Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. Exploring Oracle Database Architecture Introducing Oracle Database Relation Database Models Oracle SQL and PL/SQL Oracle Database Server Architecture Connecting to Oracle Databases Oracle Database Tools Oracle-Supplied User Accounts Querying the Oracle Data Dictionary Managing Database Instances Initialization Parameter Files Starting Up Oracle Databases Shutting Down Oracle Databases Opening and Closing PDBs Working with the Automatic Diagnostic Repository (ADR) Querying Dynamic Performance Views Creating PDBs Methods and Tools to Create PDBs Creating PDBs from Seed with SQL*Plus Cloning PDBs with SQL*Plus Unplugging and Pluggin In PDBs with SQL*Plus Dropping PDBs with SQL*Plus Configuring the Oracle Network Environment Oracle Net Services How Listeners Work Configuring Listeners for Dynamic Service Registration Configuring Listeners for Static Service Registration Configuring Local Naming for Connections Testing Oracle Net Connectivity with tnsping Configuring Communication Between Databases Dedicated Versus Shared Server Configurations Administering User Security Creating Users Granting Privileges Creating and Granting Roles Revoking Privileges and Roles Creating and Assigning Profiles Authenticating Users Assigning Quotas to Users Applying the Principal of Least Privilege Creating and Managing Tablespaces How Table Data is Stored Creating Tablespaces in SQL*Plus Altering and Dropping Tablespaces in SQL*Plus Viewing Tablespace Information in SQL*Plus Implementing Oracle Managed Files Moving and Renaming Online Data Files in SQL*Plus Managing Storage Space Oracle Database Space Management Features Block Space Management Row Chaining and Migration Free Space Management Within Segments Types of Segments Allocating Extents Understanding Deferred Segment Creation Space-Saving Features Managing UNDO Data Undo Data: Overview Transactions and Undo Data Storing Undo Information Comparing Undo Data and Redo Data Managing Undo Local Undo Mode Versus Shared Undo Mode Configuring Undo Retention Categories of Undo Moving Data Moving Data: General Architecture Oracle Data Pump: Overview Oracle Data Pump: Benefits Data Pump Export and Import Clients Data Pump Utility: Interfaces and Modes Data Pump Import: Transformations SQL*Loader Overview Loading Methods Backup and Recovery Concepts DBA Responsibilities Categories of Failure Understanding Instance Recovery Understanding Types of Backups Comparing Complete and Incomplete Recovery Oracle Data Protection Solutions Flashback Technology Monitoring and Tuning Database Performance Managing Performance Activities Performance Planning Considerations Database Maintenance Automatic Workload Repository (AWR) Automatic Database Diagnostic Monitor Performance Monitoring Performance Tuning Methodology Database Server Statistics and Metrics SQL Tuning SQL Tuning Process Oracle Optimizer Optimizer Statistics SQL Plan Directives Adaptive Execution Plans SQL Tuning Advisor SQL Access Advisor SQL Performance Analyzer Oracle Database Resource Manager Oracle Database Resource Manager: Overview Resource Manager Elements Using Resource Manager to Allocate Resources Creating a Simple Resource Plan Creating a Complex Resource Plan Using the Active Session Pool Feature Limiting CPU Utilization at the Database Level Limiting CPU Utilization at the Server Level Enterprise Manager Cloud Control Controlling the Enterprise Manager Cloud Control Framework Starting the Enterprise Manager Cloud Control Framework Stopping the Enterprise Manager Cloud Control Framework Introduction to Oracle Database Cloud Service Oracle Cloud: Overview Database Cloud Service Offerings DBCS Architecture Features and Tooling Additional Database Configuration Options Creating DBCS Database Deployments Automated Database Provisioning Creating a Database Deployment How SSH Key Pairs are Used Creating an SSH Key Pair Storage Used for Database Files Managing DBCS Database Deployments Cloud Tooling Accessing Tools and Features from the DBCS Console Managing the Compute Node Associated With a Database Deployment Managing Network Access to DBCS Enabling Access to a Compute Node Port Scaling a Database Deployment Backing Up and Restoring DBCS Database Deployments Backing Up and Recovering Databases on DBCS Backup Destination Choices Backup Configuration Creating an On-Demand Backup Customizing the Backup Configuration Performing Recovery by Using the Console Performing Recovery by Using the dbaascli Utility Patching DBCS Database Deployments Patching DBCS Using the DBCS Console to Manage Patches Using the dbaascli Utility to Manage Patches Creating Master Encryption Keys for PDBs CDB and PDB Master Encryption Keys Determining Whether You Need to Create and Activate and Encryption Key for a PDB Creating and Activating an Encryption Key Tablespace Encryption by Default Tablespace Encryption by Default in DBCS Transparent Data Encryption (TDE) Overview Components of TDE Using TDE Defining the Keystore Location Controlling Tablespace Encryption by Default Managing the Software Keystore and Master Encryption Key Managing the Keystore in CDBs and PDBs Additional course details: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Administrator Architect Database Administrator Overview To provide an acceptable