Course Overview

The Container Adoption Boot Camp (DO700) is for those seeking to make a quantum leap in their journey toward digital transformation. Making this shift involves developing software in tight iterations so that business value can be realized sooner. In order to accomplish this goal, this offering can facilitate the adoption of container-native applications, including microservices.

– Introduction to Containers, Kubernetes, and Red Hat OpenShift

– Configuring a Red Hat OpenShift cluster

– Describing advanced features of Red Hat OpenShift

– Containerizing software applications

– Developing microservices with MicroProfile

– Developing microservices with Red Hat® OpenShift Application Runtimes

Course Objectives

Impact on the organization

Microservices are a new alternative to designing modern applications, focused on working with less hardware resources and, therefore, reducing infrastructure costs. Many organizations are struggling with how to make the move from monolithic applications to applications based on microservices, as well as how to reorganize their development paradigm to reap the benefits of microservice development in a DevOps economy. In particular, many organizations are invested in Java programming frameworks and OpenShift.

This curriculum is intended to develop the skills needed to create microservices architectures using Red Hat OpenShift Container Platform, a cloud solution that leverages the usage of microservices running on containers. The curriculum develops the skills needed to install, configure, and manage OpenShift to deploy containerized applications that are highly available, resilient, and scalable. You will learn to containerize software applications and efficiently deploy them to an OpenShift cluster, allowing you to take advantage of a platform and architecture that fosters DevOps principles in your organization.

Red Hat has created this course in a way intended to benefit our customers, but each company and infrastructure is unique, and actual results or benefits may vary.

Impact on the individual

As a result of attending this course, you should be able to configure and manage a Red Hat OpenShift Container Platform cluster and know how to develop, monitor, test, and deploy microservice-based Java EE applications using Wildfly Swarm and OpenShift.

You should be able to demonstrate these skills:

  • Create containerized services using Docker.
  • Manage containers and container images.
  • Create custom container images.
  • Deploy containerized applications on Red Hat OpenShift.
  • Deploy multi-container applications.
  • Install Red Hat OpenShift Container Platform to create a simple cluster.
  • Configure and manage Red Hat OpenShift masters and nodes.
  • Secure Red Hat OpenShift with a simple internal authentication mechanism.
  • Control access to resources on Red Hat OpenShift.
  • Deploy applications on Red Hat OpenShift using source-to-image facility.
  • Configure and manage Red Hat OpenShift pods, services, routes, secrets, and other resources.
  • Deploy applications to a Red Hat OpenShift cluster and manage them with the command-line client and the web console.
  • Design and build containers for applications for successful deployment to a Red Hat OpenShift cluster.
  • Publish container images to an enterprise registry.
  • Build containerized applications using the source-to-image facility.
  • Create applications using Red Hat OpenShift templates.
  • Extract a service from a monolithic application and deploy it to the cluster as a microservice.
  • Migrate applications to run on a Red Hat OpenShift cluster.
  • Design a microservices-based architecture for an enterprise application.
  • Implement fault tolerance and health checks for microservices.
  • Secure microservices to prevent unauthorized access.

Course Content

Create custom container images

Create containers, manage containers, and manage container images.


Deploy containerized applications

Customize containers and deploy on Red Hat OpenShift.


Troubleshoot containerized applications

Troubleshoot Red Hat OpenShift deployments.


Explore Red Hat OpenShift networking concepts

Describe Red Hat OpenShift networking concepts and troubleshoot with CLI.


Manage Red Hat OpenShift resources

Control access to Red Hat OpenShift resources, implement persistent storage, and manage application deployments.


Containerize applications

Understand deployment methods, designing containers, and integrated registry and image streams.


Manage application deployments

Manage advanced application deployments and Red Hat OpenShift templates.


Design a highly available cluster

Design and install a highly available cluster, custom certificates, and log aggregation, in addition to gaining an understanding of Gluster container-native storage, managing system resources, and configuring advanced networking.


Implement microservice architecture

Describe microservice architectures, deploy microservices, and implement with MicroProfile.


Test microservices

Run microservices, inject configuration data, and perform health checks.


Implement fault tolerance

Apply fault tolerance, develop an API gateway for a series of microservices, and secure with JWT.


Secure microservices with JWT

Use the JSON Web Token specification to secure a microservice.


Create microservices with Red Hat OpenShift Application Runtimes

Receive an introduction to OpenShift Application Runtimes and Fabric8.


Install Red Hat OpenShift Container Platform

Install, monitor, and manage OpenShift Container Platform.


Customize source-to-image builds

Tailor source-to-image builds and migrate applications to Red Hat OpenShift.


Develop and deploy runtimes

Employ the WildFly Swarm, Vert.x, and Spring Boot runtimes to develop and deploy microservices.


