Pluralsight Network Insight.

observability

Red Hat Certified Specialist in Advanced Automation: Ansible Core

This course will teach you advanced Ansible automation techniques.

Securing an OpenShift Cluster

This course will teach you how to implement security in OpenShift.

Implementing Networking in OpenShift

This course will teach you how to implement networking in OpenShift.

Implementing Docker Security

Docker Containers pose a new type of attack surface and security risk to organizations. This course will teach you how to implement Docker Security.

DevOps Foundations: Operational Strategies

This course will teach you the core skills required to implement the DevOp Operational strategies.

Cisco DEVOPS 300-910: Logging, Monitoring, and Metrics

This course will teach you the core skills required to setup and maintain logging, monitoring and metric in a DevOps environments.

Troubleshooting Cisco ACI

This course will teach you how to efficiently troubleshoot the ACI fabric along with the deployment and migrations stages.

Implementing Cisco ACI

In this course, you'll gain knowledge about Implementing Cisco ACI solution and the various ways to optimize the Cisco ACI. The ACI is Cisco's approach to SDN in the data center and is based on a leaf-spine and VXLAN overlay topology.

Designing and Architecting the Cisco ACI

In this course, you'll gain knowledge about the Cisco ACI solution, its core features, and new concepts. The ACI is Cisco's approach to SDN in the data center and is based on a leaf-spine and VXLAN overlay topology.

Designing Cisco SD-WAN Architecture and Components

In this course, you'll gain knowledge about the Cisco SD-WAN solution, its core features, and various use cases. The Cisco SD-WAN is a distributed architecture based consisting of a number of new SD-WAN protocols and components.

SD-WAN Architectures: The Big Picture

In this course, you will gain knowledge about the various SD-WAN architectures, core features, and why we need it. SD-WAN virtualizes the WAN and makes it more agile to be in tune with today's application requirements.

Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture

In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.

Zero Trust Networking (ZTN): The Big Picture

Essentially, with Zero Trust Networking, the network is entirely dark to everything and everyone until the administrator turns the lights on. You will go through technologies and introduced to new networking and security architectures.