response time to users and manage resources effectively, you learn how to monitor performance and manage resources within the multitenant container database and its pluggable databases, and within each pluggable database. Another important aspect is the data movement between non-CDBs and pluggable databases, and between pluggable databases. It is also important to understand the procedures of upgrading an Oracle Database multitenant container database or an Oracle Database pluggable database. Finally, students discover the way multitenant container database and pluggable databases are created and monitored in the Cloud. This course covers all aspects of the multitenant architecture, providing detailed information on the components of an Oracle multitenant container database and its regular and application pluggable databases. You learn why and how to create and manage a multitenant container database and its regular and application pluggable databases, with storage structures appropriate for the business applications. You practice cold and hot cloning, plugging unplugged pluggable databases in multitenant container databases using various methods. CDB BasicsCDB and Regular PDBsApplication PDBs and Application InstallationPDB CreationCDB and PDB ManagementStorageSecurityBackup and DuplicateRecovery and FlashbackPerformance MonitoringResources AllocationData MovementUpgrade methods
Duration 5 Days 30 CPD hours This course is intended for Anyone who plans to work with Kubernetes at any level or tier of involvement Any company or individual who wants to advance their knowledge of the cloud environment Application Developers Operations Developers IT Directors/Managers Overview All topics required by the CKAD exam, including: Deploy applications to a Kubernetes cluster Pods, ReplicaSets, Deployments, DaemonSets Self-healing and observable applications Multi-container Pod Design Application configuration via Configmaps, Secrets Administrate cluster use for your team A systematic understanding of Kubernetes architecture Troubleshooting and debugging tools Kubernetes networking and services Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container orchestration. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability Kubernetes environment (and later, build your own!) capable of demonstrating all ?K8s'' features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. Kubernetes Architecture Components Understand API deprecations Containers Define, build and modify container images Pods Master Services Node Services K8s Services YAML Essentials Creating a K8s Cluster kubectl Commands Kubernetes Resources Kubernetes Namespace Kubernetes Contexts Pods What is a Pod? Create, List, Delete Pods How to Access Running Pods Kubernetes Resources Managing Cloud Resource Consumption Multi-Container Pod Design Security Contexts Init Containers Understand multi-container Pod design patterns (e.g. sidecar, init and others) Pod Wellness Tracking Networking Packet Forwarding ClusterIP and NodePort Services Provide and troubleshoot access to applications via services Ingress Controllers Use Ingress rules to expose applications NetworkPolicy resource Demonstrate basic understanding of NetworkPolicies Network Plugins Defining the Service Mesh Service mesh configuration examples ReplicaSets Services ReplicaSet Function Deploying ReplicaSets Deployments Deployment Object Updating/Rolling Back Deployments Understand Deployments and how to perform rolling updates Deployment Strategies Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) Scaling ReplicaSets Autoscaling Labels and Annotations Labels Annotations Node Taints and Tolerations Jobs The K8s Job and CronJob Understand Jobs and CronJobs Immediate vs. scheduled internal use Application Configuration Understanding and defining resource requirements, limits and quotas Config Maps Create & consume Secrets Patching Custom Resource Definition Discover and use resources that extend Kubernetes (CRD) Managing ConfigMaps and Secrets as Volumes Storage Static and dynamic persistent volumes via StorageClass K8s volume configuration Utilize persistent and ephemeral volumes Adding persistent storage to containers via persistent volume claims Introduction to Helm Helm Introduction Charts Use the Helm package manager to deploy existing packages Application Security Understand authentication, authorization and admission control Understand ServiceAccounts Understand SecurityContexts Application Observability and Maintenance Use provided tools to monitor Kubernetes applications How to Troubleshoot Kubernetes Basic and Advanced Logging Techniques Utilize container logs Accessing containers with Port-Forward Debugging in Kubernetes Hands on Labs: Define, build and modify container images Deploy Kubernetes using Ansible Isolating Resources with Kubernetes Namespaces Cluster Access with Kubernetes Context Listing Resources with kubectl get Examining Resources with kubectl describe Create and Configure Basic Pods Debugging via kubectl port-forward Imperative vs. Declarative Resource Creation Performing Commands inside a Pod Understanding Labels and Selectors Insert an Annotation Create and Configure a ReplicaSet Writing a Deployment Manifest Perform rolling updates and rollbacks with Deployments Horizontal Scaling with kubectl scale