seela logo

Virtualization

Virtualization is an essential element in the design of Information Systems, and allows for an improvement in the management and deployment of machines. Learn the techniques of deployment, containment and hybridization that are specific to it.

Generalities Virtualization

3 Lessons - 40 min

Learn the fundamentals of virtualization concepts.

01 Course introduction

An introduction to cybersecurity

This module explains the differences between virtualization techniques.

Operating system virtualization is the technique of running multiple operating systems on a single host at the same time as if they were running on separate hosts. This is called Virtual Machines (VM).

💡Virtualization is both software and hardware.

02. Virtualization techniques

20 minutes

An introduction to cybersecurity

03. KVW Kernel-based Virtual Machine

20 minutes

An introduction to cybersecurity

Vmware

1 Lesson - 15 min

Capacity management

01. VMWARE Vsphere Creation, deployment and use of virtual machines

15 minutes

An introduction to cybersecurity

Openstack

11 Lessons - 315 min

OpenStack is a set of open source software for deploying cloud computing infrastructures

01 Course introduction

An introduction to cybersecurity

02. OpenStack the private laaS but also public cloud

30 min.

An introduction to cybersecurity

03. Core services

30 min.

An introduction to cybersecurity

04. The #1 OpenStack deployments (excluding DevStack - TripleO - Ironic)

30 min.

An introduction to cybersecurity

05. OpenStack deployments N°2 DevStack - TripleO - Ironic)

20 minutes

An introduction to cybersecurity

06. The OpenStack Foundation

30 min.

An introduction to cybersecurity

07. OpenStack Architectures

45 minutes

An introduction to cybersecurity

08. Neutron services

30 min.

An introduction to cybersecurity

09. High availability with Neutron

30 min.

An introduction to cybersecurity

10. The Keystone Service

35 min

An introduction to cybersecurity

11. The Neutron VPNaaS service

35 min

An introduction to cybersecurity

Docker

26 Lessons - 605 min

Docker 's approach to containerization is based on application decomposition: that is, the ability to repair or update a portion of an application without disabling the entire application.

01 Course introduction

An introduction to cybersecurity

02. Containerization namespaces, cgroups & rootfs

20 minutes

An introduction to cybersecurity

03. LXC container runtimes

20 minutes

An introduction to cybersecurity

04. Introduction to Docker

20 minutes

An introduction to cybersecurity

05. Life cycle of a container

20 minutes

An introduction to cybersecurity

06. Docker Compose

45 minutes

An introduction to cybersecurity

07. Create and store custom images 

25 min

An introduction to cybersecurity

08. Security - Part 1

25 min

An introduction to cybersecurity

09. Security - Part 2

40 minutes

An introduction to cybersecurity

10. Docker networking

45 minutes

An introduction to cybersecurity

11. Docker API & Web_Services

35 min

An introduction to cybersecurity

12. Lightweight Docker images

35 min

An introduction to cybersecurity

13. Docker Swarm - Part 1

25 min

An introduction to cybersecurity

14. Docker Swarm - Part 2

25 min

An introduction to cybersecurity

15. Docker Swarm - Part 3

25 min

An introduction to cybersecurity

16. Alpine Linux

20 minutes

An introduction to cybersecurity

17. Play with Docker

15 minutes

An introduction to cybersecurity

18. Download and start images

10 min.

An introduction to cybersecurity

19. Interactive mode

10 min.

An introduction to cybersecurity

20. Starting an Nginx Container

10 min.

An introduction to cybersecurity

21. Create and use volumes

15 minutes

An introduction to cybersecurity

22. Network connections

15 minutes

An introduction to cybersecurity

23. Create a custom image

15 minutes

An introduction to cybersecurity

24. Local Registry

15 minutes

An introduction to cybersecurity

25. Docker Compose

15 minutes

An introduction to cybersecurity

26. Docker networking

60 minutes

An introduction to cybersecurity

Mail

information@seela.io