Building and maintaining quality software requires functional configuration management, but this is easier said than done in today’s day and age. This process involves automation, but minimizing errors while securely and systematically managing changes in systems is complicated. This course provides Systems Developers, Network Operations Specialists, System Administrators, and Systems Security Analysts with the necessary skills to consistently and securely manage environments.
On successful completion of this course, learners should have the knowledge and skills to:
- Ensure the coordination and consistency of security policies across the enterprise
- Understand the importance of maintaining immutability of live container instances, ensuring that changes occur in the source control and are only deployed via new versions of the resource
- Understand the role of third-party tools such as Clair, Actuary, and Anchore in testing Infrastructure-as-Code (IAC) and Configuration-as-Code (CAC) platforms