Rectus Infotech

Rectus InfotechRectus InfotechRectus Infotech

Rectus Infotech

Rectus InfotechRectus InfotechRectus Infotech
  • Home
  • Course
  • Info
  • Career
  • About Us
  • Contact us
  • More
    • Home
    • Course
    • Info
    • Career
    • About Us
    • Contact us
  • Home
  • Course
  • Info
  • Career
  • About Us
  • Contact us

Artificial intelligence Course

Artificial intelligence

Generative AI is a type of artificial intelligence that creates new content—including text, images, video, code, and music—by learning patterns from existing data using deep learning models.

AI agents

 AI agents are autonomous software systems powered by generative AI and LLMs that perceive their environment, reason, plan, and take actions to achieve specific goals with minimal human oversight 

Agentic AI

 Agentic AI refers to autonomous systems capable of setting goals, planning, and executing complex, multi-step actions with minimal human oversight 

RAG

 AI Overview7 Practical Applications of RAG Models and Their Impact on ...Retrieval-Augmented Generation (RAG) is an AI framework that improves Large Language Model (LLM) accuracy by retrieving data from trusted external knowledge bases—such as company documents or databases—before generating a response 

n8n

 n8n is a workflow automation platform that uniquely combines AI capabilities with business process automation. 

MCP

 Model Context Protocol (MCP) architecture is a client-server model designed to standardize how AI applications (Hosts) connect to external data sources and tools (Servers) 

Artificial Intelligence

 History of Artificial Intelligence

 What is Artificial Intelligence?

 Application of Artificial Intelligence

 Artificial Intelligence – Intelligent Systems

 Problems in Artificial Intelligence

 Approaches used in Artificial Intelligence

 Tools used in Artificial Intelligence

 Different types of Artificial Intelligence Technology

 Agents and Environments in Artificial Intelligence

 Artificial Intelligence Expert Systems

 Artificial Intelligence – Robotics

 What is strong and weak Artificial Intelligence?

What is included in this course?

 History of Artificial Intelligence

 Application of Artificial Intelligence

 Artificial Intelligence – Intelligent Systems

 Problems in Artificial Intelligence

 Approaches used in Artificial Intelligence

 Tools used in Artificial Intelligence

 Different types of Artificial Intelligence Technology

 Agents and Environments in Artificial Intelligence

 Artificial Intelligence Expert Systems

 Artificial Intelligence – Robotics

 What is strong and weak Artificial Intelligence?

File coming soon.

n8n Automation : Build AI Agents

 

What is Automation?

From Industrial Revolution to Intelligent Workflows

Benefits of Workflow Automation

Understanding Workflows – Concepts & Real-World Examples

Overview of Popular Automation Tools

How AI & Workflow Automation Are Shaping the Future of Work

What is n8n?

How AI + Workflow Automation Is Creating a New Business Model

Introduction to n8n Cloud (O􀆯icial Managed Hosting)

Creating Your n8n Cloud Account + Discount

Managing Workspace

What is Workflow?

What is Automation?

What is Node in n8n?

What is Trigger

What is next after Trigger? It is an Action!

What is API?

What is Webhook?

Connecting External Applications with Credentials

Understanding Nodes in n8n Automation Workflows

Deep Dive into Node Functionality and Parameters

Tracking Your Progress and Building Confidence

Creating First Workflow - An AI Powered ChatBot

Creating your First AI Agent in n8n - Telegram Chat

Create AI Powered Chatbot for Wordpress Website

RAG Agent

Create your Personal Assistant

Data Transformation in n8n: From Raw Feeds to Structured Insights

Updating Partnerstack Partners Sheet and A􀆯ilaite Link

Make Money with Full Automated A􀆯iliate Website

A􀆯iliate Video Automation: AI-Generated YouTube Content Using n8n + Sora

Outcome of the Video using the AI Generator Workflow

Welcome to the Self Hosting n8n

Installing n8n Locally with NPM

Updating Self-Hosted n8n (NPM Installation)

Docker Setup for n8n – ReadMe and Key Resources

Deploying n8n with Docker Compose (Standard Stack)

Unlock All Features – Post Install Without SSL (Docker)

Self-Hosted n8n for Homelab Environments

How to Update Your n8n Docker Installation

Setting Environment Variables in Docker Deployments

Setting Up Postgres & Qdrant Credentials for n8n on Docker Stack

Advanced Stack – Docker + Nginx Proxy + Cloudflared

MCP Server & MCP Client Features

Self-Hosting DeepSeek AI Model with Ollama

File coming soon.

Azure Administrator -AZ 104

Course Content

 

Microsoft Certified: Azure Solutions Architect Expert

Introduction to Microsoft Azure

Ø  Introduction to cloud computing

Ø  What is Microsoft Azure?

Ø  Microsoft Azure Services

Ø  Creating a Microsoft Azure Account

Ø  Azure CLI, Azure PowerShell

Ø  Managing Azure Resources & Subscriptions

Ø  Azure Resource Manager

Ø  Microsoft Azure Architecture

Module 2

Introduction to ARM & Azure Storage

Ø  Azure Resources & Subscriptions

Ø  Azure Resource Manager

Ø  Managing Azure Resources

Ø  Azure Tags

Ø  Azure Storage Account & its types

Ø  Azure Blob Storage

Ø  Azure Content Delivery Network (CDN)

Ø  Azure Files Storage

Ø  Azure File Sync

Module 3

Introduction to Azure storage

Ø  Azure Table Storage

Ø  Azure Queue Storage

Ø  Azure Storage Explorer

Ø  Azure Shared Access Signature (SAS)

