994
or redhat.com/training 11
12. Solution Spotlight:
Red Hat certifications help Rackspace deliver
Fanatical Support®
Rackspace has a stellar reputation in the IT-hosting industry,
Company Profile: using leading technologies to deliver world-class IT services
Rackspace Hosting backed by Fanatical Support. Fanatical Support ensures that
the Rackspace customer experience is personal, professional,
and timely.
Challenge: Rackspace offers customers Red Hat Enterprise Linux, a
reliable and flexible open source platform. It is a popular
High level of support for
offering—Rackspace manages Red Hat Enterprise Linux-based
100,000 businesses with
environments for more than 100,000 businesses. Making
Red Hat Enterprise Linux
Enterprise Linux available wasn’t enough to meet Fanatical
Support standards.
Rackspace employees needed real Red Hat certification.
Solution:
Red Hat certification validates the deep knowledge and
Red Hat certification hands-on skills of IT professionals working with Red Hat solutions.
for Rackspace Many Rackspace employees earned Red Hat Certified System
Administrator (RHCSA) certification. But they didn’t stop there.
More than 200 Rackspace employees now hold Red Hat
Certified Engineer (RHCE) certifications as well. And more
than 30 passed five upper-level exams to become Red Hat
Certified Architects (RHCA).
Red Hat-certified employees streamline the hiring process.
Result: Rackspace can count on a certified applicant’s expertise.
Trusted, certified And customers feel more confident when they know Red Hat-
employees certified employees support them. Red Hat certification
allows Rackspace to continue delivering Fanatical Support.
To learn more about Red Hat certification, see pages 13-15, or
visit www.redhat.com/training/certifications.
Register: 1–866–626–2994
12 or redhat.com/training
13. Red Hat Certifications
Earned by passing rigorous, performance-based exams,
Red Hat-certified professionals ensure that customers get
the most from their Red Hat solutions.
A Red Hat Certified System Administrator RHCSA
(RHCSA™) certification is earned when an IT Red Hat Certified
professional demonstrates the core system System Administrator
administration skills required in Red Hat
Enterprise Linux environments.
A Red Hat Certified Engineer (RHCE®) is earned by RHCE
a Red Hat Certified System Administrator (RHCSA) Red Hat
who has demonstrated the knowledge, skill, and Certified Engineer
ability required of a senior system administrator
responsible for Red Hat Enterprise Linux systems.
A Red Hat Certified Virtualization Administrator RHCVA
(RHCVA™) certification is earned when an IT pro- Red Hat Certified
fessional demonstrates the skills and knowledge Virtualization Administrator
required to deploy and manage virtual hosts in
production environments using Red Hat
Enterprise Virtualization.
Register: 1–866–626–2994
or redhat.com/training 13
14. Red Hat Certifications, continued
Red Hat Certificates of Expertise™ are earned by passing
upper-level, performance-based exams in special-
Certificates ized areas of system administration. To be eligible to
of Expertise take an expertise exam, candidates must hold
a current RHCE credential.
RHCSS An RHCSS® certification may be earned by an
RHCE who has demonstrated deeper capabilities
Red Hat Certified
in networking services security, directory services,
Security Specialist
authentication, and SELinux policy management.
RHCDS An RHCDS® certification may be earned by an RHCE
who has demonstrated the skills required to utilize
Red Hat Certified
a broader set of tools from the Red Hat portfolio to
Datacenter Specialist
implement reliable, scalable solutions. An RHCDS
possesses skills in areas particularly important to
mission-critical datacenter environments.
RHCA An RHCE who earns the Red Hat Certified
Architect (RHCA®) certification bring an exceptional
Red Hat Certified Architect
breadth and depth of knowledge to the biggest IT
challenges. RHCA certification incorporates the
skills and knowledge of RHCDS plus advanced
networking services security, system monitoring,
and performance tuning.
Register: 1–866–626–2994
14 or redhat.com/training
15. START
EX200 RHCSA®
EX300 RHCE®
CERTIFICATES OF EXPERTISE™
RHCVA® RHCSS®
EX318 EX423 EX436 EX401 EX442 EX333 EX429
EITHER
RHCDS®
RHCA®
Certifications Expertise exams
RHCSA ed Hat Certified
R EX318 Enterprise Virtualization
System Administrator EX333 Enterprise Security: Network Services
RHCE Red Hat Certified Engineer EX401 Deployment and System Management
RHCVA Red Hat Certified EX423 Directory Services and Authentication
Virtualization Administrator
EX429 SELinux Policy Administration
RHCSS Red Hat Certified Security Specialist
EX436 Clustering and Storage Management
RHCDS Red Hat Certified
EX442 Enterprise Performance Tuning
Datacenter Specialist
RHCA Red Hat Certified Architect
Register: 1–866–626–2994
or redhat.com/training 15
16. Lock in Savings
Red Hat Training Units are a simplified way to save.
Training Units Red Hat Training Units (TUs) offer your organization a simple
way to purchase training for your team while locking in savings
up front. Training units are pre-paid credits that can be redeemed
for any Red Hat Enterprise Linux training offerings. These
pre-paid credits give you the flexibility to purchase training
in advance and allow you to use your investment throughout
the year.
