Course Outline
BENEFITS
- Mentorship under Cloud professionals
- Onsite Training
- Hands-on lab on MultiCloud
- Solve real client tasks & projects
- Working on Freelancing platforms
- Self-paced & Instructor LED training
- Working desk and Internet provided
- And much more (Beyond the Basics)
WHAT’S INCLUDED:
- AWS 3in1 , Azure 2in1 , GCP 2in1 , & DevOps LMS Access (lifetime)
- Free lifetime access to Alibaba Cloud LMS (for students with lumpsum fee payment only)
- Hardcopy books (for students with lumpsum fee payment only)
AFTER COMPLETION, INDIVIDUALS WILL BE ABLE TO
- Earn Upto PKR 50,000/-
- Start a career as a freelancer & Cloud Engineer
- Start his/her own business & Company
- Provide solution & services on MultiCloud & DevOps
- Become a market-ready MultiCloud professional
- Attempt MultiCloud exams at discounted rate
- Join Sherdil Cloud team as a trainee
Amazon Web Services
DEEP DIVE THEORY
- AWS Essentials
- AWS Services Overview
- AWS Trusted Advisor
AWS CLOUDTRAIL
- Create a trail in CloudTrail
AWS IAM
- Create a custom policy of EC2 which allows limited list, read, and write access and attach it with a user group with at least two users with programmatic access
AWS CLOUDWATCH
- Create a billing Alarm which should alert you over Email & SMS once the desired value will be reached.
- Create a dashboard in it
AWS S3
- Create a bucket with default encryption, enable object level versioning with public access, and upload 3 versions of the text file.
- Version 1 should be on S3 standard, version 2 should exist on Standard-IA, and version 3 should exist on RRS
AWS CLOUDFRONT
- In this scenario, deploy a static website using an S3 bucket.
- Create a distribution using the CloudFront.
AWS VPC
- Create a high availability VPC with 2 AZs along with 4 subnets.
- Create a multi-Az virtual private cloud using CLI.
AWS EC2
- Launch a Bastion host and install IIS server in a private window VM
- Create an EC2 Machine that can communicate directly to AWS S3 without going to the Internet.
- Create an EC2 Machine on one VPC and another VM on another VPC and then access VM2 from VM1
AWS ELB AND AUTOSCALING
- Launch a website in such a manner that if we refresh a DNS, it shows the IIS server and WordPress server sequentially.
- Create an EC2 Machine and enable IIS server then create AMI of that VM then again launch VM but this time it will be configured through AutoScaling and will be in a private VM then open it through ALB DNS Endpoint.
AWS ROUTE53
- Now create DNS for the Above ALB Endpoint
AWS LAMBDA
- Create a lambda function to start, restart, stop an ec2 instance.
- Create a lambda function that performs the following task:
When we upload a file on S3 then its metadata should be stored in DynamoDB. - Create a lambda function to create automated snapshot using existing volume via lambda function Existing role.
- Create an IAM role that will help to invoke Lambda Function.
AWS LAMBDA AND EVENT BRIDGE
- Now Schedule that event through Cron Job Expression.
AWS SNS AND SQS
- In this scenario, you have to create a CloudWatch alarm that publishes a message to an SNS topic when triggered.
- The alarm state is based on a custom metric filter generated from a CloudWatch log group. You also need to test the metric filter if it correctly filters the logs based on the criteria below:
- Create an SNS topic and give the name td-instance alarms.
- Create an email subscription to the topic using your email address
- Create a log group and name its td-instance-logs and configure the log group to retain logs for 3 days.
- Create a metric filter using the td-instance-logs log group and name it td-instance-HTTP-5xx-metric. Create a filter pattern that monitors all of the HTTP 500-level errors and names its td-instance-HTTP-5xx-filter.
- Create an alarm using the custom metric filter you just created. Set the metric name to td-instance-HTTP-5xx sum.
- Configure the alarm to evaluate every minute and set the total threshold to greater than 5. Then, set the alarm threshold to 3 units.
- Publish a message to the td-instance-alarms topic when ALARM state is triggered. Set the alarm name to td-instance-5xx-alarm.
AWS DYNAMODB
- In this scenario, you need to create a DynamoDB table along with mentioned steps:
- Create a Primary key (String) & Sort keys (Number) ● Set Write & Read Capacity unit to 6
- Create a local secondary index
- Create a backup of the entire table
AWS RDS
- In this scenario, you have to create a Private relational database and connect it using Any DB Client.
AWS ELASTIC BEANSTALK
- Create a sample PHP application in Elastic Beanstalk then update its code from Sample Application Folder
AWS SIMPLE EMAIL SERVICE
- create a simple email service with your mail, set the bounce and limit and configure it with a simple notification service.