Ø  Azure Databox

Ø  Azure Storage Replication

Ø  Data Replication Options

Ø  Azure Import/Export Service

Module 4

Azure Virtual Machines

Ø  Azure Virtual Machines

Ø  Data Disks in Azure

Ø  Azure VMs & Interfaces

Ø  ARM templates

Ø  VHD templates

Ø  Custom Images of Azure VM

Ø  Virtual Machine Scale Sets

Ø  Virtual Machine Availability Sets

Module 5

Azure App and Container services

Ø  App Service Web App for Containers

Ø  App Service plan

Ø  Networking for an App Service

Ø  Deployment slots

Ø  Container image

Ø  Azure Kubernetes Service

Ø  Azure Container Registry

Module 6

Azure Networking I

Ø  Azure Virtual Networks

Ø  Azure Vnet Components

Ø  IP Address Public & Private IPs

Ø  Azure Vnet Subnets

Ø  Azure Network Interface Cards (NIC)

Ø  Network Security Group (NSG)

Ø  Route Tables

Ø  Service Tags

Ø  Azure DNS

Ø  Private DNS

Module 7

Azure Networking II

Ø  Application Gateway

Ø  Azure Front Door Service

Ø  Azure Traffic Manager

Ø  Application Security Groups

Ø  Azure Load Balancers

Ø  Azure Firewall

Ø  Azure Bastion

Ø  Network Watcher

Ø  Azure Express Route

Ø  Express Route Circuits

Ø  Express Route Peering

Module 8

Authentication and Authorization in Azure using

Ø  RBAC

Ø  Identity and Access Management in Azure

Ø  Role Based Access Management (RBAC)

Ø  Role Definitions

Ø  Role Assignment in Azure Resources

Ø  Azure Users & Groups

Ø  RBAC Policies

Module 9

Microsoft Entra ID

Ø  Azure Active Directory (Azure AD)

Ø  Azure AD Users

Ø  Azure AD Groups

Ø  Azure AD Domains

Ø  Azure AD Tenants

Ø  Authentication Options

Ø  Azure AD Connect

Ø  Self Service password Reset (SSPR)

Ø  Multi Factor Authentication (MFA)

Ø  Resource Locks

Module 10

Azure Monitoring

Ø  Azure Monitor  

Ø  Azure Metrics

Ø  Log Analytics

Ø  Alerts and actions

Ø  Application Insights

Ø  Backup reports

Ø  Recovery Services Vault

Ø  Backing Up Azure Virtual Machines

Ø  VM Backup Policies

Ø  Restoring Azure Virtual machines

File coming soon.

DevOps

Course Content

 

Introduction to Docker

  • Understanding Service Oriented Architecture (SOA)
  • Understanding Microservice Architecture
  • What is Container?
    • Benefits of Container
  • Evolution of Containers
  • What is Docker?
  • History of Docker
  • What is Open Container Initiative (OCI)?
  • What is the Purpose of Open Container Initiative (OCI)?

Key Components in Docker

  • Docker Image
  • Docker Network
  • Docker Storage
  • Docker Container
  • Docker Compose

Overview of Docker

  • Architecture of Docker-managed Containers
    • Docker Client
    • Docker Daemon
    • Docker Image
    • Docker Container
    • Docker Network
    • Docker Storage
    • Docker Registry
  • Container vs VM

Prerequisites for Docker

  • Understanding JSON

Setup Docker

  • What is Containerd?
  • Install Docker
  • Significance of Docker Programs
  • Manage Docker
  • Deep Dive into Docker

Configure Docker

  • Understanding Docker Configurations
  • Change Storage & Log Driver of Docker
  • Apply Configuration Changes to Docker
  • Understanding Docker System Paths

Docker Image

  • What is the Purpose of Docker Image?
  • Deriving Docker Images
    • Tree Structure of Derived Docker Images
    • Benefits of Deriving Docker Images
  • Build Docker Image Manually
  • Understanding Docker file
  • Automate Build of Docker Images Using Docker file
  • Manage Docker Images
  • Deep Dive into Docker Image
  • Do's and Dont's with Docker Image

Docker Network

  • What is Container Network Model (CNM)?
  • What is the Purpose of Docker Network?
  • Types of Docker Network
  • How to Choose a Docker Network?
  • Manage Docker Networks
    • Using Host Docker Network
    • Using None Docker Network
    • Using Bridge Docker Network
    • Using Macvlan Docker Network

Docker Storage

  • What is the Purpose of Docker Storage?
  • Types of Docker Storage
  • How to Choose a Docker Storage?
  • Manage Docker Storage
    • Using Volume Docker Storage
    • Using Bind Mount Docker Storage
    • Using Tmpfs Mount Docker Storage

Docker Container

  • What is the Purpose of Docker Container?
  • Understanding Docker Container
    • How Docker Container is Created?
    • How Docker Container Lifecycle is Controlled?
    • Analyzing Docker Container Configurations
  • What is Supervisor?
  • Managing Microservices within Docker Container Using Supervisor
  • Design Highly Scalable Docker Container
  • Provision Docker Containers Manually
  • Manage Docker Containers
  • Deep Dive into Docker Container
  • Do's and Dont's with Docker Container

Docker Compose

  • Understanding YAML
  • What is the Purpose of Docker Compose?
  • Install Docker Compose
  • Understanding Docker Compose YAML
  • Structure of Docker Compose YAML
  • Automated/Orchestrated Provisioning of Docker Containers Using Docker Compose
  • Manage Docker Containers Using Docker Compose

 

