Cloud Expedition- AWS

DevOps, AWS, Networking, Linux ( Cloud Expedition Boot Camp )

Job Opportunities

In the dynamic landscape of technology, job opportunities abound for individuals skilled in AWS, DevOps, Linux, and Networking. Here’s a glimpse into the promising career avenues awaiting professionals in these domains:

AWS Cloud Architect:

Design, deploy, and manage scalable and secure cloud solutions on Amazon Web Services (AWS). As a Cloud Architect, you’ll be instrumental in crafting robust and efficient cloud infrastructures for diverse business needs.

DevOps Engineer:

Bridge the gap between development and operations by streamlining processes, automating workflows, and ensuring continuous integration and delivery. DevOps Engineers play a pivotal role in enhancing collaboration and efficiency within software development teams.

Linux System Administrator:

Administer and maintain Linux-based systems, ensuring optimal performance, security, and reliability. Linux System Administrators are crucial in managing servers, resolving issues, and implementing best practices for system operations.

Network Engineer:

Plan, implement, and manage computer networks to ensure seamless communication and connectivity. Network Engineers are responsible for designing and optimizing network architectures, as well as troubleshooting and resolving network issues.

AWS Solutions Architect:

Specialize in creating scalable, secure, and high-performance solutions using AWS services. AWS Solutions Architects collaborate with clients to understand their business needs and design AWS-based solutions that align with organizational objectives.

DevOps Consultant:

Offer expertise in DevOps practices to organizations seeking to enhance their software development and deployment processes. DevOps Consultants guide teams in adopting best practices, tools, and methodologies for improved efficiency.

Linux Systems Engineer:

Engineer and optimize Linux systems, ensuring their reliability and security. Linux Systems Engineers are adept at configuring, monitoring, and troubleshooting Linux environments to meet business requirements.

Network Security Specialist:

Focus on securing and safeguarding network infrastructures from potential threats and vulnerabilities. Network Security Specialists design and implement security measures to protect sensitive data and ensure compliance with industry standards.

AWS DevOps Engineer:

Combine AWS proficiency with DevOps principles to create efficient and automated development pipelines. AWS DevOps Engineers leverage cloud services to enhance the speed, reliability, and scalability of software delivery.

Cloud Networking Specialist:

Specialize in designing and implementing network architectures within cloud environments. Cloud Networking Specialists ensure optimal performance, security, and connectivity for applications and services deployed in the cloud.

Embrace the Future of Technology:

Whether you are an experienced professional or a newcomer to the tech industry, the fields of AWS, DevOps, Linux, and Networking offer diverse and rewarding career opportunities. Stay ahead of the curve, enhance your skills, and embark on a fulfilling journey in the world of technology.

AI & ML

Why IPEC

At iPEC, we pride ourselves on offering an offline learning experience that goes beyond the ordinary. Rooted in excellence, our methodology is tailored to provide students in India with the best possible education, enriched by the expertise of our experienced trainers.

Key Benefits of iPEC Learning Method Offline:

Engage in dynamic, face-to-face interactions with faculty and peers, fostering a collaborative learning environment. Our offline setup promotes active participation and meaningful discussions, enhancing the overall learning experience.

With smaller class sizes, our experienced faculty can provide individualized attention to students. This ensures a deeper understanding of the subject matter, allowing each student to progress at their own pace.

Immerse yourself in hands-on learning experiences facilitated by our knowledgeable faculty. From real-world case studies to practical applications, our offline method equips students with the skills needed to excel in their respective fields.

Build a strong professional network by connecting with classmates and experienced faculty members. Our offline setup encourages relationship-building, creating a supportive community that extends beyond the classroom.

Enjoy seamless access to a range of resources, including libraries, labs, and study spaces. Our offline learning environment provides the tools necessary for comprehensive understanding and research.

Our faculty members bring a wealth of knowledge and practical experience to the classroom. Hailing from diverse backgrounds, they not only possess academic expertise but also offer valuable insights gained from years of industry experience. The combination of their academic and practical knowledge creates a holistic learning environment that prepares students for real-world challenges.