Flexibility and manageability
• Easy to purchase with subscriptions and individually
• Simple to administer, decreasing the need for
expense reimbursement
• Eliminates the need to purchase training ad hoc
Versatility
• Can be used for up to 12 months after purchase
• Can be redeemed for any Red Hat training course,
exam, or training method
Savings
• Lock in volume discounts up front
• Use unallocated budget effectively
Number of units Discount PriCe Per Unit
0–39 None $300
40–79 5% $285
80–169 10% $270
170–339 15% $255
340+ 20% $240
Register: 1–866–626–2994
16 or redhat.com/training
17. ALL GAIN (NO PAIN)
Better TCO and better performance
at a lower cost? Check.
Every day, organizations are
reducing costs, scaling their IT
environments, and improving the
performance of their applications
by migrating to Red Hat®
Enterprise Linux®.
Let Red Hat show you how.
MIGRATE TO RED HAT ENTERPRISE LINUX:
redhat.com/migrate
18. RH124
Red Hat System Administration I
This course focuses on core system administration tasks that IT professionals
most often encounter in today’s datacenter. Students will build on existing
technical knowledge and focus on GUI-based tools while still covering key
command line concepts.
COURSE CONTENT
• Graphical installation • Managing and securing files
of Linux • Administration of users
“ his was a
T • Managing physical storage and groups
challenging and • Introduction to command- • Deploying file-sharing
line Linux administration services
enlightening
• Installation and configura- • GUI-based tools and key
experience tion of local components command-line concepts
and services
that made me • Basic security skills
• Establishing network and
think, made securing network services
me stronger
Audience
technically and
• IT professionals and system administrators, including
provided the Windows and network administrators who need to gain
a core level of proficiency with Linux administration
motivation that
• Non-Linux IT professionals on the path to becoming
helped jump start full-time Linux system administrators
my career again.”
Prerequisites
– Billy Cox,
Previous operating system administration experience
Business Systems Analyst
is beneficial
on the path to
LOCATION TRAINING TIME COST‡ TUs
Classroom 5 days $2,700 9
Remote Classroom 5 days $2,700 9
Virtual Training 5 days, 27.5 hours $2,700 9
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
18 or redhat.com/training
19. RH124
United states
AZ Phoenix 4/2 6/25 8/13 9/24
CA Anaheim 6/11
Culver City 6/18 9/24
San Bernardino 9/24
San Diego 7/16
San Francisco 6/11
San Jose 4/9 7/9
CO Greenwood Village 5/14 7/9 8/27
DC Washington 4/2 5/7 6/4 7/16 8/13 9/10
FL Fort Lauderdale 4/16 6/25
Orlando 4/2 7/23 9/24
Tampa 6/4 8/13
GA Atlanta 4/23 6/4 7/16 9/10
IL Chicago 4/9 6/11 7/23 9/10
IN Indianapolis 4/16 6/18 8/20
KS Kansas City 5/21 7/30
MA Boston 5/7 7/19 8/20
MD Columbia 4/2 5/7 6/11 7/9 8/6 9/10
MI Detroit 4/16 6/4 7/30 9/24
MN Shoreview 4/30 6/25 8/20
MO St Louis 5/14 9/10
NC Charlotte 5/21 7/23 9/10
Raleigh 5/7 6/25 8/6 9/17
NE Omaha 7/9
NJ Edison 4/23 7/9
NV Las Vegas 6/18 8/13
NY New York 4/9 5/7 6/11 7/23 8/27
OH Columbus 5/14 7/23
PA Philadelphia 6/18 9/24
SC Charleston 5/14 8/27
TX Austin 5/21 8/6
Dallas 4/9, 4/23 6/18 7/30 9/17
Houston 4/30 7/9 8/27
VA Richmond 4/30 7/30
Virginia Beach 4/16
WA Seattle 4/30 6/18 8/13
CANADA
AB Edmonton 7/2 9/17
BC Vancouver 7/2 8/13
ON Ottawa 7/23
Toronto 7/2 8/27
QC Montreal 4/16 7/16
Virtual training
Virtual classroom 4/2, 4/23 5/14 6/4, 6/25 7/16 8/6, 8/27 9/17
Register: 1–866–626–2994
or redhat.com/training 19
20. RH135
Red Hat System Administration II
with Exam
This is the follow-on course to Red Hat System Administration I (RH124). Students
will progress from having fundamental Red Hat system administration skills to
being proficient full-time administrators. Completing System Administration I and
II will prepare students to take the Red Hat Certified System Administration exam.
COURSE CONTENT
• Network configuration and • Essential command-line
troubleshooting operations
• Managing file systems and • Troubleshooting file sys-
logical volumes tems and partitioning
• Controlling user and • LVM, access control, and
“ he training is
T file access package management
• Installing and managing
robust, relevant services and processes
and conducted
Audience
in a professional
IT professionals who have attended Red Hat System
manner.” Administration I and want the skills to be full-time enterprise
– Warren Brown, Linux administrators or earn RHCSA certifications
Senior Designer, Florida
Museum of Natural History, Prerequisites
University of Florida
Red Hat System Administration I
note
This course does not cover all the tasks tested in the
RHCSA exam
on the path to LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exam 5 days $2,900 10
Classroom* 4 days $2,700 9
Remote Classroom* 4 days $2,700 9
Virtual Training* 5 days, 27.5 hours $2,700 9
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
20 or redhat.com/training * ourse does not include exam. Exam sold separately.
