Final Exam: DevOps Engineer will test your knowledge and application of the topics presented throughout the DevOps Engineer track of the Skillsoft Aspire Enterprise Developer to DevOps Engineer Journey.
backup and restore the configuration to manage Docker Enterprise and work with telemetry plugin in Docker Enterprise
build, deploy and scale a Multi-OS application to Docker Enterprise using Swarm
compare DevOps and DevSecOps and describe the benefits of adopting the DevSecOps paradigm
create and share custom dashboards, build charts, query data and explore data using the New Relic Logs UI
define alert policies for Incident Management using New Relic
define the concept of DevOps Feedback Loop and identify the maturity model curve to build well-defined feedback mechanisms in DevOps lifecycle
define the concept of Infrastructure as Code and list the prominent tools we can use to implement Infrastructure as Code applying best principles to manage provisioning of Infrastructure for scaling DevOps
define the roadmap for building modern applications and illustrate the steps and benefits of implementing containerization using Docker
demonstrate the various approach of using UCP Logs in Docker Enterprise
describe DevSecOps tools that are used by development teams to integrate security throughout the DevOps pipeline
describe how security and testing can be integrated into a DevSecOps environment without compromising speed, security, or quality
describe policy requirements and the guidelines that set the implementation standard for the security requirements specified in the baseline IT security policy
describe the implementation of continuous security in DevOps pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing security
identify the various types of application whitelisting and the steps involved in planning and implementing whitelisting
install and configure OpenShift container platform to manage IT infrastructure and evaluate its enterprise applicability
install and configure Trac to build a wiki and issue tracking system for software development projects
install Grafana and add CloudWatch as a data source to build dashboards for CloudWatch metrics
integrate Issue Tracking tools with Datadog to create issues from triggered alerts in Datadog
list the categories of tools provided by OWASP to secure applications
list the essential elements of Feedback Loop and compare Positive and Negative Feedback Loops with the use of real-time examples or use cases
list the essential phases of the DevSecOps workflow and describe the critical checklists that can help secure DevOps implementations
list the features of Relic APM that provide better end-to-end visibility of applications
list the general guidelines and recommendations for implementing containerization
list the key features and factors that we need to consider when adopting DevOps in scaling environments
list the prominent DevOps tools that we can use to build DevOps pipelines to manage infrastructure at scale with focus on DevOps automation
list the prominent tools that we can use to implement Feedback Loops, enable Continuous monitoring and help teams to track and respond
list the various different approaches of building architecture to setup DevOps pipelines
list the various different approaches of building architecture to setup DevOps pipelines at scale
list various types of Monitors that we can use to implement Feedback Loops and create action plans to maintain system robustness
manage Docker images locally and remotely on container registry
recall the approaches of implementing DevOps that adheres to all essential principles and patterns of DevOps
recall the approach of securing Docker Enterprise and list the security best practices that we need to adopt to eliminate risks
recall the critical complexities that can impact enterprise systems along with the role of DevOps in eliminating and building a stable system
recall the key products and services of Docker Enterprise Edition and along with their associated features
recall the phases of DevOps lifecycle and illustrate the benefit of implementing Feedback Loops in each phase of the DevOps lifecycle
recall the primary goals of adopting DevOps practices in the enterprise along with its impact on people, process and product
recall the prominent tools that we can use to log, monitor and configure alerts to watch scaling DevOps architectures
recall the tools and processes that can be used to apply security for DevOps-compliant processes in order to manage intrusion and incident responses
recognize the benefits of Audit logs along with various log levels that we can configure using Docker Enterprise to capture security-relevant activities
recognize the best practices that we need to adopt while creating and implementing Feedback Loops in Devops with the objective of Continuous improvement
recognize the challenges in provisioning right Levels of Operational Maturity and the key factors to evolve Provisioning practices that need to be integrated into DevOps workflow
recognize the essential DevOps metrics that we can use to evaluate successful implementation of DevOps practices
recognize the essential features of Application Lifecycle Management with focus on the various phases of Application Lifecycle Management
recognize the need for applying test-driven security on applications, infrastructure, and automated DevOps pipelines
recognize the potential challenges in implementing scaling DevOps architectures and illustrate the impact of DevOps adoption on businesses
recognize the prominent tools that we can use for feedback monitoring and building alerts to implement Continuous Feedback Loops in DevOps lifecycle
recognize the role of security in DevOps when building and developing the DevOps workflow to implement CI/CD processes
recognize the standard approach of setting up teams to manage projects at scale with a focus on adopting Agile and DevOps standards
recognize the steps involved in implementing mature a DevOps security model that can help assess risks and facilitate continuous security
recognize the tools provided by Grafana Labs to query, visualize, alert on and understand metrics
set up and configure hosted Docker Enterprise
set up Continuous build and Continuous integration to manage DevOps architecture at scale
setup New Relic and explore the capabilities of New Relic using the New Relic dashboard
use git-secret to manage secure commits in the repository
use New Relic to retrieve monitoring data from AWS accounts
use New Relic to retrieve monitoring data from AWS accounts securely
use New Relic to securely retrieve monitoring data from AWS accounts
use PentestTool to conduct penetration testing on deployed application to identify vulnerabilities
use Sentry to monitor errors and help all software teams discover and prioritize errors real-time
work with Datadog and set up Agents to collect metrics and events from the systems and applications