Why iPEC for Offline Learning in India?

iPEC has a history of producing successful graduates who have excelled in their careers.

Our offline learning approach focuses not only on academic excellence but also on the holistic development of each student, nurturing well-rounded professionals.

Stay ahead in your chosen field with our industry-relevant curriculum, constantly updated to align with current trends and demands.

NETWORKING

Networking
Describe characteristics of network topology architectures
Compare physical interface and cabling types
Network Access
Describe switching concepts
Configure and verify inters witch connectivity
Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations
IP Connectivity
IP Routing

* Interpret the components of routing table
* Routing protocol code
* Prefix
* Network mask
* Next hop
* Administrative distance
* Metric
* Gateway of last resort

*Types of Routing
* Describe Static Route
* Describe Dynamic Routing
* Describe RIP
* Configure and Verify and test RIP protocol
* Configure and Verify and test RIP protocol
* Describe EIGRP

IP Services
Security Fundamentals

* Configure and verify inside source NAT using static and pools
* Configure and verify NTP operating in a client and server mode
* Explain the role of DHCP and DNS within the network
* Describe the use of syslog features including facilities and levels with NTP operating and Authentication.
* Configure and verify DHCP server on Router and Switch, client access and DHCP relay Agent.

* Configure device access control using local passwords and
* Differentiate authentication, authorization, and accounting concepts
* Centralized Device Access using TACACS+/RADIUS server
* Configure and verify access control lists and Types
* Configure Layer 2 security features (DHCP snooping, dynamic ARP.Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security).DHCP Snooping Attach configure and test.

Configure and verify single area

* Neighbor adjacencies
* Point-to-point
* Broadcast (DR/BDR selection) 3.4.d Router ID

AWS

* ï Navigate the AWS Management Console
* Recognise AWS Global Infrastructure
* Describe the security measures AWS provides
* Create an Amazon EC2instance
* Remotely connecting to an EC2instance
* Setting up Amazon Linux and Apache webserver
* Browsing Amazon Machine Images(AMI)
* Specifying security groups and key pairs
* Creating new images off of running instances

* Identify key AWS storage options
* Describe Amazon EBS
* Use Amazon EBS with AmazonEC2
* Working with Volumes and snapshots
* Transmitting data in/out of the Amazon cloud

* Implementing a Web server in an Amazon Linux/Windows Instance
* Configure the firewall to access a Webserver

* Securing the Access : Creating a RSA Public/Private Key for VMs
* Creating a software firewall
* Configuring firewall rules
* Securing the access with an Elastic IPs
* Managing users with Identity Access Management(IAM)

* Using EC2 Command Line APIs [from Windows/Linux machines.Creating and using Load Balancers
* Distributing incoming traffic with elastic load balancing
* Dynamically adding and removing instances with Auto Scaling 

* Overview of Monitoring and Setting Alarms
* Visualizing utilization metrics withCloudWatch
* Setting alarms to send and receive notifications

*Using SNS to send Notifications.CreatingBuckets
* CreatingFolders
* UploadingObjects
* Making ObjectsPublic
* CreatingBuckets
* Securing Bucket/Objectaccess
* Configuring a Bucket as Static WebPage
* Controlling Life Cycle of a Bucket
* Accessing Amazon Buckets from Windows/Linux desktops/Servers

* Create a VPC [VPC with a Single Public Subnet]
* Create and attach an Internet gateway* Set up routing in the VPC
* Set up a security group to control the inbound and out bound traffic
* Launch an instance into the subnet
* VPC console to allocate an Elastic IP address and assign it to the instance
* Amazon EC2 console to terminate your instance and the Amazon VPC console to delete your VPC.