C
21. RH135
United states
AZ Phoenix 4/23 7/9 8/20
CA Anaheim 7/9
Burbank 7/9
Culver City 7/23
Sacramento 4/9 7/9
San Bernardino 7/23
San Diego 8/20
San Francisco 4/9
San Jose 4/23 7/23
CO Greenwood Village 6/4 7/30 9/17
DC Washington 4/16 6/4 7/23 8/20 9/17
FL Fort Lauderdale 4/30 7/9
Jacksonville 5/21
Orlando 4/30 8/13
Tampa 6/25 9/17
GA Atlanta 5/7 6/18 8/6
IL Chicago 4/30 6/25 8/6 9/17
IN Indianapolis 4/30 6/18 9/10
KS Kansas City 4/9 6/11 8/6
MA Boston 4/2 6/4 7/23 8/27
MD Columbia 4/9 5/21 6/18 7/16 8/13 9/17
MI Detroit 5/14 6/18 8/13
MN Shoreview 5/14 7/16 9/24
MO St Louis 6/11
NC Charlotte 4/9 6/11 8/6 9/17
Raleigh 4/2 6/4 8/20
NE Omaha 4/23 7/30
NJ Edison 5/21 7/30
NV Las Vegas 5/7 6/25 8/27
NY New York 4/16 5/21 6/18 8/6 9/10
OH Columbus 4/2 6/11 8/13
PA Philadelphia 5/21 7/30
SC Charleston 6/25 9/17
TX Austin 4/2 6/11 8/13
Dallas 4/30 6/4 8/6 9/24
Houston 4/2 5/14 7/16 9/10
VA Richmond 5/14 8/13
Virginia Beach 5/7
WA Seattle 5/7 6/25 8/27
CANADA
AB Edmonton 4/23 7/16, 7/23
BC Vancouver 4/23
ON Toronto 4/16
QC Montreal 5/7
Virtual training
Virtual classroom 4/16 5/17, 5/21 6/18 7/23 8/20 9/24
Register: 1–866–626–2994
or redhat.com/training 21
22. RH200
RHCSA Rapid Track Course with Exam
The RHCSA Rapid Track accelerated course helps experienced Linux and UNIX
system administrators prepare for and take the Red Hat Certified System
Administration (RHCSA) exam. To successfully navigate this course, students
must already have solid experience with the Linux command line.
COURSE CONTENT
• Installation, configuration, • Securing files with ACLs
and management of • Securing network services
local storage with firewall and SELinux
“ plan to migrate
I • Deployment and mainte- • Managing virtual machines
my servers nance of network services with KVM technology
• Network services: VNC, • Automating installation of
to Red Hat SSH, FTP, and web Linux using kickstart
Enterprise Linux
which will be Audience
• Practiced Linux or UNIX system administrators who
much easier using currently manage servers at the enterprise level
the knowledge • Skilled Linux system administrators who wish to earn an
RHCSA certification
I gained.”
– Douglas Pervine, Prerequisites
Computer Systems Analyst, • Solid, working-level command-line Linux
SEA CORP administration knowledge
• The following skills:
• Configuring print queues to local and remote printers
• Managing system software with yum
Confirm your skill-set by • Administering local user and group accounts
passing the online skills • Managing local physical storage
assessment at redhat.com/ For a comprehensive list of skills required,
training/skills_assessment visit redhat.com/courses/rh200
on the path to LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exam 5 days $3,400 12
Classroom* 4 days $3,200 11
Remote Classroom* 4 days $3,200 11
Virtual Training* 5 days, 27.5 hours $3,200 11
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
22 or redhat.com/training * ourse does not include exam. Exam sold separately.
C
23. RH200
United states
AZ Phoenix 5/14 9/10
CA Anaheim 4/9 8/13
Burbank 4/9 8/13
Culver City 4/30
Sacramento 5/21 9/17
San Bernardino 4/30
San Diego 5/7
San Francisco 5/21
San Jose 5/14 9/17
CO Greenwood Village 4/23 8/20
DC Washington 4/16 6/11 7/30
FL Fort Lauderdale 8/6
Orlando 7/16
GA Atlanta 7/23
IL Chicago 4/2 8/6
IN Indianapolis 8/6
KS Kansas City 4/23 9/24
MA Boston 5/14 6/11 9/17
MD Columbia 6/4 7/23 9/24
MI Detroit 8/27
MN Shoreview 4/16 7/9
MO St Louis 4/9 7/30
NC Charlotte 4/2 8/20
Raleigh 7/16
NE Omaha 5/21 9/10
NJ Edison 5/7 8/20
NV Las Vegas 5/29
NY New York 4/16 6/18 7/30
OH Columbus 8/27
PA Philadelphia 5/7 8/20
TX Austin 5/7 7/9 9/4
Dallas 6/11 9/10
Houston 6/18 7/30 9/24
VA Richmond 4/9 6/25
WA Seattle 9/24
CANADA
BC Vancouver 7/16 8/27
ON Ottawa 4/16 8/27
Toronto 5/28 8/13
QC Montreal 6/4 8/27
Virtual training
Virtual classroom 4/30 7/9 8/13
Register: 1–866–626–2994
or redhat.com/training 23
24. RED HAT
SKILLS ASSESSMENT
Not sure which course to take? Check out our new online skills assessment tool.
It will help you eliminate the guesswork of choosing training and map out your
personalized training path based on your existing skills and desired end goal.
THE TOOL:
• Helps you identify the right training course for your skill set
• Maps out a customized training path
• Sends test results to your email
Take a skills assessment today at: redhat.com/training/skills_assessment
Planning team training
in advance just got
a lot easier and more
cost-effective.