Implement probes and health checks Understanding and defining resource requirements, limits and quotas Understand Jobs and CronJobs Best Practices for Container Customization Persistent Configuration with ConfigMaps Create and Consume Secrets Understand the Init container multi-container Pod design pattern Using PersistentVolumeClaims for Storage Dynamically Provision PersistentVolumes with NFS Deploy a NetworkPolicy Provide and troubleshoot access to applications via services Use Ingress rules to expose applications Understand the Sidecar multi-container Pod design pattern Setting up a single tier service mesh Tainted Nodes and Tolerations Use the Helm package manager to deploy existing packages A Completed Project Install Jenkins Using Helm and Run a Demo Job Custom Resource Definitions (CRDs) Patching Understanding Security Contexts for Cluster Access Control Utilize container logs Advanced Logging Techniques Troubleshooting Calicoctl Deploy a Kubernetes Cluster using Kubeadm Monitoring Applications in Kubernetes Resource-Based Autoscaling Create ServiceAccounts for use with the Kubernetes Dashboard Saving Your Progress With GitHub CKAD Practice Drill Alta Kubernetes Course Specific Updates Sourcing Secrets from HashiCorp Vault Example CKAD Test Questions
Duration 2 Days 12 CPD hours This course is intended for The audience for this course is data professionals and data architects who want to learn about migrating data platform technologies that exist on Microsoft Azure and how existing SQL based workloads can be migrated and modernized. The secondary audience for this course is individuals who manage data platforms or develop applications that deliver content from the existing data platform technologies. Overview Understand Data Platform Modernization Choose the right tools for Data Migration Migrate SQL Workloads to Azure Virtual Machines Migrate SQL Workloads to Azure SQL Databases Migrate SQL Workloads to Azure SQL Database Managed Instance In this course, the students will explore the objectives of data platform modernization and how it is suitable for given business requirements. They will also explore each stage of the data platform modernization process and define what tasks are involved at each stage, such as the assessment and planning phase. Students will also learn the available migration tools and how they are suitable for each stage of the data migration process. The student will learn how to migrate to the three target platforms for SQL based workloads; Azure Virtual Machines, Azure SQL Databases and Azure SQL Database Managed Instances. The student will learn the benefits and limitations of each target platform and how they can be used to fulfil both business and technical requirements for modern SQL workloads. The student will explore the changes that may need to be made to existing SQL based applications, so that they can make best use of modern data platforms in Azure. Introducing Data Platform Modernization Understand Data Platform Modernization Understanding the stages of migration Data Migration Paths Choose the right tools for Data Migration Discover the Database Migration Guide Build your data estate inventory using Map Toolkit Identify Migration candidates using Data Migration Assistant Evaluate a Data workload using Database Experimentation Assistant Data Migration using Azure Database Migration Service Migrate non-SQL Server workloads to Azure using SQL Migration Assistant Migrating SQL Workloads to Azure Virtual Machines Considerations of SQL Server to Azure VM Migrations SQL Workloads to Azure VM Migration Options Implementing High Availability and Disaster Recovery Scenarios Migrate SQL Workloads to Azure SQL Databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL DB offline Migrate SQL Server to Azure SQL DB online Load and Move data to Azure SQL Database Migrate SQL Workloads to Azure SQL Database Managed Instance Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed instance Load and Move data to SQL Database Managed instance Application Configuration and Optimization
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE) Overview In this course, you will learn to: Design and implement a secure network infrastructure Design and implement compute security Design and implement a logging solution Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise. Module 1: AWS Security Overview Shared responsibility model Customer challenges Frameworks and standards Establishing best practices Compliance in AWS Module 2: Securing the Network Flexible and secure Security inside the Amazon Virtual Private Cloud (Amazon VPC) Security services Third-party security solutions Module 3: Amazon EC2 Security Compute hardening Amazon Elastic Block Store (EBS) encryption Secure management and maintenance Detecting vulnerabilities Using AWS Marketplace Module 4: Monitoring and Alerting Logging network traffic Logging user and Application Programming Interface (API) traffic Visibility with Amazon CloudWatch Enhancing monitoring and alerting Verifying your AWS environment Additional course details: Nexus Humans AWS Security Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Machine literacy in data wisdom is a fleetly expanding discipline and now is the crucial element. This groundbreaking field equips computers and systems