* Overview of AWS RDS
* Launching a MySQL Database in RDS
* Creating Backups/Snapshots and Read Only DBs
* Connecting to RDS-DB using local DB-Clients
* Terminating a DB instance

* Creating Groups and Defining access policy
* Creating Users
* Login to AWS account using new users

* Introduction to CloudFormation
* Launching instances in EC2 usingTemplates and Concepts o fAWS-CloudFront
* Host a Website withCloudFront

Simple Policy On EC2 and Load Balancer
* Creating a Failover setup for Load Balancers running in different AWS regions[users need to have a registeredDomain]
* Health Check a private website
* www.apponix.com Registered Office:- Bangalore: 80505-80888 Hubli: 9069980888 Email-id: info@apponix.com

* Using CloudTrial to trail the APICallsHosting Applications with ElasticBeanstalk
* Improving application delivery with Platform as a Service(PaaS)
* Deploying scalable applications on the AWScloud
* Selecting and launching an application environment (sample application in PHPand MySQL)

* Securing the Access : Creating a RSA Public/Private Key for VMs
* Creating a software firewall
* Configuring firewall rules
* Securing the access with an Elastic IPs
* Managing users with Identity Access Management(IAM)

* Overview of AWS DynamoDB
* DynamoDB Tables and NamingConventions
* Data Types inDynamoDB
* DynamoDB CapacityUnits
* ConfiguringAlarms
* Tacking Backup andRestore

* Overview of AWS Lambda
* Creating a Lambda Function withNode.js
* Lambda Pricing & UploadingCode
* Connecting Lambda Functions to API GatewayEndpoints
* Accessing LambdaLogs
* Getting Started with Body MappingTemplates

* Overview of APIGateway
* Create a RESTAPI
* CreateResource
* Create HTTPMethods
* DeployAPI
* Integrating with Lambdafunction

* Overview ofSQS
* Create Standardqueue
* Create FIFOqueue
* With Timer or Delay to a StandardqueueDirectory services (Launching Aws managed AD)
* SSO integration with AD users
Work Email
* Work docks
* Workspaces
* Aws management SSO login

* Run command
* Session Management
* Application Management* 2 and 3 tier web architecture running in EC2 (windows and Linux)
* Multiple Child application Running in EC2 (windows and Linux)
* Light sail implementation
* ECS and ECR launching Docker images
* Understanding of launching On Demand Instances, Reserved, spot, Dedicated Hosts andDedicated Instance

* Securing the web application by using the WAF
* AWS Inspector
* AWS security Manager (SSL/TLS Certificates)
* AWS Shield
* AWS Artifact
* AWS Key Management Service
* Compliance
* Patch Manager* AWS Cost Explorer
* AWS Budgets
* AWS Market place Subscriptions. Simple Email Service 

LINUX

RH124 - Red Hat System Administration

* Introduction and History of UNIX & Linux
* Differences between centos, red hat enterprise linux & fedora
* Difference between UNIX & LINUX & describe and define open source, Linux distributions, and Red Hat Enterprise Linux.

* Download the virtual box and installing in your systems
* Downloading and installing Redhat linux
* Understanding and deep dive into Linux architecture, kernel, interpreter, shells, Memory

POST, BIOS (UEFI), MBR, GRUB(GRUB2),SYSTEMD(initd),RUNLEVELS(TARGET)

* Download the virtual box and installing in your systems
* Downloading and installing Redhat linux
* Understanding and deep dive into Linux architecture, kernel, interpreter, shells, Memory

POST, BIOS (UEFI), MBR, GRUB(GRUB2),SYSTEMD(initd),RUNLEVELS(TARGET)

* Understanding and deep dive into FSHLog into a Linux system and run simple commands using shells
* Understanding the terminals (TTY’s) using the shell
* Identifying the shells and usage of shells.

* Copy, move, create, delete, and organize files while working from the bash shell.
* Understanding the commands to create, move, create, delete, sorting with commands by recursively and forcefully head, more, less, tail, cat commands
* Use input-output redirection

* Resolve problems by using local help systems.
* Help , man commands understanding.
* Technical os support from enterprises linux.

* Manage text files from command output or in a text editor.
* Understanding the vi, vim, gedit, nano editors and their modes
* understanding the inode

* Understanding the hard link and soft links. switching users and accessing the shells.
* Create, manage, and delete local users and groups, as well as administer local password policies.
* Understanding the commands useradd, userdel, usermod, groupadd, groupdell, groupmod, Passwd, gshadow commands and their policies implementation.