Many of our scheduled classroom
classes are ‘Guaranteed to Run.’
When you register for one of these
classes, you can be absolutely sure it
will not be canceled or rescheduled
based on the number of attendees.
New Guaranteed to Run classes are
added to the schedule each week.
Learn more at
redhat.com/training/guaranteed_to_run/
25. RH242
Red Hat Linux Troubleshooting
This course teaches system administrators to debug and resolve hardware,
application, or networking challenges using Red Hat Enterprise Linux systems
and tools.
Course content United States
• Introduction to trouble- • Testing and diagnosing AZ Phoenix 8/6
shooting techniques network configurations DC Washington 4/9, 7/23
• Testing and analyzing • Working with security tools FL Orlando 6/11
hardware like SELinux, authentication, Tampa 7/30
and firewall GA Atlanta 6/4, 9/4
• Diagnosing performance
IL Chicago 7/16, 9/4
issues, application and OS • Making the most of Red Hat
MA Boston 5/14
interactions support resources
MD Columbia 9/4
• Troubleshooting disks
NE Omaha 9/24
and file systems
TX Dallas 4/2, 7/9
Houston 4/23
Audience
Virtual training
Experienced Linux system administrators who are responsible 4/2, 5/28,
for troubleshooting their enterprise Linux environment Virtual Classroom
7/9, 8/27
Prerequisites
• Skills learned in Red Hat System Administration I and II
or RHCSA Rapid Track course
• System administration knowledge under Red Hat
Enterprise Linux, including:
• Installation
• Service management (using service and chkconfig)
• Basic system monitoring (using ps and top)
• File system management (using fdisk and mkfs)
• Basic troubleshooting (including managing log files)
For a comprehensive list of skills required,
visit redhat.com/courses/rh242
LOCATION TRAINING TIME COST‡ TUs
Classroom 4 days $2,700 9
Virtual Training 5 days, 27.5 hours $2,700 9
Onsite Call 1–866–626–2994
‡ rices subject to change.
P Register: 1–866–626–2994
or redhat.com/training 25
26. RH255
Red Hat System Administration III
with RHCSA and RHCE Exams
The Red Hat System Administration III course teaches experienced Linux
administrators critical, required networking and security administration skills. This
course also includes both the Red Hat Certified System Administrator (RHCSA)
and Red Hat Certified Engineer (RHCE) exams.
course content
• Enhancing user security • System and network
• Configuration and automated activity monitoring
“ aterial
M deployment and manage- • Network management and
ment of secure network packet filtering
covered exam
services (DNS, Apache, • Software management
requirements well SMTP, file-sharing) • Web service management
and it allowed • Disk management with iSCSI • File-sharing across platforms
• Basic SMTP management
me to review and
prepare for the Audience
RHCE exam.” • Senior Linux system administrators who require
networking and security administration skills
– Jeffrey Stormshak, • Linux IT professionals who currently have RHCT or
Unix System Administrator, RHCSA certification and are interested in earning an
CCC Information, Inc. RHCE certification
Prerequisites
• RHCSA Rapid Track Course (RH200) or Red Hat
System Administration I and II
• Equivalent experience to the RHCSA Rapid Track Course
Confirm your skill-set by
passing the online skills
assessment at redhat.com/
training/skills_assessment
on the path to LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exams 5 days $3,100 11
Classroom* 4 days $2,700 9
Remote Classroom* 4 days $2,700 9
Virtual Training* 5 days, 27.5 hours $2,700 9
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
26 or redhat.com/training * ourse does not include exam. Exam sold separately.
C
27. RH255
United states
AZ Phoenix 6/4 7/30
CA Anaheim 4/23 8/6
Burbank 4/23 8/6
Culver City 4/2 8/27
Sacramento 4/30 7/23
San Bernardino 4/2 8/27
San Diego 4/16
San Francisco 4/30
San Jose 5/21 8/13
CO Greenwood Village 4/16 6/11 8/6 9/24
DC Washington 4/23 6/18 7/30 9/24
FL Fort Lauderdale 6/18 7/30
Orlando 6/4 8/27
Tampa 4/16 7/23
GA Atlanta 4/2 5/21 8/13
IL Chicago 5/7 7/9 8/20
IN Indianapolis 4/9 5/14 7/16 9/24
KS Kansas City 5/7 6/25 9/10
MA Boston 4/9 6/18 9/10
MD Columbia 5/14 6/25 8/20
MI Detroit 4/2
MN Shoreview 4/9 5/21 7/30
MO St Louis 7/9
NC Charlotte 6/25 8/13
Raleigh 4/16 6/11 8/27
NE Omaha 8/20
NJ Edison 6/25 9/24
NV Las Vegas 5/21 7/16
NY New York 4/2 6/4 8/20
OH Columbus 4/30 7/16
PA Philadelphia 4/9 8/6
TX Austin 4/23 6/18 9/10
Dallas 6/11 8/27
Houston 4/9 6/4 9/17
VA Richmond 6/18 9/24
Virginia Beach 6/11
WA Seattle 6/4 7/30
CANADA
AB Edmonton 6/11 8/20 9/10
BC Vancouver 6/11 7/23, 7/30 8/6 9/3, 9/10
ON Ottawa 5/7 9/17
Toronto 5/14 7/23
QC Montreal 5/28 9/10
Virtual training
Virtual classroom 5/7 7/9 9/17
Register: 1–866–626–2994
or redhat.com/training 27
28. RH290
Red Hat Enterprise Linux
for Solaris Administrators
This course provides system administrators the practical skills needed to perform
a hands-on migration and ensure maximum continuing performance after moving
from Sun Solaris to Red Hat Enterprise Linux.