Introduction to Kubernetes

  • What is Docker?
  • What is Cloud Native Computing Foundation (CNCF)?
  • Understanding Container Clustering & Orchestration
    • Major Container Clustering & Orchestration Tools/Services
    • Benefits of Container Clustering & Orchestration
  • What is Kubernetes?
  • Understanding Kubernetes
  • What is Container Network Interface (CNI)?
  • History of Kubernetes

Key Components in Kubernetes

  • Kubernetes Node
  • Kubernetes Namespace
  • Kubernetes Volume
  • Kubernetes Deployment
  • Kubernetes Pod
  • Kubernetes Service
  • Kubernetes Ingress
  • Kubernetes Role
  • Kubernetes ClusterRole

Overview of Kubernetes

  • Architecture of Kubernetes-managed Docker Containers
    • Kubernetes API Server
    • Etcd
    • CoreDNS
    • Kubernetes Scheduler
    • Kubernetes Controller Manager
    • Kubernetes Agent
    • Kubernetes Proxy
  • Kubernetes vs Swarm

Prerequisites for Kubernetes

  • Install Kubernetes Client
  • Using Virtual Machines as Kubernetes Nodes
  • Boot Virtual Machines for Kubernetes Nodes
  • Manage Virtual Machines of Kubernetes Nodes

Setup Kubernetes

  • Install & Configure Docker
  • Install Kubernetes
  • Significance of Kubernetes Programs
  • Manage Kubernetes

Configure Kubernetes

  • Initialize Kubernetes Cluster
  • Join Nodes to Kubernetes Cluster
  • Understanding Kubernetes System Paths
  • Prepare Nodes in Kubernetes Cluster
  • Manage Tokens in Kubernetes Cluster
  • Configure Kubernetes User
  • Deep Dive into Kubernetes Cluster

Kubernetes Node

  • What is the Purpose of Kubernetes Node?
  • Provision Highly Scalable Kubernetes Nodes
    • Scaling Master Kubernetes Nodes
    • Scaling Worker Kubernetes Nodes
  • Manage Kubernetes Nodes

Kubernetes Namespace

  • What is the Purpose of Kubernetes Namespace?
  • Understanding Kubernetes Namespace
  • Create Kubernetes Namespace
  • Manage Kubernetes Namespaces

Kubernetes Volume

  • What is the Purpose of Kubernetes Volume?
  • Create Kubernetes Volume
  • Manage Kubernetes Volumes

Kubernetes Deployment

  • What is the Purpose of Kubernetes Deployment?
  • Create Kubernetes Deployment
  • Manage Kubernetes Deployments

Kubernetes Pod

  • What is the Purpose of Kubernetes Pod?
  • Understanding Kubernetes Pod
  • Manage Kubernetes Pods
  • Deep Dive into Kubernetes Pod

Kubernetes Service

  • What is the Purpose of Kubernetes Service?
  • Ways to Expose Kubernetes Service
  • Create Kubernetes Service
  • Manage Kubernetes Services
  • Deep Dive into Kubernetes Service
    • How Kubernetes Service Discovery Works?

Kubernetes Ingress

  • What is the Purpose of Kubernetes Ingress?
  • Understanding Kubernetes Ingress Controller
  • Create Kubernetes Ingress Controller
  • Create Kubernetes Ingress
  • Manage Kubernetes Ingresses
  • Manage Kubernetes Ingress Controllers

Kubernetes Role

  • What is the Purpose of Kubernetes Role?
  • Create Kubernetes Role
  • Create Kubernetes RoleBinding
  • Manage Kubernetes RoleBindings
  • Manage Kubernetes Roles

Kubernetes ClusterRole

  • What is the Purpose of Kubernetes ClusterRole?
  • Create Kubernetes ClusterRole
  • Create Kubernetes ClusterRoleBinding
  • Manage Kubernetes ClusterRoleBindings
  • Manage Kubernetes ClusterRoles

 

Introduction to Ansible

  • Infrastructure Management
  • What is Capacity Planning?
    • Major Capacity Planning Tools/Services
  • Understanding Capacity Planning
    • Calculating Percentile
  • What is Provisioning?
    • Major Provisioning Tools/Services
  • What is Deployment?
    • Major Deployment Tools
    • Benefits of Automated Deployment
  • Understanding Deployment Matrix
    • App Service
    • Data Service
  • What is Ansible?
  • History of Ansible

Key Components in Ansible

  • Ansible Control Machine
  • Ansible Inventory
  • Ansible Playbook
  • Ansible Role
  • Ansible Node
  • Ansible Tower

Overview of Ansible

  • Architecture of Ansible-managed Deployments
    • Ansible Control Machine
    • Ansible Inventory
    • Ansible Playbook
    • Ansible Role
    • Ansible Node
  • Ansible vs Chef

Prerequisites for Ansible

  • Understanding YAML

Ansible Control Machine

  • What is the Purpose of Ansible Control Machine?
  • Install Ansible
  • Significance of Ansible Control Machine Programs
  • Understanding Ansible Control Machine Configurations
  • Configure Ansible Control Machine
  • Configure Highly Scalable Ansible Control Machine
  • Understanding Ansible Control Machine System Paths
  • Deep Dive into Ansible Control Machine
    • How Ansible Control Machine Executes Playbook/Role?
  • Do's and Dont's with Ansible Control Machine

Ansible Inventory

  • What is the Purpose of Ansible Inventory?
  • Manage Ansible Inventories

Ansible Playbook

  • What is the Purpose of Ansible Playbook?
  • Structure of Ansible Playbook
  • Writing Ansible Playbook
  • Manage Ansible Playbooks
  • Do's and Dont's with Ansible Playbook

