Cybersecurity by The Linux Foundation
Cybersecurity has come to the forefront in recent years as attacks have become more sophisticated and widespread. Regardless of what position someone may hold within the technology sector, cybersecurity is everyone's responsibility. The most secure infrastructure is one where security best practices are top of mind across roles, from development to deployment to maintenance.
Linux system administration is a highly sought-after skill in IT. This instructor-led course is for you if you are looking for expert preparation for the Linux Foundation Certified System Administration certification (LFCS), need training to help you start a new Linux IT career, migrate to Linux from another platform, and/or just want to brush up your sysadmin skills.
This instructor-led course will guide you through the various risks and threats you face, teach you how to make use of best practices and other open source tools to counter them, and help you recover from any attacks that may occur. This course is highly technical and hands-on. It covers important security tools and techniques.
This course will prepare you to set up and configure Kubernetes clusters for production. You'll be able to do everything from network configuration and upgrades to making deployments accessible via services. Additionally, you'll be able to handle ongoing Kubernetes administration tasks. This course is also a preparation for the CKA certification test.
Anyone with a CKA certificate and who is interested in, or responsible for cloud security, will find this course useful. This course will give you the knowledge and skills necessary to ensure security in multi-project, dynamic environments. This course addresses security issues in cloud production environments. It covers topics related the security container supply chain. Topics include topics …
This course will give you a solid knowledge of Linux kernel. Tools and techniques for debugging. This instructor-led course will focus on the most important tools for monitoring and debugging the kernel and how security features can be implemented and controlled.