Monitor microservices

Track the operation of a microservice using metrics, distributed tracing, and log aggregation.

Course Overview

This 2 day course is designed to provide skills enablement for system administrators and product support specialists in the area of operating system based virtualization provided by Linux containers. Topics include introduction to Podman, Buildah, Docker, Kubernetes and CRI-O. Hands-on exercises reinforce the lecture material, allowing students to install and configure Linux containers.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

After completing this course, you should be able to:

  • Describe Linux containers architecture
  • Install and configure Docker onto a Power Systems environment
  • Perform Docker administration operations
  • Install and configure CRI-O
  • Perform basic container orchestration steps

Course Overview

This course is designed to prepare students to install and configure a highly available cluster using PowerHA SystemMirror.

Important: This course consists of several independent modules. The modules, including the lab exercises, stand on their own and do not depend on any other content.The exercises are conducted on an AIX 7.2 TL1 level system.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

After this course, participannts should be able to:

  • Explain what high availability is
  • Outline the capabilities of PowerHA SystemMirror
  • Design and plan a highly available PowerHA cluster
  • Install and configure PowerHA SystemMirror in the following modes of operation:
    • Single resource group on a primary node with standby node (active/passive)
    • Two resource groups in a mutual takeover configuration (active/active)
  • Configure resource group startup, fallover, and fallback policies
  • Perform basic system administration tasks for PowerHA
  • Perform basic customization for PowerHA
  • Perform basic problem determination and recovery

Course Content

Day 1

  • Welcome and course introduction
  • Unit 1: Introduction to PowerHA SystemMirror
  • Unit 2: Planning and configuring network and storage for PowerHA SystemMirror
  • Exercise 1: Lab setup, cluster planning, and exploring fallover
  • Exercise 2: Preparing the AIX environment for PowerHA SystemMirror

Day 2

  • Unit 3: Configuring applications for PowerHA SystemMirror
  • Unit 4: Configuring a PowerHA SystemMirror cluster
  • Exercise 3: Preparing an application for integration with SystemMirror
  • Exercise 4: Initial cluster configuration

Day 3

  • Unit 5: Cluster validation and testing
  • Unit 6: Basic PowerHA SystemMirror administration
  • Exercise 5: Cluster validation and testing
  • Exercise 6: Extending the configuration

Day 4

  • Unit 7: Events
  • Unit 8: Basic troubleshooting
  • Exercise 7: Events
  • Exercise 8: PowerHA SystemMirror problem determination

Day 5

  • Unit 9: PowerHA SystemMirror installation
  • Exercise 9: Install and maintain PowerHA SystemMirror
  • Open lab

Course Overview

This course is designed to teach experienced PowerHA SystemMirror for AIX professionals the latest features in PowerHA SystemMirror. It covers how to:

  • Effectively administer and monitor an IBM PowerHA SystemMirror for AIX cluster
  • Implement PowerHA SystemMirror for AIX’s more complex options

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

  • Review fundamental PowerHA SystemMirror for AIX concepts and components
  • Create four node clusters with two independent resource groups
  • Create and test robust application start and stop scripts
  • Create and test custom application monitors
  • Create resource group dependencies
  • Customize event notifications
  • Integrate WPAR and DLPAR with applications under PowerHA control
  • Integrate applications into PowerHA using Smart Assists
  • Determine the status of the cluster and cluster components using PowerHA/SNMP commands
  • Manage the cluster using the IBM Systems Director plug-in

Course Content

Day 1

  • Welcome
  • Unit 1 Topic 1: PowerHA review
  • Unit 1 Topic 2: Advanced administration: Topology and CSPOC features
  • Exercise 1: Lab setup, cluster review, topology, and C-SPOC administration

Day 2

  • Unit 2 Topic 1: Adding applications manually
  • Unit 2 Topic 2: Adding applications using a Smart Assist
  • Exercise 2 Part 1: Manually adding an application
  • Exercise 2 Part 2: Adding an application using a Smart Assist

Day 3

  • Unit 3: Advanced administration: Resources and resource groups
  • Exercise 3 Part 1: Implementing resource group dependencies
  • Exercise 3 Part 2: Adding application monitors

Day 4

  • Unit 4: Determining cluster status using the command line interface
  • Unit 5: Advanced administration: Event configuration
  • Exercise 4: Determining cluster status using command line
  • Exercise 5: PowerHA for AIX event configuration

Day 5

  • Unit 6: Advanced administration: DLPAR and WPAR implementation
  • Unit 7: Determining cluster status using the IBM Systems Director
  • Exercise 6: Implementing DLPAR and WPAR
  • Exercise 7: Implementing the PowerHA IBM Systems Director plug-in
  • Open lab time

Course Overview

Develop the skills to measure, analyze, and tune common performance issues on IBM POWER systems running AIX6.