Ansible Role

  • What is the Purpose of Ansible Role?
  • Structure of Ansible Role
  • Writing Ansible Role
  • Manage Ansible Roles
  • Do's and Dont's with Ansible Role

Ansible Vault

  • What is the Purpose of Ansible Vault?
  • Create Encrypted File Using Ansible Vault
  • Create Encrypted String Using Ansible Vault
  • Manage Encryption Using Ansible Vault

Ansible Node

  • Understanding Deployment on Ansible Nodes
  • Using Docker Containers as Ansible Nodes
  • Boot Ansible Nodes
  • Trigger Deployment on Ansible Nodes
  • Manage Ansible Nodes

Ansible Tower

  • What is the Purpose of Ansible Tower?
  • Setup & Configure Ansible Tower
  • Using Ansible Tower
    • Create Organization
    • Create Team
    • Create Inventory
    • Create Host
    • Create Group
    • Create Credential
    • Create Project
    • Create Job Template
    • Boot Ansible Nodes
    • Trigger Deployment on Ansible Nodes
  • Manage Ansible Tower

 

Introduction to Terraform

  • Infrastructure Management
  • What is Capacity Planning?
    • Major Capacity Planning Tools/Services
  • Understanding Capacity Planning
    • Calculating Percentile
  • What is Provisioning?
    • Major Provisioning Tools/Services
  • What is Deployment?
    • Major Deployment Tools
    • Benefits of Automated Deployment
  • What is Terraform?
  • History of Terraform

Key Components in Terraform

  • Terraform Provider
  • Terraform Configuration
  • Terraform Module
  • Terraform Cloud

Overview of Terraform

  • Architecture of Terraform-managed Infrastructure Provisioning
    • Terraform Configuration
    • Terraform Provider
    • Terraform Provisioner
    • Terraform Registry
  • Terraform vs AWS CloudFormation

Prerequisites for Terraform

  • Create AWS Account
  • Install AWS CLI

Setup Terraform

  • Install Terraform
  • Significance of Terraform Programs

Terraform Provider

  • What is the Purpose of Terraform Provider?
    • Major Terraform Providers
  • Understanding Terraform Provider
  • Manage Terraform Providers

Terraform Configuration

  • What is the Purpose of Terraform Configuration?
  • Structure of Terraform Configuration
  • Writing Terraform Configuration
  • Initialize Terraform Configuration
  • Generate Plan from Terraform Configuration
  • Apply Plan of Terraform Configuration
  • Manage Terraform Configurations
  • Do's and Dont's with Terraform Configuration

Terraform Module

  • What is the Purpose of Terraform Module?
  • Structure of Terraform Module
  • Writing Terraform Module
  • Manage Terraform Modules
  • Do's and Dont's with Terraform Module

Terraform Cloud

  • What is the Purpose of Terraform Cloud?
  • Using Terraform Cloud
  • Manage Terraform Cloud
  • Do's and Dont's with Terraform Cloud

 

Introduction to Git

  • Getting Started with Software Development
  • What is Version Control System (VCS)/Source Control Management (SCM)?
    • Major VCS/SCM Tools
    • Benefits of VCS/SCM
  • What is Git?
  • History of Git

Key Components in Git

  • Git Repository
  • Git Branch
  • Git Service Provider

Overview of Git

  • Architecture of Git-managed Software Development
    • Centralized
    • Distributed
  • Git vs Subversion

Setup Git

  • Install Git
  • Significance of Git Programs
  • Understanding Git System Paths

Configure Git

  • Understanding Git Configurations
  • Apply Global Configurations in Git

Git Repository

  • What is the Purpose of Git Repository?
  • Tree Structure of Git Repository
  • Initialize Git Repository
  • Status of Git Repository
  • Ignore Unwanted Files and Paths in Git Repository
  • Add Source Tree to Git Repository
  • Commit Changes to Git Repository
  • Manage Git Repositories
  • Deep Dive into Git Repository
    • How Push Mechanism Works in Git Repository?
    • How Pull Mechanism Works in Git Repository?
  • Do's and Dont's with Git Repository

Git Service Provider

  • What is the Purpose of Git Service Provider?
    • Major Git Service Providers
  • Understanding Git Service Provider
    • GitHub
    • Bitbucket
    • GitLab
  • How to Choose a Git Service Provider?
  • Manage SSH Keys with Git Service Provider
  • Create Repository in Git Service Provider
  • Manage Repositories in Git Service Provider
  • Push Changes to Remote Git Repository
  • Integrate Git Repository with Jenkins CI Server
  • Do's and Dont's with Git Service Provider

Git Workflow

  • What is Git Workflow?
  • What is the Purpose of Git Workflow?
  • Architecture of Git Workflow
    • Principles of Git Workflow
  • Execute Git Workflow
    • Intialize Git Workflow
    • Clone Git Repository
    • Cherry Pick and Apply Git Commits to a Branch
    • Merge Git Branches
    • Create Release Using Git Tag
    • Ways to Handle Post Deployment Issues
  • Do's and Dont's with Git Workflow

Merge Conflict in Git

  • Why Merge Conflict Occurs in Git Repository?
  • Simulate Merge Conflict in Git Repository
  • Fix Merge Conflict in Git Repository

Git Stash

  • What is the Purpose of Git Stash?
  • Stash Changes Before Switching to Another Git Branch

Git Reset

  • What is the Purpose of Git Reset?