with the capacity to learn from data and ameliorate their performance over time without unequivocal programming. Statistical ways are employed to train algorithms to produce groups or prognostications and to find significant findings in data mining systems. immaculately, the conclusions made from these perceptivity impact crucial growth pointers in operations and companies. What's Machine Learning? . Machine learning classes in pune The machine literacy term was chased by Arthur Samuel in 1959. It's the discipline solely concentrated on studying and erecting tools and ways that can let machines learn. These styles use data to enhance the computer performance of a particular set of tasks. Machine literacy algorithms induce prognostications or possibilities and produce a model grounded on data samples, also called training data. There's a need for machine literacy as these algorithms are applied in a broad range of operations, for illustration, computer vision, dispatch filtering, speech recognition, husbandry, and drugs, where it's a challenge to produce traditional algorithms that can negotiate the needed tasks. orders in Machine Learning Being such a vast and complicated field, machine literacy is divided into three different orders machine literacy orders Supervised literacy – In this system, the algorithm is trained using data that has been labeled and in which the target variable or asked result is known. Once trained, the algorithm may make prognostications grounded on unidentified information by learning how to associate input variables with the willed affair. Unsupervised literacy – In this case, the algorithm is trained on unlabeled data, and its thing is to discover structures or patterns within the data without having a specific target variable in mind. Common unsupervised literacy tasks include dimensionality reduction and clustering. underpinning literacy – An algorithm is trained via relations with the terrain in this type of literacy. The algorithm learns how to operate in order to maximize a price signal or negotiate a particular ideal. Through prices or penalties, it receives feedback that helps it upgrade its decision-making process. Artificial Intelligence and Machine Learning Artificial intelligence( AI) is divided into several subfields, and machine literacy( ML) is one of them. In order to produce intelligent machines that can pretend mortal intelligence, a variety of methodologies, approaches, and technologies are used. This notion is known as artificial intelligence( AI). The development of ways and models that allow computers to acquire knowledge from data and make recommendations or judgments without unequivocal programming is the focus of machine literacy( ML). Some academics were interested in the idea of having machines learn from data in the early stages of AI as an academic field. They tried to approach the issue using colorful emblematic ways and neural networks. They were primarily perceptrons, along with other models that were ultimately discovered to be reimaginings of the generalized direct models of statistics. For this case, you aim to make a system secerning cows and tykes. With the AI approach, you'll use ways to make a system that can understand the images with the help of specific features and rules you define. Machine literacy models will bear training using a particular dataset of pre-defined images. You need to give numerous farmlands of cows and tykes with corresponding markers. Why is Machine Learning Important? Machine literacy is an abecedarian subfield of artificial intelligence that focuses on assaying and interpreting patterns and structures in data. It enables logic, literacy, and decision-making outside of mortal commerce. The significance of machine literacy is expanding due to the extensively more expansive and more varied data sets, the availability and affordability of computational power, and the availability of high-speed internet. It facilitates the creation of new products and provides companies with a picture of trends in consumer geste and commercial functional patterns. Machine literacy is a high element of the business operations of numerous top enterprises, like Facebook, Google, and Uber. Prophetic Analytics Machine learning course in pune Machine literacy makes prophetic analytics possible by using data to read unborn results. It's salutary in the fields of finance, healthcare, marketing, and logistics. Associations may prognosticate customer growth, spot possible troubles, streamline operations, and take visionary action to ameliorate results using prophetic models. Personalization and recommendation systems Machine literacy makes recommendation systems and substantiated gests possible, impacting every aspect of our diurnal lives. Platforms like Netflix, Amazon, and Spotify use machine literacy algorithms to comprehend stoner preferences and offer substantiated recommendations. Personalization boosts stoner pleasure and engagement while promoting business expansion. Image and speech recognition Algorithms for machine literacy are particularly good at jobs like speech and picture recognition. Deep literacy, a branch of ML, has converted computer vision and natural language processing. It makes it possible for machines to comprehend, dissect, and produce visual and audio input. This technology is helpful for driverless vehicles, surveillance, medical imaging, and availability tools, among other effects. Machine learning training in pune