* Set Linux file system permissions on files and interpret the security effects of different permission settings
* Understanding the commands chmod, chown, setfacl, getfacl, sticky bits.
* Evaluate and control processes running on a Red Hat Enterprise Linux system & understanding the top, ps, lscpu commands.

* Control and monitor network services and system daemons using system.
* Understanding the systemctl,service commands (status,start,stop,restart,enable modes)

* Configure secure command line service on remote systems, using OpenSSH.
* SSH authentication by using asymmetric method by generating the public key and private key password less authentication modes
* SSH password authentication mode.

* Understanding SFTP, SCP, Rsync commands.
* Understanding the winscp and filezilla.
* understanding the wget and curl commands.

* Locate and accurately interpret logs of system events for troubleshooting purposes & understanding the system logs, user logs etc.
* Configure network interfaces and settings on Red Hat Enterprise Linux servers.
* Understanding iptables, netstat, telnet, ss, ficonfig, nslookup, dig commands

* Archive and copy files from one system to another.
* Understanding the zip, gunzip, buzip, archive(tar) commands
* Understanding the grep, locate, find commands

* Download, install, update, and manage software packages from Red Hat and DNF package repositories.
* Understanding the rpm, yum, wget commands
* Investigate and resolve issues in the web-based management interface, getting support from Red Hat to help solve problems.

* Access, inspect, and use existing file systems on storage attached to a Linux server.
* Understanding the fstab, mtab, blkid commands.
* Review the content covered in this course by completing hands-on exercises.

RH134 - Red Hat System Administration - II

* Understanding the cron jobs, crons, anacron, crontab. Understanding the /proc and top and ps
* Understating the system, memory, IOstat, Network.
* Understanding the virtual memory, system activity reported , iostat,

* Understating the selinux importance in linux & Implementing the selinux modes target, permissive, enabled,disabled,enforcing.
* Understanding the File system and file system types ext2,ext3,ext4 and xfs,btrfs,etc
* Harddisk storage partition and formatting & Understanding the LVM, creating, resizing, extedning, LVM.

* NFS creating ,accessing , deleting.
* Understanding the run levels to limit the boot process.

DevOps

DevOps Introduction

* Why DevOps and roles and responsibilities
* How DevOps and Cloud exists in today’s world
* What is Continuous Integration and Delivery how it’s related to DevOps

Linux

* Linux Introduction, Principles and Linux Distro * Command line utilities and basic commands
* Linux File system introduction
* Text Editors
*Filters and Redirections
* Users & Groups and Permissions

Jenkins

* Introduction to Continuous Integration.
* Build & Release and relation with DevOps
* Why continuous integration
* Jenkins introduction and setup
* Jenkins projects/jobs
* Jenkins plugins
* Jenkins administration
* Users
* Nodes/Salves
* Managing plugins
* Managing Software Versions

Git

* What is version control system?
* Compare Git with others and why is it called Distributed Version Control System?
* Create an Local Git Repositor.
* Operations like commit, pull, push, clone, merge, cherry pick and rebase
* Git Branches and how to use GitHub a remote repository

Maven

* What are build tools?
* GAV Coordinates in Maven
* Build a Java Application using Maven
*Dependency Management
* Plugins as a building block in maven build.
* Building and deploying java web application using maven

Docker and Kubernetes

* Introduction to Docker
* Virtualization and Containerization differences
* Docker Installation
* Docker CLI
* Run your first Docker Container
* Copy Files in the Docker Image
* Docker, Maven and Jenkins
* Tag and share docker images
* Database Installation with Docker Image
* Learning DockerFile
* Creating our own Docker Image
* Docker Networking

Ansible

* Ansible Introduction & Setup Foundation
* Modules and Ad hoc Commands
* YML Scripting
* PlayBook for CM automation
* Roles

Kubernetes

* Introduction to Kubernetes
* Understanding the components of Kubernetes Master ( Control Plane )
* Understanding the components of Kubernetes Node ( Minion )
* Working with Pod
* Elements used in definition file.
* Creating Replication Controller.
* Creating Replica Set.
* Working with Deployment Object
* Creating Service Object

Enroll Now

Fee structure for the program :