HOME > IT & Software > Learning Path- Ansible- Secured Automation with Ansible 2

Learning Path- Ansible- Secured Automation with Ansible 2

SynopsisLearning Path: Ansible: Secured Automation with Ansible 2, av...
Learning Path- Ansible- Secured Automation with Ansible 2  No.1

Learning Path: Ansible: Secured Automation with Ansible 2, available at $49.99, has an average rating of 4, with 69 lectures, based on 42 reviews, and has 402 subscribers.

You will learn about Configure and manage your infrastructure using Ansible Playbooks Integrate Ansible with various cloud providers such as AWS and Openstack Harden your Nginx Web Server Set up the firewall along with managing SELinux for security Setup Ansible Tower and learn to use it Install Ansible and connect to Windows boxes and network devices This course is ideal for individuals who are This Learning Path is targeted at system administrators or IT professionals who are keen to automate their organization’s infrastructure It is particularly useful for This Learning Path is targeted at system administrators or IT professionals who are keen to automate their organization’s infrastructure.

Enroll now: Learning Path: Ansible: Secured Automation with Ansible 2

Summary

Title: Learning Path: Ansible: Secured Automation with Ansible 2

Price: $49.99

Average Rating: 4

Number of Lectures: 69

Number of Published Lectures: 69

Number of Curriculum Items: 69

Number of Published Curriculum Objects: 69

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Configure and manage your infrastructure using Ansible Playbooks
  • Integrate Ansible with various cloud providers such as AWS and Openstack
  • Harden your Nginx Web Server
  • Set up the firewall along with managing SELinux for security
  • Setup Ansible Tower and learn to use it
  • Install Ansible and connect to Windows boxes and network devices
  • Who Should Attend

  • This Learning Path is targeted at system administrators or IT professionals who are keen to automate their organization’s infrastructure
  • Target Audiences

  • This Learning Path is targeted at system administrators or IT professionals who are keen to automate their organization’s infrastructure
  • Security plays a major role in protecting your system or data. Ansible makes it easy for you to secure any part of your infrastructure, including setting firewalls, providing authentication to users and groups, and setting custom security policies. It allows you to write automation procedures and use them across your entire infrastructure. So if you are a system administrator or an IT professional who is keen to automate your organization’s infrastructure, then you should surely go for this Learning Path.

    Packt’s Video Learning Paths are a series of individual video products put together in a logical and stepwise manner such that each video builds on the skills learned in the video before it.

    ?The highlights of this Learning Path are:

  • Increase the functionality of your infrastructure by integrating with cloud platforms such as AWS and OpenStack
  • Understand how to use Ansible 2 for various use cases such as fraud detection, network security, governance, and so on
  • Implement the advanced usage of Ansible Tower
  • Learn complex hardening and migrate security infrastructures
  • Let’s take a quick look at your learning journey. You will with Ansible 2, including its installation, the problems it solves, and more. You will then create your very first playbook. You will understand the power of variables and quickly be able to manage environments and implement strategies. You will then go through the concepts that are used to automate security in your infrastructure and how to monitor your system so that it remains compliant. You will also use Ansible Tower to secure your machines and cloud systems. Moving forward, you will explore some security use cases such as network device hardening, application security, fraud detection and prevention, governance, and risk assessment. Finally, this Learning Path will teach you how to maintain the compliance state of your system by applying configurations to your system along with some troubleshooting techniques.

    By the end of this Learning Path, you will have mastered automating different layers of security in your infrastructure.

    Meet Your Experts:

    We have the best works of the following esteemed author to ensure that your learning journey is smooth:

  • David Cohenhashasbeen a system administrator, platform engineer, devops engineer, and software developer in everything from small businesses to growing companies (100+ employees) and large tech/engineering firms (10,000+ employees). Most of his work has centered around Linux and Unix system administration, web security, and software development in Python, Ruby, Javascript, and Go. He has also done stranger things like helping to design two tier-4 datacenters and being an Infantryman (not at the same time). On his tutorial Linux YouTube channel, he has helped thousands of people learn the basics (and not-so-basics) of system administration, devops, and software engineering.
  • Anish Nath is a developer, author, and a hacker who is willing to contribute and learn. He is an active member of StackOverflow and a Devops Engineer. He has expertise as a security advocate and security architect. He is experienced in handling security issues such as performing white-hat hacking. He is a community-oriented developer.
  • Course Curriculum

    Chapter 1: Ansible 2 for Beginners

    Lecture 1: The Course Overview

    Lecture 2: What Is Ansible?