 

Introduction to Jenkins

  • What is Automated Testing?
  • What is Automated Build?
  • What is Continuous Integration (CI)?
  • What is Continuous Deployment (CD)?
  • What is CI/CD Pipeline?
  • Understanding CI/CD Pipeline
    • Build Phase in CI/CD Pipeline
    • Test Phase in CI/CD Pipeline
    • Deploy Phase in CI/CD Pipeline
    • Lifecycle of CI/CD Pipeline
  • What is Jenkins?
  • History of Jenkins

Key Components in Jenkins

  • Jenkins Plugin
  • Jenkins CLI
  • Jenkins Node
  • Jenkins Freestyle
  • Jenkins Pipeline

Overview of Jenkins

  • Architecture of Jenkins-managed Software Build/Testing

Prerequisites for Jenkins

  • Install Ngrok

Setup Jenkins

  • Install Jenkins
  • Significance of Jenkins Programs
  • Manage Jenkins

Configure Jenkins

  • Understanding Jenkins System Paths
  • Unlock Jenkins
  • Enable/Disable Jenkins Plugins
  • Create Admin User
  • Create API Token for User
  • Configure Jenkins Location
  • Configure E-mail Notification
    • Using Amazon SES as SMTP Service
    • Using Gmail as SMTP Service
  • Configure Extended E-mail Notification
    • Using Amazon SES as SMTP Service
    • Using Gmail as SMTP Service
  • Configure Agents
  • Configure SSH Server
  • Enable Ansible Plugin in Jenkins
  • Enable Monitoring Plugin in Jenkins

Jenkins CLI

  • Install Jenkins CLI
  • Configure Jenkins CLI in SSH Mode

Jenkins Node

  • Using Docker Containers as Jenkins Nodes
  • Configure Jenkins Node

Jenkins Freestyle

  • What is the Purpose of Jenkins Freestyle?
  • Setup CI/CD Using Jenkins Freestyle
    • General
    • Source Code Management
    • Build Triggers
    • Build Environment
    • Build
    • Post-build Actions
  • Trigger CI/CD of Jenkins Freestyle
    • Configure Webhook on GitHub
  • Manage Jenkins Freestyles
  • Do's and Dont's with Jenkins Freestyle

Jenkins Pipeline

  • What is the Purpose of Jenkins Pipeline?
  • Structure of Declarative Jenkins Pipeline
  • Setup CI/CD Using Jenkins Pipeline
    • General
    • Build Triggers
    • Pipeline
  • Trigger CI/CD of Jenkins Pipeline
    • Configure Webhook on GitHub
  • Manage Jenkins Pipelines
  • Do's and Dont's with Jenkins Pipeline

Jenkins Multibranch Pipeline

  • What is Jenkins Multibranch Pipeline?
  • What is the Purpose of Jenkins Multibranch Pipeline?
  • Setup CI/CD Using Jenkins Multibranch Pipeline
    • General
    • Build Triggers
    • Pipeline
  • Trigger CI/CD of Jenkins Multibranch Pipeline
    • Configure Webhook on GitHub
  • Manage Jenkins Multibranch Pipelines
  • Do's and Dont's with Jenkins Multibranch Pipeline

 

  • Why Monitoring & Metrics are important
  • Prometheus Architecture
  • Obtaining & Configuring Prometheus
  • Data collection methods
  • Service Discovery
  • Monitoring with Prometheus
  • Setting up alerts
  • Visualisation with Grafana

  

Introduction to ELK

  • What is Observability?
  • Understanding Observability
    • Log Data for Observability
    • Metric Data for Observability
    • Performance Data for Observability
    • Benefits of Observability
    • How to Choose an Observability Platform?
  • What is Log Management?
    • Major Log Management Tools/Services
  • What is Security Information & Event Management (SIEM)?
    • Major SIEM Tools/Services
  • What is Application Performance Management (APM)?
    • Major APM Tools/Services
  • What is Infrastructure Monitoring?
    • Major Infrastructure Monitoring Tools/Services
  • What is ELK?
    • Managed ELK Services 

File coming soon.

AWS DevOps

AWS-DevOps Course Contents

AWS DevOps Course Objectives

 Understand the principles and benefits of DevOps.

 Gain proficiency in utilizing AWS services for DevOps practices.

 Learn to automate software delivery pipelines using AWS tools.

 Implement infrastructure as code (IaC) using AWS CloudFormation.

 Develop skills in monitoring, logging, and debugging applications on AWS.

 Master continuous integration, and continuous deployment (CI/CD) pipelines on AWS.

 Learn best practices for security and compliance in DevOps workflows on AWS.

AWS DevOps Course Syllabus Structure

Introduction to DevOps and AWS Fundamentals

 Overview of DevOps principles, culture, and practices.

 Introduction to AWS services relevant to DevOps: EC2, S3, IAM, etc.

 Setting up AWS CLI and SDK for automation.

 Hands-on exercises: Basic AWS account setup and navigation.

Infrastructure as Code (IaC) with AWS CloudFormation

 Understanding Infrastructure as Code (IaC) concepts.

 Introduction to AWS CloudFormation for provisioning and managing AWS resources.

 Writing CloudFormation templates.

 Hands-on labs: Creating and deploying stacks using CloudFormation.

Continuous Integration and Deployment (CI/CD) on AWS

 Introduction to CI/CD pipelines.

 Setting up CI/CD pipelines using AWS CodePipeline.

 Integrating AWS CodeBuild and AWS CodeDeploy.

 Implementing automated testing in CI/CD pipelines.

 Hands-on project: Building a CI/CD pipeline for a sample application.

Monitoring, Logging, and Debugging on AWS

 Overview of AWS CloudWatch for monitoring and logging.

 Setting up CloudWatch alarms and dashboards.

 Utilizing CloudWatch Logs for log aggregation and analysis.

 Introduction to AWS X-Ray for application debugging.

 Hands-on exercises: Configuring monitoring and logging for sample applications.