AWS CLOUDFORMATION
- Deep Dive Theory with Concepts
- Create VPC with high availability
- Create EC2 VM on Public subnet
- Create EC2 VM on Private subnet
- Create a VM then Install Nginx through CFT
- Create RDS
- Create AutoScaling and load Balancer
- Create EKS Cluster and Worker Node
Microsoft Azure
INTRODUCTION TO AZURE FUNDAMENTALS AND SECURITY
- Benefits and Considerations
- As A Service Offerings
- Azure Tools
- Core Identity
- Azure Pricing and Support
- Planning and Managing Cost
- Azure Regions
- Azure Resource Manager
- Defense in Depth
- Security Layers
- Compliance and Security Requirements
MANAGE AZURE SUBSCRIPTIONS AND SECURITY OPERATIONS (THEORY)
- Intro to Accounts and Subscriptions
- Naming and Tagging
- Azure Subscriptions Configurations
- RBAC Overview
- Azure Monitor
- Log Analytics
- Azure Security Center Overview
- Azure Policy
MANAGE AZURE SUBSCRIPTIONS AND SECURITY OPERATIONS (LABS)
- Azure Trial Account Creation
- Quotas, Cost Analysis and Tagging
- Monitoring, Alerts, Activity log
- Billing Alerts
- Cost Management
- Subscription Policies
- Implement Role-Based Access
- Azure Monitor and Alerts
- Log Analytics
- Prevent and Respond to Threats in Azure Security Center
- Implement Azure Policy
- Implement a Resource Lock
AZURE VIRTUAL NETWORKS AND SECURITY (THEORY)
- Network Overview
- Network Security Overview
- Network Security Groups (NSGs)
- Cross Site Connectivity
- Azure Load Balancing Services
- Azure Firewall
- Distributed Denial of Service (DDoS)
AZURE VIRTUAL NETWORKS AND SECURITY (LABS)
- Create VNets and Subnets via the Azure
Portal and PowerShell - Configure User-Defined Routes and VNet
Peering - Create and Configure a NSG
- Cross Site Connectivity
- Create and Configure an Azure Load
Balancer - Configure Azure DNS
- Configure App Gateway
- Configure Azure Firewall
HOST OPERATIONS AND SECURITY (THEORY)
- Virtual Machines (VMs) Overview
- VM Configuration, Networking, Storage
- VM Availability, Scalability, Extensions
- Azure Disk Encryption
- VM Security Best Practices
HOST OPERATIONS AND SECURITY (LABS)
- Create and Connect to Azure VM
- Deploying Virtual Machine Images, Custom Images, Linux
- Configuring Virtual Machines
- Create Key Vault for Disk Encryption
- Configure Disk Encryption
- Azure Security Center and VMManagement
- VM Hardening in Security Center
STORAGE AND DATA SERVICES WITH SECURITY (THEORY)
- Storage Account Overview
- Manage Permissions
- Encryption Keys and Key Vault
- Key Vault Overview
- Azure Backup and Recovery Services
STORAGE AND DATA SERVICES WITH SECURITY (LABS)
- Create a Storage Account via Portal
- Use Storage Explorer with Azure Storage
- Create and Manage SAS
- Azure File and Sync Services
- Configure Azure Backup and Recovery Services
AZURE ACTIVE DIRECTORY FOR WORKLOADS (THEORY)
- Azure Active Directory (AD) Overview
- AD Connect Overview
- Authentication Options
- Service Principals
- Identity Protection
- Privileged Identity Management (PIM)
AZURE ACTIVE DIRECTORY FOR WORKLOADS (LABS)
- Create Azure AD Tenant
- Move Subscription to another Directory
- Create Users and Groups
- Implementing AD Connect
- Monitoring with AD Connect Health
- Create a Service Principal
- App Registration
- Configure Identity Protection
- Configure Privileged Identity Management
AZURE DATABASE (LABS)
- Create Azure SQL database
- Database connectivity
- Private Endpoint to connect to Azure SQL Database.