    Lecture 3: Why Ansible?

    Lecture 4: Demonstration – From Bash to Ansible

    Lecture 5: Course Layout

    Lecture 6: Basic Ansible Vocabulary

    Lecture 7: New Features in Ansible 2.0

    Lecture 8: Creating an Ansible Home Base

    Lecture 9: Installing Ansible

    Lecture 10: Bleeding-Edge Ansible Installation

    Lecture 11: Setting up our Test Environment

    Lecture 12: Target Machine Requirements

    Lecture 13: Ansible Configuration Hierarchy

    Lecture 14: Ansible Hosts Inventory File

    Lecture 15: Ad-Hoc Commands

    Lecture 16: Introduction top playbooks

    Lecture 17: Playbook Structure

    Lecture 18: Introduction to Modules

    Lecture 19: Common Modules

    Lecture 20: Variables and Facts

    Lecture 21: Real-Life Playbook: Mattermost Deployment

    Lecture 22: Real-Life Playbook Walkthrough

    Lecture 23: Debugging and Troubleshooting

    Lecture 24: Conditionals and Control Flow

    Lecture 25: Templating, Control Flow, and Iteration in Jinja2

    Lecture 26: YAML Basics

    Lecture 27: Ansible Blocks

    Lecture 28: Performance and Execution Strategies

    Lecture 29: Ansible Galaxy

    Lecture 30: Security

    Lecture 31: Ansible in the Cloud

    Lecture 32: Ansible AWS Demo

    Lecture 33: Ansible Tower

    Chapter 2: Getting Started with Ansible 2 Security Automation

    Lecture 1: The Course Overview

    Lecture 2: Ansible Structure

    Lecture 3: Ansible Installation

    Lecture 4: Ansible Installation on Ubuntu

    Lecture 5: Ansible User Setup

    Lecture 6: Setting up Ansible

    Lecture 7: Ansible Vault

    Lecture 8: Setting Up the Firewall

    Lecture 9: Managing SELinux

    Lecture 10: Setting Up NTP

    Lecture 11: Harden SSH

    Lecture 12: Harden NGINX

    Lecture 13: Ansible Tower

    Lecture 14: Ansible Tower Installation

    Lecture 15: Ansible Credentials

    Lecture 16: Ansible Projects

    Lecture 17: Ansible Inventories

    Lecture 18: Ansible Job Templates

    Lecture 19: Ansible Jobs

    Lecture 20: Ansible Tower API

    Chapter 3: Ansible 2: Advancements with Security Automation

    Lecture 1: The Course Overview

    Lecture 2: User Management With Ansible – Part 1

    Lecture 3: User Management with Ansible – Part 2

    Lecture 4: Httpd Hardening-Part 1

    Lecture 5: Httpd Hardening-Part 2

    Lecture 6: Hardening With Sysctl

    Lecture 7: Hardening Process

    Lecture 8: Hardening Software Updates Warning Banners and Remove Services

    Lecture 9: rootkit Detections and Protections

    Lecture 10: Ansible Tower System Tracking

    Lecture 11: Ansible Dynamic Inventory

    Lecture 12: Ansible Tower LDAP Integration

    Lecture 13: How to Enforce Governance with Ansible-Part 1

    Lecture 14: How to Enforce Governance with Ansible-Part 2

    Lecture 15: Running Ansible on Windows

    Lecture 16: Managing Windows Using Ansible and Ansible Support for Network Devices

    Instructors

  • Learning Path- Ansible- Secured Automation with Ansible 2  No.2
    Packt Publishing
    Tech Knowledge in Motion
  • Rating Distribution

  • 1 stars: 2 votes
  • 2 stars: 3 votes
  • 3 stars: 3 votes
  • 4 stars: 16 votes
  • 5 stars: 18 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!