Course curriculum

  • 2

    Introduction

  • 3

    Linux/Unix For DevOps and Developer

    • Linux Section Outline

      FREE PREVIEW
    • Introduction Lectures

    • History of Unix

    • linux vs Unix

    • Then What is GNU Linux

    • What is Linux Distributions

    • Unix Architecture

    • Linux Fundamentals Lectures

    • IMPORTANT NOTE

    • Linux Directory Structure Theory

    • The Shell Theory

    • Basic Linux Commands Theory

    • Linux Basics Commands Hands-On

    • Working with Directories Theory

    • Working with Directories Hands-On

    • Listing Files and Understanding ls Output Theory

    • Listing Files and Understanding ls Output Hands-On

    • Links and Shortcuts in Linux Theory

    • Links and Shortcuts in Linux Honds-On

    • File and Directory Permissions Theory

    • File and Directory Permissions Hands-On

    • Finding Files and Directories Hands-On

    • Viewing Files and the Nano Editor Theory

    • Viewing Files and the Nano Editor Hands-On

    • Editing Files in Vi/Vim Theory

    • Editing Files in Vi/Vim Hands-On

    • Linux copy move commands Hands-On

    • Intermediate Linux Skills

    • Input Output and Redirection Theory

    • Linux Redirection Hands-On

    • Linux Comparing Files Hands-On

    • Linux Transfer Files Over Network

    • Shell Aliases Theory

    • Shell Aliases Hands-On

    • Linux Environment Variable Hands-On

    • Processes and Job Control Theory

    • Processes and Job Control Hands-On

    • Scheduling Repeated Jobs with Cron Theory

    • Scheduling Repeated Jobs with Cron Hands-On

    • Linux History Hands-On

    • Linux Sudo Another Users Hands-On

    • Linux Users Management Hands-On

    • The Linux Boot Process

    • Linux File System Hands-On

    • What is Shell Scripting

    • Linux Var Special

    • Linux Operators

    • Linux if else Case

    • Linux Loops

    • Linux Functions

  • 4

    Python For Ethical Hackers

    • IMPORTANT NOTE

    • Section Outline

    • What Is Ethical Hacking

    • What is Python and why to use it in Security

    • Install Python

    • Hello World

    • Data Types

    • Numbers

    • Math functions

    • Operator Precedence

    • Variables

    • Strings

    • Strings Concatenate

    • Types conversion

    • escape sequence

    • formated strings

    • Strings indexes

    • boolean

    • Lists

    • List Methods

    • Matrix

    • None

    • Dictionery

    • Dictionery Methods

    • tuple

    • Conditional If Else

    • For loop

    • range

    • While

    • break continue pass

    • Functions

    • args kwargs

    • Packages in Python

    • Error Handling

    • Input/Output IO

    • IO Error Handling

    • Python_Coding_Project_#1_Portscanner

    • What is Port Scanner and how it works

    • IMPORTANT NOTE

    • Build your Own Port Scanner

    • Python_Coding_Project_#2_Wep_App_Directory_Discovery

    • IMPORTANT NOTE

    • Build Your Own Directory Discovery

    • Python_Coding_Project_#3_Web_App_Login Brute-Force

    • What is Brute Force Attack

    • Types of Brute Force Attacks

    • IMPORTANT NOTE

    • Brute login

  • 5

    AWS (Amazon Web Services) For DevOps

    • What is AWS and why to

    • EC2 Overview

    • EC2 Your First

    • EC2 more Option

    • EC2 AMI

    • EC2 EBS

    • EC2 EBS Snapshots

    • EC2 Placment group

    • EC2 KeyPairs

    • EC2 Network Interfaces

    • ASG Overview

    • ASG Lanuch configuration

    • ASG Create ASG Groups

    • ELB Overview

    • ELB Classic

    • ELB Target groups

    • ELB Network LB

    • ELB Application LB

    • S3 Overview

    • S3 Create your first

    • S3 Versioning

    • S3 Access logging

    • S3 Permission

    • S3 encryption

    • S3 events

    • S3 Managment

    • S3 Host static website

    • S3 CloudFront

    • VPC overview

    • Create your first VPC

    • VPC Subnets

    • Elastic IP

    • VPC Route Tables

    • VPC Internet Gateway

    • VPC NAT

    • VPC Egress Only

    • VPC ACL

    • VPC Security Group

    • VPC Peering

    • IAM Overview

    • IAM Users

    • IAM Groups

    • IAM Roles

    • IAM Custom Policy

    • Route53 Overview

    • Route53 Register Domain

    • Route53 HostedZones

    • Route53 HealthCheck

  • 6

    Jenkins CI CD

    • What is CI CD

    • What is Jenkins and why

    • Install Jenkins

    • Create Jenkins job

    • Job General

    • Job SCM

    • Job Triggers

    • Job Environment