United States course content
AZ Phoenix 5/30 • Migration and maximizing • Collecting and reporting
CA San Francisco 5/30 performance post-migration system information
DC Washington 7/9, 9/5 • Using RPM, yum, Red Hat • Saving kernel crash dumps
FL Orlando 4/23 Network, and Quickstart over the network
GA Atlanta 7/30
• Boot process, kernel • Managing iSCSI disks and
IL Chicago 4/30
modules, and initialization using multipath
MA Boston 5/21, 9/5
• Software lifecycle • Managing device naming
NC Charlotte 9/5
management with udev
Raleigh 9/5
• Partitions and logical • Analyzing systems and
NE Omaha 4/9
TX Austin 7/30
volume management (LVM) services using SystemTap
Dallas 6/25 • Securing access to systems
Houston 5/30, 9/5 and services
Virtual training
6/26, 8/13, Audience
Virtual Classroom
9/24 • Experienced Solaris system administrators transitioning to
a Red Hat Enterprise Linux platform
• Solaris administrators seeking a transition course that will
“ he instructor did
T help them work toward RHCE certification
an excellent job
Prerequisites
covering all of the
• Experience in Solaris at the power user, network operations,
course topics.” or system administrator level
• Two years of Solaris experience installing server operating
– Azfar Malik, system and software, troubleshooting servers, and config-
VP — Business Continuity, uring and securing servers and services
Bank of America
LOCATION TRAINING TIME COST‡ TUs
Classroom 3 days $2,025 7
Virtual Training 4 days, 22 hours $2,025 7
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
28 or redhat.com/training
29. Your path
to unlocking
business value
starts here.
Transforming your IT infrastructure to be leaner,
faster, or more flexible is not just a project,
it's a journey. Every day Red Hat Consulting helps
enterprises navigate this transformation.
Drawing from strategic business acumen and
unparalleled open source technical expertise,
Red Hat Consulting guides you through an
actionable path that drives business value at
every step — unlocking the real value of IT.
www.redhat.com/consulting
30. RH300
RHCE Rapid Track Course
with RHCSA and RHCE Exams
The RHCE Rapid Track Course is a fast-paced review that combines eight days of key
training material (from the RHCSA Rapid Track Course and Systems Administration III)
into one, four-day course. It includes intermediate and advanced competencies and
prepares students to take the RHCSA and RHCE exams.
course content
• Package, network, and • SELinux and firewall
storage management management
• Account and authentication • Web and email service
management • Network file-sharing services
“ learned quite
I • Installation, kickstart, • SSH and VNC services
and virtualization
a bit even though
I have been Audience
using Linux for • RHCEs certified on version 5 or earlier seeking training
prior to re-certification
10 years.” • Experienced senior Linux system administrators with a
– Debbie Price, minimum of five years of Linux experience who want a
Senior Systems Engineer, fast-track solution to earning an RHCE certification
Clearshark • Experienced Solaris system administrators who have
completed the Red Hat Enterprise Linux for Solaris
Administrators (RH290) course
Prerequisites
Students should be able to complete most of the tasks specified
in the RHCE study guide prior to attending this class
Confirm your skill-set by
passing the online skills
assessment at redhat.com/
training/skills_assessment
on the path To LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exams 5 days $3,600 12
Classroom* 4 days $3,200 11
Remote Classroom* 4 days $3,200 11
Virtual Training* 5 days, 27.5 hours $3,200 11
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
30 or redhat.com/training * ourse does not include exam. Exam sold separately.
C
31. RH300
United states
AZ Phoenix 6/11
CA Anaheim 5/14 9/10
Burbank 5/14 9/10
Culver City 5/21
Sacramento 6/4 9/24
San Bernardino 5/21
San Diego 6/4
San Francisco 6/4
San Jose 6/25 9/24
CO Greenwood Village 4/30
DC Washington 4/30 6/25 8/13
FL Fort Lauderdale 5/7 8/20
Orlando 9/4
Tampa 5/7
GA Atlanta 4/16 5/29 8/27
IL Chicago 5/21 8/13
IN Indianapolis 4/2
KS Kansas City 5/14
MA Boston 6/18 7/30
MD Columbia 4/23 7/30
MI Detroit 9/4
MN Shoreview 6/18 9/4
MO St Louis 4/30 8/20
NC Charlotte 4/23
Raleigh 7/23
NE Omaha 6/11 9/17
NJ Edison 4/2 6/4 8/27
NY New York 4/23 6/25 8/20
PA Philadelphia 6/4 8/27
SC Charleston 4/16 7/16
TX Austin 6/25 8/20
Dallas 7/9
Houston 4/16 8/6
VA Richmond 4/16 7/16
CANADA
AB Edmonton 6/18
BC Vancouver 6/18
ON Ottawa 6/11
Toronto 6/25 9/17
QC Montreal 6/18 9/24
Virtual training
Virtual classroom 4/9 6/11 8/6 9/10
Register: 1–866–626–2994
or redhat.com/training 31
32. UPDATED! RH319
Red Hat Enterprise Virtualization
with Exam
This course explores the virtualization features of Red Hat Enterprise Linux,
managed through the Red Hat Enterprise Virtualization suite. Learn how to
create, deploy, manage, and migrate Linux and Microsoft Windows virtual
machines. This course also prepares students to take the Red Hat Enterprise
Virtualization certification exam (EX318) and earn the RHCVA certification.
