Final Exam: DevOps Engineer


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Final Exam: DevOps Engineer will test your knowledge and application of the topics presented throughout the DevOps Engineer track of the Skillsoft Aspire Enterprise Developer to DevOps Engineer Journey.



Expected Duration (hours)
0.0

Lesson Objectives

Final Exam: DevOps Engineer

  • backup and restore the configuration to manage Docker Enterprise and work with telemetry plugin in Docker Enterprise
  • build, deploy and scale a Multi-OS application to Docker Enterprise using Swarm
  • compare DevOps and DevSecOps and describe the benefits of adopting the DevSecOps paradigm
  • create and share custom dashboards, build charts, query data and explore data using the New Relic Logs UI
  • define alert policies for Incident Management using New Relic
  • define the concept of DevOps Feedback Loop and identify the maturity model curve to build well-defined feedback mechanisms in DevOps lifecycle
  • define the concept of Infrastructure as Code and list the prominent tools we can use to implement Infrastructure as Code applying best principles to manage provisioning of Infrastructure for scaling DevOps
  • define the roadmap for building modern applications and illustrate the steps and benefits of implementing containerization using Docker
  • demonstrate the various approach of using UCP Logs in Docker Enterprise
  • describe DevSecOps tools that are used by development teams to integrate security throughout the DevOps pipeline
  • describe how security and testing can be integrated into a DevSecOps environment without compromising speed, security, or quality
  • describe policy requirements and the guidelines that set the implementation standard for the security requirements specified in the baseline IT security policy
  • describe the implementation of continuous security in DevOps pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing security
  • identify the various types of application whitelisting and the steps involved in planning and implementing whitelisting
  • install and configure OpenShift container platform to manage IT infrastructure and evaluate its enterprise applicability
  • install and configure Trac to build a wiki and issue tracking system for software development projects
  • install Grafana and add CloudWatch as a data source to build dashboards for CloudWatch metrics
  • integrate Issue Tracking tools with Datadog to create issues from triggered alerts in Datadog
  • list the categories of tools provided by OWASP to secure applications
  • list the essential elements of Feedback Loop and compare Positive and Negative Feedback Loops with the use of real-time examples or use cases
  • list the essential phases of the DevSecOps workflow and describe the critical checklists that can help secure DevOps implementations
  • list the features of Relic APM that provide better end-to-end visibility of applications
  • list the general guidelines and recommendations for implementing containerization
  • list the key features and factors that we need to consider when adopting DevOps in scaling environments
  • list the prominent DevOps tools that we can use to build DevOps pipelines to manage infrastructure at scale with focus on DevOps automation
  • list the prominent tools that we can use to implement Feedback Loops, enable Continuous monitoring and help teams to track and respond
  • list the various different approaches of building architecture to setup DevOps pipelines
  • list the various different approaches of building architecture to setup DevOps pipelines at scale
  • list various types of Monitors that we can use to implement Feedback Loops and create action plans to maintain system robustness
  • manage Docker images locally and remotely on container registry
  • recall the approaches of implementing DevOps that adheres to all essential principles and patterns of DevOps
  • recall the approach of securing Docker Enterprise and list the security best practices that we need to adopt to eliminate risks
  • recall the critical complexities that can impact enterprise systems along with the role of DevOps in eliminating and building a stable system
  • recall the key products and services of Docker Enterprise Edition and along with their associated features
  • recall the phases of DevOps lifecycle and illustrate the benefit of implementing Feedback Loops in each phase of the DevOps lifecycle
  • recall the primary goals of adopting DevOps practices in the enterprise along with its impact on people, process and product
  • recall the prominent tools that we can use to log, monitor and configure alerts to watch scaling DevOps architectures
  • recall the tools and processes that can be used to apply security for DevOps-compliant processes in order to manage intrusion and incident responses
  • recognize the benefits of Audit logs along with various log levels that we can configure using Docker Enterprise to capture security-relevant activities
  • recognize the best practices that we need to adopt while creating and implementing Feedback Loops in Devops with the objective of Continuous improvement
  • recognize the challenges in provisioning right Levels of Operational Maturity and the key factors to evolve Provisioning practices that need to be integrated into DevOps workflow
  • recognize the essential DevOps metrics that we can use to evaluate successful implementation of DevOps practices
  • recognize the essential features of Application Lifecycle Management with focus on the various phases of Application Lifecycle Management
  • recognize the need for applying test-driven security on applications, infrastructure, and automated DevOps pipelines
  • recognize the potential challenges in implementing scaling DevOps architectures and illustrate the impact of DevOps adoption on businesses
  • recognize the prominent tools that we can use for feedback monitoring and building alerts to implement Continuous Feedback Loops in DevOps lifecycle
  • recognize the role of security in DevOps when building and developing the DevOps workflow to implement CI/CD processes
  • recognize the standard approach of setting up teams to manage projects at scale with a focus on adopting Agile and DevOps standards
  • recognize the steps involved in implementing mature a DevOps security model that can help assess risks and facilitate continuous security
  • recognize the tools provided by Grafana Labs to query, visualize, alert on and understand metrics
  • set up and configure hosted Docker Enterprise
  • set up Continuous build and Continuous integration to manage DevOps architecture at scale
  • setup New Relic and explore the capabilities of New Relic using the New Relic dashboard
  • use git-secret to manage secure commits in the repository
  • use New Relic to retrieve monitoring data from AWS accounts
  • use New Relic to retrieve monitoring data from AWS accounts securely
  • use New Relic to securely retrieve monitoring data from AWS accounts
  • use PentestTool to conduct penetration testing on deployed application to identify vulnerabilities
  • use Sentry to monitor errors and help all software teams discover and prioritize errors real-time
  • work with Datadog and set up Agents to collect metrics and events from the systems and applications
  • Course Number:
    it_fedoen_04_enus

    Expertise Level
    Intermediate