    • Job Build

    • Job Post Build

    • Job Views

    • Managments System Information

    • Managments System Logs

    • Managment Global tool

    • Managments Configure system

    • Managments Plugin

    • Managments Users

    • Managments Security

    • Managments Credentials

    • Managment Nodes

  • 7

    Containerization Technology - Docker

    • what is Docker and why

    • How Docker works Architecture

    • VM vs Containers

    • Install Docker On Linux

    • Install Docker On MAC

    • Docker Overview

    • Docker Engine

    • Docker Images

    • Docker Containers

    • Docker Storage

    • Docker Networking

    • Docker Commands Overview

    • Dockerfile Basics

    • Compose Basics

    • Hello World Container

    • Ubuntu Container

    • Containers Management

    • Images Management

    • Our first Nginx Container

    • Nginx Custom

    • Dockerfile part1

    • Dockerfile part2

    • compose INTRO

    • compose YAML Syntax

    • compose app py file

    • compose Dockerfile

    • compose docker app py

    • compose up

    • compose bind mount

    • compose more option

  • 8

    IAC AWS CloudFormation

    • What is IAC (Infrastructure As Code)

    • CloudFormation Overview

    • YAML Syntax

    • cloudFormation Create Stack

    • CloudFormation Update Delete stack

    • CloudFormation Parameters

    • CloudFormation Resources

    • CloudFormation Mapping

    • CloudFormation Outputs

    • CloudFormation Conditions

    • Cloudformation Internsic Function

    • CloudFormation User data

    • CloudFormation cfn init

    • CloudFormation cfn Signal

    • CloudFormation RollBack

    • CloudFormation Nested

    • CloudFormation Change sets

    • CloudFormation DependsOn

    • CloudFormation Drift detect

  • 9

    IAC (Infrastructure As Code) Terraform

    • Terraform Introduction

    • Terraform Visual Studio Code Download

    • Terraform Folder Setup

    • Terraform Create your First Resource

    • Terraform Install Terraform

    • Terraform IAM Users

    • Terraform Generate Secrets

    • Terraform INIT

    • Terraform PLAN

    • Terraform APPLY

    • Terraform Destroy

    • Terraform tfstate File

    • Terraform Strings

    • Terraform numbers variables

    • terraform boolean variables

    • terraform list var

    • terraform Map var

    • terraform using string var

    • terraform using list var

    • terraform using map var

    • terraform using input var

    • terraform using output

    • terraform using object var

    • terraform EC2 Create Instance

    • Terraform EC2 EIP

    • Terraform EC2 SG

    • terraform module first

    • terraform Module output

    • terraform Module remote

    • AWS IAM Overview

    • AWS IAM Users

    • AWS IAM Groups

    • AWS IAM Roles

    • AWS IAM Custom Policy

    • terraform IAM Create user and attach

    • Terraform RDS create

    • Terraform advance backend create s3

    • terraform advance backend use s3

    • terraform advance count

    • terraform advance import

    • terraform advance depends

    • terraform advance data sources

    • terraform advance syntax validate

    • terraform advance format

    • terraform advance providers multiple

    • terraform advance local provisioner

    • terraform advance remote provesioner

    • terraform plan destroy

    • terraform advance workspaces

    • terraform advance taint

    • terraform advance functions

    • terraform advance debuging

    • terraform sensitive param

  • 10

    Continuous Monitoring AWS CloudWatch

    • CloudWatch Overview

    • CloudWatch Default Metrics

    • CloudWatch Custom Metrics

    • CloudWatch Alarms

    • CloudWatch Billing Alarms

    • CloudWatch Logs Overview

    • CloudWatch Logs Custom

    • CloudWatch Logs Filters and alarm

    • CloudWatch Events

    • CloudWatch DashBoards

  • 11

    Cyber Security Threats and the Best Practices

    • What is Cyber Secuirty

    • Cyber Security Careers

    • Top 10 Cyber Threats

    • 10 Best Practices on Cyber Security

  • 12

    Soft Skills for DevOps

    • What Are Soft Skills

    • Hard Skills Vs Soft Skills

    • Why Soft Skills and 10 Important Skills

    • Communication

    • TeamWork

    • Adaptability

    • Problem Solving

    • Creativity

    • Work Ethic

    • Interpersonal Skills

    • Time Management

    • Leadership

    • Attention To Detail

  • 13

    Jenkins Github and AWS In Practice