Learn about performance management concepts and techniques and how to use of basic AIX tools to monitor, analyze, and tune an AIX6 system. The course covers how virtualization technologies such as the PowerVM environment and workload partitions affect AIX performance management. Monitoring and analyzing tools discussed in this course include vmstat, iostat, sar, tprof, svmon, filemon, netstat, lvmstat, and topas. Tuning tools include schedo, vmo, ioo, no, and nfso.

The course also covers how to use Performance Problem Reporting (PerfPMR) to capture a variety of performance data for later analysis.

Each lecture is reinforced with extensive hands-on lab exercises which provide practical experience.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

  • Define performance terminology
  • Describe the methodology for tuning a system
  • Identify the set of basic AIX tools to monitor, analyze, and tune a system
  • Use AIX tools to determine common bottlenecks in the Central Processing Unit (CPU), Virtual Memory Manager (VMM), Logical Volume Manager (LVM), internal disk Input/Output (I/O), and network subsystems
  • Use AIX tools to demonstrate techniques to tune the subsystems

Course Content

Day 1

  • Unit 1 – Performance Analysis and Tuning Overview
  • Exercise 1
  • Unit 2 Data Collection
  • Exercise 2
  • Unit 3 – Monitoring, Analyzing, and Tuning CPU Usage

Day 2

  • Exercise 3
  • Unit 4 – Virtual Memory Performance Monitoring and Tuning
  • Exercise 4

Day 3

  • Unit 5 – Physical and Logical Volume Performance
  • Exercise 5
  • Unit 6 File System Performance Monitoring and Tuning
  • Exercise 6

Day 4

  • Unit 7 – Network Performance
  • Exercise 7

Day 5

  • Unit 8 – NFS Performance
  • Exercise 8
  • Unit 9 – Performance Management Methodology
  • Exercise 9

Course Overview

This course provides advanced AIX system administrator skills with a focus on availability and problem determination. It provides detailed knowledge of the ODM database where AIX maintains so much configuration information. It shows how to monitor for and deal with AIX problems. There is special focus on dealing with Logical Volume Manager problems, including procedures for replacing disks. Several techniques for minimizing the system maintenance window are covered. It also covers how to migrate AIX Workload Partitions to another system with minimal disruption. While the course includes some AIX 6.1 enhancements, most of the material is applicable to prior releases of AIX.

Course Objectives

  • Perform system problem determination and reporting procedures including analyzing error logs, creating dumps of the system, and providing needed data to the AIX Support personnel
  • Examine and manipulate Object Data Manager databases
  • Identify and resolve conflicts between the Logical Volume Manager (LVM) disk structures and the Object Data Manager (ODM)
  • Complete a very basic configuration of Network Installation Manager to provide network boot support for either system installation or booting to maintenance mode
  • Identify various types of boot and disk failures and perform the matching recovery procedures
  • Implement advanced methods such as alternate disk install, multibos, and JFS2 snapshots to use a smaller maintenance window
  • Install and configure Workload Partition Manager to support WPAR management and to implement Live Application Mobility (LAM)

Course Content

Day 1

  • Unit 1 – Advanced AIX administration overview
  • Exercise 1
  • Unit 2 – The Object Data Manager
  • Exercise 2
  • Unit 3 – Error monitoring
  • Exercise 3

Day 2

  • Unit 4 – Network Installation Manager basics
  • Exercise 4
  • Unit 5 – System initialization: Part I
  • Exercise 5

Day 3

  • Unit 6 – System initialization: Part II
  • Exercise 6
  • Unit 7 – Disk management theory
  • Exercise 7
  • Unit 8 – Disk management procedures
  • Exercise 8

Day 4

  • Unit 8 continued
  • Exercise 8 continued
  • Unit 9 – Install and backup techniques
  • Exercise 9
  • Unit 10 – Workload partitions
  • Exercise 10

Day 5

  • Exercise 10 continued
  • Unit 11 – The AIX system dump facility
  • Exercise 11 – System dump facility

Course Overview

Learn how to perform system administration in a Power Systems environment. Learn about the features of PowerVM Editions and how to configure and manage LPARs running AIX V7.1 using the Hardware Management Console (HMC).