United States course content
AZ Phoenix 6/18 • Deploy Red Hat Enterprise • Use templates for rapid
CA San Francisco 6/25 Virtualization platform virtual machine deployment
Greenwood • Configure Red Hat Enterprise • Secure the Red Hat
CO 9/10
Village
Virtualization environment Enterprise Virtualization
DC Washington 7/9, 9/24
(datacenters, clusters, and environment with multi-
IL Chicago 4/16
storage domains) level administrative roles
MA Boston 4/2, 9/17
• Install, manage, and trouble- • Monitor and create custom
NC Raleigh 4/9
shoot virtual machines reports
NE Omaha 5/7
(servers and desktops) • Back up and restore the
NJ Edison 9/17
NY New York 6/4, 7/16 • Create virtual machine Red Hat Enterprise
TX Austin 5/14 snapshots and explore high Virtualization environment
Dallas 7/23 availability options
Canada
BC Vancouver 4/30 Audience
ON Toronto 4/23, 8/20 • Experienced Linux system administrators responsible for
managing enterprise servers who are interested in learning
how to manage large numbers of servers or virtual
machines using Red Hat Enterprise Virtualization
• IT professionals interested in earning a RHCVA certification
on the path TO Prerequisites
• IT professionals who have earned an RHCSA certification
or maintain the equivalent experience with Linux
• System administration experienced with Microsoft Windows
operating systems is beneficial
LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exam 5 days $3,500 12
Classroom* 4 days $3,200 11
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
32 or redhat.com/training * ourse does not include exam. Exam sold separately.
C
35. CL350
Red Hat Cloud Architecture
This course provides IT architects with a detailed understanding of Red Hat
cloud capabilities and the knowledge to select the right components and develop
applications for private infrastructure-as-a-service (IaaS) clouds.
course content United States
• A vocabulary for cloud • Deploying software to DC Washington 5/30
services and deployments systems using Red Hat IL Chicago 4/23
• Introduction to Network Satellite NY New York 6/25
TX Dallas 8/1
infrastructure-as-a-service • Using JBoss Operations
(IaaS) cloud computing Network to deploy JBoss
• Using a private cloud Enterprise Application
computing reference archi- Platform applications
tecture build with Red Hat • Efficiently scheduling work
software with Red Hat MRG Grid “ he hands-on
T
• Managing the deployment • Deployment of applications
experience
and lifecycle of virtual across hosted, in-house, or
guests hybrid clouds I gained going
• Introduction to through the
Red Hat CloudForms
process of
Audience building a private
• Experienced Linux system administrators and IT profes-
cloud has given
sionals who are responsible for using Red Hat technologies
to deploy a private IaaS cloud me the tools to
• Technical decision-makers seeking an overview of the Red Hat make an informed
cloud reference architecture for a private IaaS cloud
decision on
Prerequisites my company’s
• Students must be familiar with concepts and skills tested
entry into cloud
in the RHCSA certification
• A high-level understanding of Red Hat Enterprise computing.”
Virtualization, KVM, and Red Hat Network Satellite
– Bradley Corner,
Information Systems
Manager, RealtyWEB.NET
LOCATION TRAINING TIME COST‡ TUs
Classroom 2 days $1,600 6
Onsite Call 1–866–626–2994
‡ rices subject to change
P Register: 1–866–626–2994
or redhat.com/training 35
36. RHS334
Red Hat Enterprise Security:
Network Services with Exam
This course equips senior administrators and security professionals with the skills
needed to harden systems against attacks, and details the advanced security
features, capabilities, and risks associated with deployed services. It also prepares
students for the Enterprise Security: Network Services exam (EX333).
United States course content
DC Washington 5/21 • Mastering basic • Advance uses of Secure Shell
NC Raleigh 6/18, 9/17 service security • Building a secure e-mail
NY NewYork 4/2 • Understanding cryptography infrastructure
Virtual training • Securing BIND and DNS • Securing FTP and Apache
Virtual Classroom 7/16 • Hardening RPC services httpd services
• Using Kerberos for centrally • Basics of intrusion detec-
managed user authentication tion and response
• Improving NFS security with
Kerberos and NFSv4
Audience
• Experienced Linux system administrators responsible for
the overall security of their systems and networked services
• An RHCE interested in earning Red Hat Certificates of
Expertise, RHCSS, RHCA credential
Prerequisites
• Attendees should already know the essential elements of
how to configure the services covered, as this course will be
Students without an RHCE focusing on more advanced topics
certification are encouraged • RHCE certification or equivalent experience
to complete a skills assess-
ment online at redhat.com/
training/skills_assessment
on the path TO
LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exam 5 days $3,500 12
Classroom* 4 days $3,200 11
Virtual Training* 5 days, 27.5 hours $3,200 11
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
36 or redhat.com/training * ourse does not include exam. Exam sold separately.