- Database backup & restore
- Import & export database
Google Cloud Platform
- Certification Road map
- Cloud computing basics
- Signup & login Process
- GCP Calculator
- GCP Services Overview
- Cloud Project & Billing (Theory + Hands-on Lab)
- IAM (Theory + Hands-on Lab)
- VPC Networks – Controlling Access with IAM Predefined Roles & Service Accounts
- Cloud Shell + Cloud SDK (Theory)
- Cloud Shell + Cloud SDK (Hands-on Lab)
- GCP Cloud Storage (Theory) + Costing
- GCP Cloud Storage (Hands-on Lab)
- VPC Theory + VPC Lab
- Google Compute Engine (Theory + Hands-on Lab)
- Load balancing & AutoScaling (Theory + Lab)
- Internal Load Balancer + MIG (LAB)
- Cloud CDN (Theory)
- GCP Multiple NICs MS s+ Multiple VPC + IAP LAB (Advanced Topic)
- DDOs Protection in GCP using Cloud Armor (LAB)
- GCP Deployment manager + Marketplace + DNS (Theory + Lab)
- Google Cloud Operations (Theory+Lab)
- Google Cloud Databases
- Google App Engine (Theory+Lab)
- Cloud Run & Cloud function
- Google Kubernetes Engine Overview + Lab
- AI/ML Services + Google BQ (Theory + Lab)
- Big Data Overview (Dataflow, dataproc, Bigtable)
Case Studies ( All 4) - Exam tips & tricks (Final exam)
- Final Project
- Final Exam
DevOps Engineer
(Online)
01. LINUX ESSENTIALS
- Introduction
- Differences between Windows, OS X, and Linux
- Installation
- File system
- Linux Basic Commands
- Shell scripting
- Directory structure / permission
- Storage / configuration
- Archiving and compression
- System monitoring tools
- Job scheduling
- Services
- Rpm / yum
02. GIT
- Version Control System
- Git Introduction
- Installation of Git
- Configuration of Git
- Local Repository
- Initialising Git Repository
- Git Basic Example
- Git branch, Git Merge
- Git Diff
- Git Clone
- Securing Git using ssh-keys
- Git Remote Repository
- Git Logs
03. DOCKER
- Introduction to Docker
- Install & Setup Docker on Linux
- Remove, Downgrade, Upgrade
- Storage & Logging driver
- Docker Registry
- Docker Images
- Docker Containers
- Docker Diagnose
- Docker file
- Docker Compose
- Docker Swarm
- Docker Stack
- Docker Networking
- Docker Services
- Docker Volume
- Docker Swarm vs Kubernetes
04. KUBERNETES
- Kubernetes and its importance
- Background & future
- Need of Kubernetes & Big picture
- What is Kubernetes for
- Micro-services, What, Why and How
- Containerisation and Kubernetes
- Docker and Container Lifecycle
- Working with Docker images
4.1 KUBERNETES WALKTHROUGH
- Architecture of Kubernetes
- Cluster Architecture
- Kubernetes core concepts
- Overview of other installations’ options
- Kubernetes API primitives
4.2 APPLICATION ENVIRONMENT, CONFIGURATION
- Pods, labels/selectors, replication controllers, services, API Services and other network primitives
- Deployments, jobs, and services
- Declarative vs imperative mode
- Getting Started with YAML
- Interacting with kubectl
4.3 OBSERVABILITY & MAINTENANCE
- Pods health checks
- Readiness/Liveness Probe
- Understand how to monitor applications.
- Manage application logs.
- Use label selectors to schedule Pods.
- Understand how resource limits
4.4 APPLICATION DEPLOYMENT & LIFECYCLE MANAGEMENT
- Understand Deployments and how to perform rolling updates and rollbacks.
- Know various ways to configure applications.
- Know how to scale applications.
- Understand the primitives necessary to create a self- healing application.
4.5 STORAGE / PERSISTENCE
- Understand persistent volumes and know how to create them.
- Understand access modes for volumes.
- Understand persistent volume claims primitive.
- Understand Kubernetes storage objects
- Know how to configure applications with persistent storage.
4.6 SERVICES & NETWORKING
- Services Know how
- Understand the networking configuration on the cluster nodes.
- Understand Pod networking concepts.
- Understand service networking.
- Deploy and configure network load balancer.
- Know how to use Ingress rules.
4.7 TROUBLESHOOTING BEST PRACTICES
- Troubleshoot application failure.
- Troubleshoot control/worker plane failure.
- Troubleshoot networking.
4.8 BONUS TOPICS
- Managed Kubernetes.
- Getting Started with Kubernetes on EKS.
- Guide to pass CKAD / CKA exam.
05. JENKINS
- Introduction
- Download and Install Jenkins
- Jenkins Configuration
- Jenkins Plugins
- Security Management
- Freestyle jobs
- Integration of Jenkins with GIT
- Build Web via Code
- Building a Jenkins Pipeline (CI/CD)
06. ANSIBLE
- About Ansible
- How to Install Ansible
- Configuring SSH and Sudo for Ansible
- The Ansible Configuration File
- Setting Up the Ansible Inventory
- The Ansible Command
- The Shell and Command Modules
- Ansible course summary
Introduction to Freelance
UPWORK
- Upwork profile creation
- How to identify good client
- How to find job on Upwork
- Filter good clients
- How to write effective proposal
- Which countries are best for clients
- What is the best time for bidding
- What about subscription
FREELANCER
- Freelancer profile creation
- How to identify good client
- How to find job on Freelancer
- Filter good clients
- How to write effective proposal
- Which countries are best for clients
- What is the best time for bidding
- What about subscription
FIVERR
- Fiverr profile creation
- How to create Gigs
- How to identify good client
Terms & Conditions:
- In case a student leaves the program in the middle of the session or at the end of any specific course, he will pay the full individual fees of that course.
- Sherdil IT Academy reserves the right to modify the schedule or timing of any cloud training course based on the availability of the trainer. Any such changes will be communicated in advance to ensure minimal disruption to the learning experience.