Final Exam: DevOps Engineer
DevOps
| Intermediate
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: DevOps Engineer will test your knowledge and application of the topics presented throughout the DevOps Engineer track of the Skillsoft Aspire Enterprise Developer to DevOps Engineer Journey.
WHAT YOU WILL LEARN
-
Recognize the challenges in provisioning right levels of operational maturity and the key factors to evolve provisioning practices that need to be integrated into devops workflowrecall the key products and services of docker enterprise edition and along with their associated featuresinstall and configure openshift container platform to manage it infrastructure and evaluate its enterprise applicabilityrecognize the essential features of application lifecycle management with focus on the various phases of application lifecycle managementlist the prominent tools that we can use to implement feedback loops, enable continuous monitoring and help teams to track and respondlist various types of monitors that we can use to implement feedback loops and create action plans to maintain system robustnesscompare devops and devsecops and describe the benefits of adopting the devsecops paradigmrecognize the essential devops metrics that we can use to evaluate successful implementation of devops practiceslist the various different approaches of building architecture to setup devops pipelines at scaleidentify the various types of application whitelisting and the steps involved in planning and implementing whitelistinglist the various different approaches of building architecture to setup devops pipelinesrecognize the steps involved in implementing mature a devops security model that can help assess risks and facilitate continuous securitydefine the concept of devops feedback loop and identify the maturity model curve to build well-defined feedback mechanisms in devops lifecyclerecall the tools and processes that can be used to apply security for devops-compliant processes in order to manage intrusion and incident responsesuse git-secret to manage secure commits in the repositorylist the key features and factors that we need to consider when adopting devops in scaling environmentsintegrate issue tracking tools with datadog to create issues from triggered alerts in datadoglist the essential elements of feedback loop and compare positive and negative feedback loops with the use of real-time examples or use casesrecall the approaches of implementing devops that adheres to all essential principles and patterns of devopscreate and share custom dashboards, build charts, query data and explore data using the new relic logs uirecognize the role of security in devops when building and developing the devops workflow to implement ci/cd processesuse new relic to retrieve monitoring data from aws accounts securelylist the categories of tools provided by owasp to secure applicationsdescribe the implementation of continuous security in devops pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing securityrecognize the standard approach of setting up teams to manage projects at scale with a focus on adopting agile and devops standardsset up and configure hosted docker enterpriseinstall grafana and add cloudwatch as a data source to build dashboards for cloudwatch metricsdefine alert policies for incident management using new relicrecognize the benefits of audit logs along with various log levels that we can configure using docker enterprise to capture security-relevant activitieslist the features of relic apm that provide better end-to-end visibility of applications
-
describe devsecops tools that are used by development teams to integrate security throughout the devops pipelinerecall the prominent tools that we can use to log, monitor and configure alerts to watch scaling devops architecturesuse new relic to retrieve monitoring data from aws accountsdescribe policy requirements and the guidelines that set the implementation standard for the security requirements specified in the baseline it security policylist the essential phases of the devsecops workflow and describe the critical checklists that can help secure devops implementationsrecognize the best practices that we need to adopt while creating and implementing feedback loops in devops with the objective of continuous improvementdefine the concept of infrastructure as code and list the prominent tools we can use to implement infrastructure as code applying best principles to manage provisioning of infrastructure for scaling devopsbackup and restore the configuration to manage docker enterprise and work with telemetry plugin in docker enterpriselist the general guidelines and recommendations for implementing containerizationrecall the primary goals of adopting devops practices in the enterprise along with its impact on people, process and productlist the prominent devops tools that we can use to build devops pipelines to manage infrastructure at scale with focus on devops automationrecognize the need for applying test-driven security on applications, infrastructure, and automated devops pipelinesdemonstrate the various approach of using ucp logs in docker enterpriserecognize the tools provided by grafana labs to query, visualize, alert on and understand metricsrecognize the potential challenges in implementing scaling devops architectures and illustrate the impact of devops adoption on businessessetup new relic and explore the capabilities of new relic using the new relic dashboardrecall the critical complexities that can impact enterprise systems along with the role of devops in eliminating and building a stable systemdescribe how security and testing can be integrated into a devsecops environment without compromising speed, security, or qualitybuild, deploy and scale a multi-os application to docker enterprise using swarmrecall the phases of devops lifecycle and illustrate the benefit of implementing feedback loops in each phase of the devops lifecycledefine the roadmap for building modern applications and illustrate the steps and benefits of implementing containerization using dockeruse pentesttool to conduct penetration testing on deployed application to identify vulnerabilitiesrecognize the prominent tools that we can use for feedback monitoring and building alerts to implement continuous feedback loops in devops lifecyclemanage docker images locally and remotely on container registryset up continuous build and continuous integration to manage devops architecture at scalework with datadog and set up agents to collect metrics and events from the systems and applicationsuse new relic to securely retrieve monitoring data from aws accountsinstall and configure trac to build a wiki and issue tracking system for software development projectsuse sentry to monitor errors and help all software teams discover and prioritize errors real-timerecall the approach of securing docker enterprise and list the security best practices that we need to adopt to eliminate risks
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.