Arе you sееking top-notch DеvOps training in Chеnnai that sеts you on thе path to succеss? Look no furthеr! Our comprеhеnsivе DеvOps training program in Chеnnai is dеsignеd to еquip you with thе еssеntial skills and knowlеdgе nееdеd to еxcеl in thе world of DеvOps. With a dеdicatеd focus on practical hands-on еxpеriеncе, our еxpеrt instructors will guidе you through thе intricaciеs of DеvOps mеthodologiеs, tools, and bеst practicеs
Duration 4 Days 24 CPD hours This course is intended for Senior Linux system administrators responsible for maximizing resource utilization through performance tuning. Overview Analyze and tune for resource-specific scenarios Applying tuning profiles with the tuned tool Tune in virtual environments (hosts and guests) Trace and profile system events and activities Tune resource limits and utilization using systemd-integrated cgroups Gather performance metrics and benchmarking data Red Hat© Enterprise Performance Tuning is designed to teach senior Linux© system administrators the methodology of performance tuning for Red Hat Enterprise Linux. This course discusses system architecture with an emphasis on understanding the implications of system architecture on system performance, methods for testing the effects of performance adjustments, open source benchmarking utilities, methods for analyzing system and networking performance, and tuning configurations for specific application loads. Prerequisites Become a Red Hat Certified Engineer (RHCE©), or demonstrate equivalent experience 1 - Introduction to performance tuning Understand the basic principles of performance tuning and analysis. 2 - Collecting, graphing, and interpreting data Gain proficiency in using basic analysis tools and in evaluating data. 3 - General tuning Learn basic tuning theory and mechanisms used to tune the system. 4 - Hardware profiling Understand and analyze hardware. 5 - Software profiling Analyze CPU and memory performance of applications. 6 - Mail server tuning Learn about basic storage tuning using an email server as an example. 7 - Large memory workload tuning Understand memory management and tuning. 8 - HPC workload tuning HPC workload tuning 9 - File server tuning Understand storage and network tuning in the context of a file server application. 10 - Database server tuning Tune memory and network performance using a database application as an example. 11 - Power usage tuning Tune systems with power consumption in mind. 12 - Virtualization tuning Tune ?host? and ?guest? for efficient virtualization.
Duration 4 Days 24 CPD hours This course is intended for This course is designed for those who have little or no experience with Linux and whoare seeking a fundamental understanding of the SUSE Linux Enterprise 15 operatingsystem. It is also ideal for those who want to begin preparing for the SUSE CertifiedAdministrator in Enterprise Linux 15 certification exam. Overview Attendees will be taught the following concepts and skills that are fundamental inadministering the SLES Operating System:Install SLES 15 and perform basic Linux configurationBecome familiar with the command line interface & commonly usedcommandsConfigure and use Remote AdministrationManage the boot process and understand systemsManage processes and jobsManage users and permissionsManage softwareConfigure basic networkingManage storageMonitor SUSE Linux Enterprise This course is designed for those who are seeking a fundamental understanding of the SUSE Linux Enterprise Server (SLES) operating system.Students will be able to install and configure a SLES 15 server and integrate it into an existing network. They will be able to perform the most important system administration tasks. Overview of SUSE Linux Enterprise Flavors of SUSE Linux SLE Maintenance Model YaST The Linux Filesystem Understand the Filesystem Hierarchy Standard (FHS) Understand the Linux File Types Work with the Command Line Getting Help at the Command Line Understand the Shell Environment The Vim EditorRemote Administration Understand Remote Administration with OpenSSH Understand Remote Administration with VNC System Initialization Understand the Boot Process Understand the GRUB2 Boot Loader Define and Describe systems Process Management Understand Process Administration Understand Background Processes Understand Process Scheduling Understand xinet Identify and Security Understand User Management Understand Filesystem Permissions Understand Privilege Delegation Software Management Understand Compiling Software from Source Understand Management of RPM Packages Understand Software Management with Libzypp Network Management Understand Network Management in SLE Understand Network Management with Wicked Understand firewall Storage Management Understand the Linux I/O Stack Recognize Traditional Linux File Systems Configure Logical Volume Management (LVM) Configure Software RAID Define and Describe BtrFS Understand NFSv4 Administration and Monitoring Understand Time Sync with chrony Configure System Logging Understand Supportconfig Installing SUSE Linux Enterprise Understand the Unified Installer Understand Extensions and Modules Understand AutoYaST