C
37. RHS430
Red Hat Enterprise SELinux
Policy Administration with Exam
This course teaches senior system administrators, security administrators, and
application programmers to manage, write, compile, and debug secure SELinux
policies. It culminates in a major project to analyze, design, and implement a set
of net-new policies for a previously unprotected service. It also prepares students
for the SELinux Policy Administration exam (EX429).
course content United States
• Introduction to SELinux • Anatomy of a policy Greenwood
CO 5/21
Village
• Using SELinux • Manipulating policies
DC Washington 4/9, 8/27
• The Red Hat targeted policy • Analyzing system and
• Introduction to policies security needs
• Policy utilities • Design and implementation
• User and role security of a net-new SELinux policy
Audience
• Experienced Linux system administrators responsible for
Mandatory Access Control-based (MAC) security, or who
want to harden their existing Linux systems or networked
services security
• RHCEs interested in earning Red Hat Certificate
of Expertise or RHCSS credentials
Prerequisites
RHCE certification or equivalent experience
Students without an RHCE
certification are encouraged
to complete a skills assess-
ment online at redhat.com/
training/skills_assessment
on the path to
LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exam 5 days $3,500 12
Classroom* 4 days $3,200 11
Onsite Call 1–866–626–2994
‡ rices subject to change.
P
* ourse does not include exam. Exam sold separately.
C Register: 1–866–626–2994
or redhat.com/training 37
38. Red Hat NetwoRk Satellite
A Way to Succeed at
Life Cycle Management
With intense pressure today to cut costs, comply with regulatory
mandates and serve business more effectively, life cycle management
with RHN Satellite can help by reducing complexity and increasing
operational effeciency.
For more information, visit redhat.com/red_hat_network
39. RH402
Red Hat Enterprise Deployment
and Systems Management with Exam
This course gives senior systems administrators the skills to provision, deploy,
and manage successful large-scale deployments of Red Hat Enterprise Linux, and
teaches them how to provide an efficient process for their local teams. It also
prepares students for the Deployment and Systems Management exam (EX401).
course content United States
• Essential system manage- • Revision management with Greenwood
CO 5/7
Village
ment concepts for success- Subversion
GA Atlanta 7/9
ful enterprise deployment • Best practices for building NC Raleigh 5/21, 8/13
• Installation, configuration, RPM packages NJ Edison 7/23
and maintenance of • Automation of bare-metal 4/9, 6/11,
NY New York
Red Hat Network (RHN) 9/17
provisioning
Satellite Server TX Austin 4/16, 9/24
• How to structure RHN orga-
Dallas 6/4, 8/6
• Effective software life cycle nizations and user accounts
management using RHN Canada
• Reporting and automation
Satellite Server ON Toronto 5/14, 9/10
with RHN programming API
Audience
• Experienced Linux system administrators responsible for
the planning, deployment, and management of multiple
physical or virtualized servers
• RHCEs interested in earning a Red Hat Certificate of
Expertise, RHCDS, or RHCA credential
Prerequisites
RHCE certification or equivalent experience Students without an RHCE
certification are encouraged
to complete a skills assess-
ment online at redhat.com/
training/skills_assessment
on the path to
LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exam 5 days $3,500 12
Classroom* 4 days $3,200 11
Onsite Call 1–866–626–2994
‡ rices subject to change.
P
Register: 1–866–626–2994
* ourse does not include exam. Exam sold separately.
C
or redhat.com/training 39
40. RH424
Red Hat Enterprise Directory Services
and Authentication with Exam
This course teaches students to manage, deploy, and integrate Red Hat Directory
Server in order to provide authentication and information services across the
enterprise. This course also prepares students for the Directory Services and
Authenication exam (EX423).
United States course content
DC Washington 6/25 • Understanding basic • Using Kerberos and LDAP
MA Boston 4/30, 8/13 LDAP concepts to centrally manage user
NC Raleigh 8/6 • Configuration and authentication
Virtual Training management of Red Hat • Using LDAP referrals and
Virtual Classroom 8/27 Directory Server replication for distributed,
• Cross-platform integration highly available directory
of directory services server performance
• Managing user authentica- • Exploring options for inte-
tion with PAM and glibc NSS gration with Microsoft Active
Directory authentication
Audience
• Experienced Linux system administrators responsible for
user account information and secured enterprise authenti-
cation mechanisms of one or more Linux systems
Students without an RHCE • System administrators who have configured directory
certification are encouraged services and authentication on other operating systems but
to complete a skills assess- now want to perform those tasks on a Linux system
ment online at redhat.com/ • Experienced system administrators wanting to integrate
training/skills_assessment directory service and authentication mechanisms across
multiple operating systems
on the path to • RHCEs interested in earning Red Hat Certificates of
Expertise or RHCDS or RHCSS certifications
Prerequisites
RHCE certification or equivalent experience
LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exam 5 days $3,500 12
Classroom* 4 days $3,200 11
Virtual Training* 5 days, 27.5 hours $3,200 11
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
40 or redhat.com/training * ourse does not include exam. Exam sold separately.
C
41. RH437
Red Hat Enterprise Clustering
and Storage Management with Exam
This course provides hands-on instruction for senior Linux systems administrators
who wish to use storage management, Red Hat Cluster Suite, and shared storage
technologies delivered by Red Hat Global File System (GFS). It also prepares
students for the Clustering and Storage Management exam (EX436).