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

After this course participants should be able to:

  • Describe important concepts that are associated with managing POWER8 processor-based systems, such as logical partitioning, dynamic partitioning, virtual devices, virtual processors, virtual consoles, virtual local area network (VLAN), and shared processors
  • Describe the features of the PowerVM editions
  • Describe the functions provided by the HMC
  • Configure and manage the HMC, including users and permissions, software, start and shutdown, remote access features, network configuration, security features, HMC backup and restore options, and the HMC reload procedure
  • Describe the rules that are associated with allocating resources, including dedicated processors, processing units for Micro-Partitioning, memory, logical host Ethernet adapter, and physical I/O for AIX and Linux partitions
  • Configure and manage LPARs by using the HMC graphical user interface (GUI) and HMC commands
  • Interpret physical and AIX location codes and relate to the key hardware components
  • Power on and power off the Power Systems server
  • Use the HMC to back up and restore partition data
  • Perform dynamic LPAR operations (DLPAR)

Course Content

Day 1

  • Welcome
  • Unit 1: Introduction to partitioning
  • Exercise 1: Introduction to partitioning
  • Unit 2: Hardware system overview
  • Exercise 2: System hardware components
  • Unit 3: Hardware Management Console

Day 2

  • Unit 3: Hardware Management Console (continued)
  • Exercise 3: Exploring the HMC V8 interface
  • Unit 4: Hardware Management Console maintenance
  • Exercise 4: HMC and managed system maintenance
  • Unit 5: System power management
  • Exercise 5: System power management
  • Unit 6: Planning and configuring logical partitions

Day 3

  • Unit 6: Planning and configuring logical partitions (continued)
  • Exercise 6: Configuring logical partitions
  • Unit 7: Partition operations
  • Exercise 7: Partition operations
  • Unit 8: Dynamic LPAR operations
  • Exercise 8: Dynamic LPAR operations

Course Overview

In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.

In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS filesystems.

These exercises reinforce the concepts and technologies being covered in the lectures. This course consists of several inter-dependent modules. The modules, including the lab exercises, depend on the other previous modules content.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

In this course, you will learn how to:

  • Describe the components of Pervasive Encryption on z/OS
  • Explain the role of encryption for data protection
  • Implement hardware crypto on your z System
  • Load and activate AES Master Keys
  • Implement and start ICSF
  • Understand the differences between secure keys clear keys and protected keys
  • Describe how are key values used for encryption and decryption
  • Generate, maintain and manage Keys
  • Setup access to key labels
  • Setup policy to supply key label (RACF SMS JCL)
  • Access data in encrypted data sets
  • Create encrypted data sets – Supplying key labels
  • Convert existing data sets to encryption
  • Verify encryption status
  • Encrypt Data in Transit
  • Encrypt Data at Rest
  • Manage data sets, data keys, and key labels

Course Content

Please see the course objectives

Course Overview

Become familiar with the system load balance approach and performance tuning concepts for your HPE NonStop system. Learn how to capture and analyze performance data, then adapt the adjustments to maximize performance and increase system utilization. Topics include Measure, Measure entities, queuing theory, TPM, RPM, ViewSys, Web ViewPoint practical approaches to system tuning, and using performance tools. The course is 60 percent lecture and 40 percent hands-on labs using NonStop servers.

Course Objectives

At the conclusion of this course, you should be

able to:

• Apply the basic tuning principle

for NonStop

• Analyze Measure’s key entities and

use Reload Analyzer

• Apply several basic queuing

theory formulas

• Analyze disk cache-hit ratios

and fragmentation

• Calculate a volume’s true write

cache-hit ratio

• Analyze process priorities and process

memory consumption

• Identify processes with long

$RECEIVE queues

• Evaluate TCP process and server class

parameters for best performance

• Use Measure, SQLCI, and MXCI to analyze

NonStop SQL/MP and NonStop

SQL/MX performance

• Identify positive and negative factors in

application performance

Course Content

Performance Analysis and Tuning for HPE NonStop Systems U4195S course data sheet

Course Overview

This course is developed for systems programmers working on an implementation of a Parallel Sysplex. It covers the details of z/OS and z/OS-related products and subsystems exploiting the Parallel Sysplex components. It is focused on the resource sharing side.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

After this course participants should be able to:

  • Understand the steps to implement a basic and full Parallel Sysplex
  • Implement a basic sysplex
  • Implement a multisystem base sysplex
  • Implement the connectivity for a Parallel Sysplex
  • Implement the features and functions of a Parallel Sysplex
  • Implement the coupling facility key exploiters
  • Understand the different recovery scenarios

Course Content

Day 1

  • Welcome
  • Unit 1: Sysplex: Overview and definitions
  • Lab 2: Building two stand-alone systems

Day 2

  • Unit 2: Base sysplex definitions and commands
  • Unit 3: Hardware Management Console
  • Lab 3: Building a two system base sysplex

Day 3

  • Unit 4: Base sysplex migration to Parallel Sysplex
  • Unit 5: Coupling Facility architecture
  • Lab 4: Base to Parallel Sysplex migration dynamically
  • Lab 5: Dynamically add a third CF to sysplex

Day 4

  • Lab 6: Implementation of CF exploiters

Day 5

  • Unit 6: Sysplex operation and recovery
  • Lab recovery