Security and Compliance in AWS DevOps

 Best practices for securing AWS resources.

 Understanding AWS Identity and Access Management (IAM) for access control.

 Implementing security automation using AWS Config and AWS Security Hub.

 Compliance considerations in DevOps workflows.

File coming soon.

Microsoft Intune & Administration

Mastering Microsoft Intune & Administration


o Microsoft Intune Introduction.

o What is cloud-native endpoints?

o Exploring Windows 11 Enterprise in detail

o Windows Autopatch

o Bring Your Own Device (BYOD)

o What is Zero Trust?

o Windows 365 for non-managed endpoints

o Endpoint scenarios

o Identity roles and privileges for Microsoft Intune

o Identity roles and privileges for a Windows 365 cloud PC

o Identity roles and privileges for Universal Print

o Licensing requirements

o Using Intune filters when assigning

o Introduction to Microsoft 365

o Cloud-Native Endpoints

o Requirements for Microsoft Intune

o Supported OSes

o Required web browser versions

o Windows 11 hardware requirements

o How do you get Windows 11?

o Intune Administrator licensing

o Entra ID group-based licensing

o Setting the mobile device management authority

o Enabling Windows automatic enrolment

o Using Azure Virtual Desktop with Microsoft Intune

o Microsoft Intune device restrictions for Windows

o Blocking personal Windows devices

o Microsoft Intune device limit restrictions for Windows

o Customizing Intune Company Portal apps, the Company Portal website, and the Intune app

o Microsoft Intune – network URL firewall requirements

o Microsoft Store Endpoint URLs

o Windows 365 endpoint URLs

o Windows Push Notification Services – required URLs

o Windows 365 and Azure Virtual Desktop – required URLs

o Universal Print – required URLs

o Deploying existing Windows devices into Microsoft Intune

o What about on-premises devices?

o Co-management

o Tenant attach

o Microsoft Surface and other Original Equipment Manufacturer (OEM) devices

o Windows Update for Business (WUFB)

o Windows 10 and Windows 11 update rings

o Windows Autopatch

o Windows Autopatch requirements

o How to enable Windows Autopatch

o Optimize Windows Update Rings

o Enable Autopatch for Cloud PCs

o Technical requirements for deploying Windows 365

o Required URLs

o Remote Desktop Protocol (RDP) requirements

o Connect to on-premises networks (optional)

o Learn how to provision a Cloud PC

o Custom image management

o Moving Cloud PCs

o Security baselines

o Restore points

o Connecting to your Cloud PC

o Windows App

o User Actions

o Supported redirections per platform

o Windows 365 Boot shared mode

o Windows 365 Boot dedicated mode

o Windows 365 Switch

o Monitoring and analytics

o Windows 365 AI

o Windows 365 and Intune Suite

o Enterprise app management

o Windows Autopilot overview

o Uploading the hardware ID to Windows Autopilot

o Windows Autopilot for existing devices

o Windows updates during the Out-of-Box Experience (OOBE)

o Enrolment Status Page (ESP)

o Autopilot reporting and diagnostics

o Cloud configuration scenario

o Edge kiosk self-deployment scenario

o Remote Help

o Application delivery via Microsoft Intune

o Different application types you can deploy

o LOB applications

o Win32 apps

o Deploying Microsoft 365 apps

o Office Customization Tool

o Microsoft 365 Apps admin centre

o Deploying Microsoft Teams

o Deploying OneDrive

o Deploying Microsoft Edge

o What is Winget?

o What is MSIX?

o Policy management

o What is the Configuration Service Provider (CSP) policy?

o Windows Push Notification Service (WNS)

o Getting started with policy design

o Policy management within Microsoft Intune

o Migrating existing policies from Azure Directory (AD) – Group Policy management

o Configuring a policy from the Microsoft Intune Security blade

o Configuring your Endpoint security profile

o Windows unhealthy endpoints

o Configuring a policy from the settings catalog

o Configuring administrative templates

o OneDrive Known Folder Move configuration

o OneDrive – block syncing specific file extensions

o Configuring device configuration (template)

o Leveraging a custom policy as the last resort

o Pushing PowerShell scripts – scripted actions to endpoints

o Compliance policies

o Organizational compliance report

o What is Intune Suite?

o How to get started – requesting a trial

o Specialty device management

o Endpoint Privilege Management:

o Enterprise Application Management:

o How to install applications

o How to update/do versioning of applications

o Cloud certificate management (Cloud PKI)

o Advanced Endpoint Analytics

o The future of AI in Windows and Intune

o Copilot in Windows

o What can you use Copilot in Windows for?

o Security Copilot (device management)

o Intune policy validation via Security Copilot

o Troubleshooting Intune via Security Copilot

o Microsoft Identity

o Entra ID Users and groups

o Entra ID join or Hybrid Entra ID – What’s the best option?

o Conditional Access

o BitLocker disk encryption

o Personal Data Encryption

o Self-service Password Reset

o Entra ID password protection

o Password less authentication

o What is and isn’t supported in each password less scenario

o Application Control for Business

o Windows Local Administrator Password Solution

o Microsoft Defender for Endpoint

o Endpoint analytics

o Advanced monitoring

o OS restart history

o Resource performance

o Insights and recommendations – score trends

o Application Reliability

o Windows 365-specific metrics

o Insights and recommendations

o Customizing your baselines

o Cloud PC performance dashboard

o System alerts and email notifications

o Cloud PC utilization

o Resize cloud PCs

o Productivity Score

o Service health

o Advanced Analytics

o ControlUp Enrich

o What is Universal Print?

o Is Universal Print secure and where does my printed data go?

o Universal Print – architecture overview

o Configuring Universal Print

o Print clients – Windows

o Print clients – macOS

o Printers – Universal Print ready printers

o Creating a printer share for a printer

o Testing your Universal Print printer and printer share

o Assigning and deploying cloud printers with Microsoft Intune

File coming soon.