course content United States
• Setup and management of • Storage I/O multipath with CA San Francisco 6/18
high-availability clustered device mapper San Jose 8/27
services with Red Hat Greenwood
• Using cluster Logical CO
Village
4/2
Cluster Suite Volume Management (LVM) DC Washington 4/23
• Providing iSCSI targets with • Configuration and use of GA Atlanta 4/9, 9/17
Red Hat Enterprise Linux the Red Hat Global File IL Chicago 7/9
• Customization and control System cluster file system MD Columbia 4/16
of device files with udev for shared storage NC Raleigh 4/30
NY New York 5/14, 8/13
PA Philadelphia 6/11
Audience TX Austin 6/4, 8/27
• An experienced Linux system administrator responsible for Dallas 5/7, 7/23
managing shared storage across one or more Linux systems
• An experienced Linux system administrator responsible
for maintaining a high-availability service using cluster
technology
• An RHCE interested in earning a Red Hat Certificate
of Expertise, an RHCDS, or an RHCA credential
Prerequisites
RHCE certification or equivalent experience
Students without an RHCE
certification are encouraged
to complete a skills assess-
ment online at redhat.com/
training/skills_assessment
on the path to
LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exam 5 days $3,500 12
Classroom* 4 days $3,200 11
Onsite Call 1–866–626–2994
‡ rices subject to change.
P
* ourse does not include exam. Exam sold separately.
C
Register: 1–866–626–2994
or redhat.com/training 41
42. RH443
Red Hat Enterprise Performance
Tuning with Exam
This course teaches senior Linux system administrators performance tuning for
Red Hat Enterprise Linux. It discusses system architecture, methods for testing
performance adjustments, open source benchmarking, methods for analyzing
system and networking performance, and tuning configurations. It also prepares
students for the Enterprise Performance Tuning exam (EX442).
United States course content
CA San Francisco 4/2 • Tuning for use-case • Tuning memory and caches
DC Washington 6/11, 8/6 scenarios (e.g., HPC, large • Tuning CPU and memory
GA Atlanta 4/23 memory, database, file utilization using cgroups
IL Chicago 9/10 server, etc.) Tuning for • Gathering performance
MA Boston 5/7 power consumption metrics and other data for
NC Raleigh 7/23 • Tuning virtual machines tuning purposes
NJ Edison 4/16 (host and guest)
TX Dallas 6/25
Houston 8/20
Audience
Canada
• Experienced Linux system administrators responsible for
ON Toronto 5/28, 7/9
maximizing resource utilization through performance tuning
Virtual TRaining
• RHCEs interested in earning a Red Hat Certification of
Virtual Classroom 5/14, 7/30
Expertise, or a RHCA credential
Prerequisites
RHCE certification or equivalent experience
Students without an RHCE
certification are encouraged
to complete a skills assess-
ment online at redhat.com/
training/skills_assessment
on the path to
LOCATION TRAINING TIME COST‡ TUs
Classroom w/Exam 5 days $3,500 12
Classroom* 4 days $3,200 11
Virtual Training* 5 days, 27.5 hours $3,200 11
Onsite Call 1–866–626–2994
Register: 1–866–626–2994 ‡ rices subject to change.
P
42 or redhat.com/training * ourse does not include exam. Exam sold separately.
C
43. RHD251, RHD361, RHD362
Red Hat Developer Courses
The Red Hat Enterprise Linux Development (RHD251) course RHD251
rapidly trains programmers to develop application programs Red Hat
on Red Hat Enterprise Linux. Topics include Linux software
development tools such as the GNU Compiler Collection (GCC),
Enterprise Linux
Make, and the GDB debugger. Students also learn how to use Development
library functions and system calls to perform I/O, memory man-
agement, process creation, and interprocess communication
including network programming with sockets.
The Red Hat Enterprise Linux Kernel Internals (RHD361) RHD361
course provides experienced developers an intensive, Red Hat
low-level examination of the Linux kernel architecture. Topics
include kernel compilation, debugging tools and techniques,
Enterprise Linux
and internal kernel APIs, including synchronization, process Kernel Internals
management, and memory management. These topics
provide a solid understanding of the kernel’s architecture, giv-
ing a useful baseline from which more specialized topics taught
in other courses, such as device drivers or performance-tuning,
can be addressed.
Red Hat Enterprise Linux Kernel Device Drivers (RHD362) RHD362
teaches experienced C programmers already familiar with the Red Hat
Linux kernel architecture the skills and strategies they need to
Enterprise Linux
develop device drivers. The course covers device driver models
(including character, block, and network device drivers); device
Kernel Device
interaction (including port I/O, memory mapped I/O, interrupt Drivers
handling, and DMA transfers); managing PCI and USB de-
vices; strategies for deferring activity using tasklets and work
queues; device registration using the Unified Device model and
the sysfs file system; and process interaction, including basic
file operations, polling, and wait queues.
Register: 1–866–626–2994
or redhat.com/training 43
44. Get More.
Access the red hAt
custoMer PortAl.
Award-winning resources for
your full technology lifecycle
Your IT application infrastructure is the foundation of your
business. It must be proven, scalable and secure. It must also
evolve as your business needs do. This is why you need more
than a break-fix support contract from your technology vendor.
You need a collaborative relationship.
With a Red Hat subscription you have access
to the knowledge of the best engineers through all
phases of planning, testing, deploying, maintaining,
and upgrading your IT infrastructure all through
the Red Hat Customer Portal.
PlAN dePloY coNNect
access.redhat.com
46. Learn. Network.
Experience Open Source.
The Red Hat® Summit and JBoss® World are the premier
open source events that bring together engineers, business
decision makers, developers, and community enthusiasts to
learn about the latest in open source cloud, virtualization,
platform, middleware, and management technologies.
JUNE 26–29, 2012
HYNES CONVENTION CENTER
BOSTON, MA
www.theredhatsummit.com
Follow us on twitter:
www.twitter.com/redhatsummit