Azure DevOps

Course Content

Introduction to Microsoft Azure

Introduction to cloud computing?

1.2 What is Microsoft Azure?

1.3 Microsoft Azure Services

1.4 Creating a Microsoft Azure Account

1.5 Azure CLI, Azure PowerShell

1.6 Managing Azure Resources and Subscriptions

1.7 Azure Resource Manager

1.8 Microsoft Azure Architecture

ARM and Azure Storage

2.1 Azure Resources and Subscriptions

2.2 Azure Resource Manager

2.3 Managing Azure Resources

2.4 Azure Tags

2.5 Azure Storage Account and its types

2.6 Azure Blob Storage

2.7 Azure Content Delivery Network (CDN)

2.8 Azure Files Storage

2.9 Azure File Sync

Azure storage

3.1 Azure Table Storage

3.2 Azure Queue Storage

3.3 Azure Storage Explorer

3.4 Azure Shared Access Signature (SAS)

3.5 Azure Databox

3.6 Azure Storage Replication

3.7 Data Replication Options

3.8 Azure Import/Export Service

Azure Virtual Machines

4.1 Azure Virtual Machines

4.2 Data Disks in Azure

4.3 Azure VMs and Interfaces

4.4 ARM templates

4.5 VHD templates

4.6 Custom Images of Azure VM

4.7 Virtual Machine Scale Sets

4.8 Virtual Machine Availability Sets

Azure App and Container services

5.1 App Service Web App for Containers

5.2 App Service Plan

5.3 Networking for an App Service

5.4 Deployment Slots

5.5 Container image

5.6 Azure Kubernetes Service

5.7 Azure Container Registry

Azure Networking - I

6.1 Azure Virtual Networks

6.2 Azure VNet Components

6.3 IP Address – Public and Private IPs

6.4 Azure VNet Subnets

6.5 Azure Network Interface Cards (NIC)

6.6 Network Security Group (NSG)

6.7 Route Tables

6.8 Service Tags

6.9 Azure DNS

6.10 Private DNS

Azure Networking – II

7.1 Application Gateway

7.2 Azure Front Door Service

7.3 Azure Tra􀆯ic Manager

7.4 Application Security Groups

7.5 Azure Load Balancers

7.6 Azure Firewall

7.7 Azure Bastion

7.8 Network Watcher

7.9 Azure Express Route

7.10 Express Route Circuits

7.11 Express Route Peering

Authentication and Authorization in Azure using RBAC

8.1 Identity and Access Management in Azure

8.2 Role-Based Access Management (RBAC)

8.3 Role Definitions

8.4 Role Assignment in Azure Resources

8.5 Azure Users and Groups

8.6 RBAC Policies

Microsoft Azure Active Directory

9.1 Azure Active Directory (Azure AD)

9.2 Windows AD Vs Azure AD

9.3 Azure AD Users

9.4 Azure AD Groups

9.5 Azure AD Domains

9.6 Azure AD Tenants

9.7 Authentication Options

9.8 Azure AD Connect

9.9 Self Service Password Reset (SSPR)

9.10 Multi Factor Authentication (MFA)

9.11 Resource Locks

Azure Monitoring

10.1 Azure Monitor

10.2 Azure Metrics

10.3 Log Analytics

10.4 Alerts and Actions

10.5 Application Insights

10.6 Backup Reports

10.7 Recovery Services Vault

10.8 Backing Up Azure Virtual Machines

10.9 VM Backup Policies

10.10 Restoring Azure Virtual Machines

Azure DevOps and Azure Repos

23.1 Azure DevOps architecture

23.2 key features

23.3 Azure DevOps tools

23.4 Azure DevOps organizations and projects

23.5 Introduction to Azure Repos

23.6 Compare TFVC and Git

23.7 Key concepts in Azure repos

23.8 Search your code in Repos

23.9 what is TFVC

23.10 Azure Repos Integrations

Azure Artifacts and Azure Test Plans

24.1 What are azure artifacts

24.2 Key concepts in artifacts

24.3 working with packages

24.4 Feeds

24.5 views and upstream sources

24.6 Connecting to Azure pipelines

24.7 What are Azure test plans

24.8 Exploratory and manual testing

24.9 Test from kanban board

24.10 Creating Test Plans

24.11 Testing web apps

Azure Pipelines

25.1 What is Azure Pipelines

25.2 Why use Azure Pipelines

25.3 Deploying to Azure

25.4 Key concepts in Pipelines

25.5 CI Triggers in pipelines

25.6 YAML Basics

25.7 Ecosystems and Integration

25.8 Setting up CI build

25.9 Adding Tests to the Pipeline

25.10 Agents and Tasks

Azure Boards

26.1 What is Azure Boards

26.2 Why use Azure boards

26.3 agile project management best practices

26.4 Basic concepts of Azure Boards

26.5 Connecting boards to Github

26.6 Work items

26.7 Kanban boards

26.8 Sprints

26.9 Scrum and plans

26.10 Azure Boards integrations

File coming soon.

AWS Certified Solutions Architect- Associate

Course Content

 


Introduction

 The History of AWS

 AWS Cloud Services Overview

 Sign up for AWS

AWS Storage Services

 Identity and Access Management

 S3 Storage

 Create an S3 Bucket

 S3 Pricing Tiers

 S3 Security and Encryption

 S3 Versioning

 Lifecycle Management with S3

 S3 Object Lock and Glacier Vault Lock

 S3 Performance

 AWS Organizations and Consolidated Billing

 Sharing S3 Buckets Across Accounts

 Cross-Region Replication

 S3 Transfer Acceleration

 AWS DataSync

 CloudFront

 Create a CloudFront Distribution

 CloudFront Signed URLs and Cookies

 Snowball

 Storage Gateway

EC2 Elastic Compute Cloud

 Security Groups

 EBS

 EBS Volumes and Snapshots -

 AMI Types (EBS vs. Instance Store)

 ENI vs. ENA vs. EFA

 Encrypted Root Device Volumes and Snapshots

 Spot Instances and Spot Fleets

 EC2 Hibernate

 CloudWatch

 CloudWatch

 AWS Command Line (CLI)

 Identity and Access Management Roles

 Using Bootstrap Scripts

 Instance Metadata

 EFS

 Amazon FSx for Windows and Amazon FSx for Lustre

 EC2 Placement Groups

 HPC on AWS

 AWS WAF

Advanced IAM

 AWS Directory Service

 IAM Policies

 Resource Access Manager (RAM)

 AWS Single Sign-On

VPC Overview

 VPC Concepts

 Subnets

 Address space

 Internet Gateway

 Route Table

 NAT Instances and NAT Gateways

 Network Access Control Lists vs. Security Groups - Demo

 Custom VPCs and ELBs

 VPC Flow Logs

 AWS Direct Connect

 Setting Up Direct Connect

 Global Accelerator

 VPC Endpoints

 AWS PrivateLink

 AWS Transit Gateway

 AWS VPN CloudHub

 AWS Network Costs

AWS Route 53

 DNS

 Register a Domain Name

 Route 53 Routing Policies Available on AWS

 Route 53: Simple Routing Policy

 Route 53: Weighted Routing Policy

 Route 53: Latency-Based Policy

 Route 53: Failover Routing Policy

 Route 53: Geolocation Routing Policy

 Route 53: Geoproximity Routing Policy (Traffic Flow Only)

 Route 53: Multivalue Answer Policy

HA Architecture

 Elastic Load Balancer

 Load Balancers and Health Checks

 Advanced Load Balancer Theory

 Auto Scaling

 Launch Configurations and Auto Scaling Groups

 Elastic Beanstalk

 High Availability with Bastion Host

 On-Premises Strategies with AWS

Databases

 RDS Instance - Demo

 RDS: Backups, Multi-AZ, and Read Replicas

 DynamoDB

 Advanced DynamoDB

 Redshift

 Aurora

 Elasticache

 Database Migration Service (DMS)

 Caching Strategies on AWS

 EMR Overview

AWS Architect Topics

Domain 1.0:

Designing highly available, cost-efficient, fault-tolerant, scalable systems 1.1 Identify and recognize cloud architecture

considerations, such as fundamental components and effective designs.

Content may include the following:

• How to design cloud services

• Planning and design

• Monitoring and logging

• Familiarity with: o Best practices for AWS architecture o Developing to client specifications, including pricing/cost

(e.g., on Demand vs. Reserved vs. Spot; RTO and RPO DR Design) o Architectural trade-off decisions (e.g., high

availability vs. cost, Amazon Relational Database Service (RDS) vs. installing your own database on Amazon Elastic

Compute Cloud (EC2)) o Hybrid IT architectures (e.g., Direct Connect, Storage Gateway, VPC, Directory Services) o

Elasticity and scalability (e.g., Auto Scaling, SQS, ELB, CloudFront)

Domain 2.0:

Implementation/Deployment 2.1 Identify the appropriate techniques and methods using Amazon EC2, Amazon S3,

AWS Elastic Beanstalk, AWS CloudFormation, AWS OpsWorks, Amazon Virtual Private Cloud (VPC), and AWS Identity

and Access Management (IAM) to code and implement a cloud solution.

Content may include the following:

• Configure an Amazon Machine Image (AMI)

• Operate and extend service management in a hybrid IT architecture

• Configure services to support compliance requirements in the cloud

• Launch instances across the AWS global infrastructure

• Configure IAM policies and best practices

Domain 3.0:

Data Security 3.1

Recognize and implement secure practices for optimum cloud deployment and maintenance. Content may include the

following:

• AWS shared responsibility model

• AWS platform compliance

• AWS security attributes (customer workloads down to physical layer)

• AWS administration and security services

• AWS Identity and Access Management (IAM)

• Amazon Virtual Private Cloud (VPC)

• AWS CloudTrail • Ingress vs. egress filtering, and which AWS services and features fit

• “Core” Amazon EC2 and S3 security feature sets

• Incorporating common conventional security products (Firewall, VPN)

• Design patterns

• DoS mitigation

• Encryption solutions (e.g., key services)

• Complex access controls (building sophisticated security groups, ACLs, etc.)

• Amazon CloudWatch for the security architect

• Trusted Advisor

• CloudWatch

Recognize critical disaster recovery techniques and their implementation. Content may include the following:

• Disaster recovery o Recovery time objective

o Recovery point objective

o Amazon Elastic Block Store

• AWS Import/Export

• AWS Storage Gateway

• Amazon Route53

• Validation of data recovery method

Domain 4.0:

Troubleshooting Content may include the following:

• General troubleshooting information and questions

File coming soon.

Nutanix Certified Professional

Download PDF

RedHat OpenShift

Download PDF

Copyright © 2026 Rectus Infotech - All Rights Reserved.

Powered by

  • Course
  • Info
  • Career
  • Contact us

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept