• Online, Self-Paced
Course Description

There are different ways to refactor Puppet configurations. In this course, you'll learn techniques to mitigate the risk and increase the success of Puppet configuration refactoring as it relates to the Puppet master and the Puppet agent.

Learning Objectives

Puppet Functions

  • start the course
  • analyze the Puppet Include function
  • analyze and use the Puppet Defined function
  • identify how to correctly design a custom Puppet function
  • code a new Puppet function

The Puppet API

  • describe how Puppet uses REST
  • define the techniques for Puppet REST API Security
  • describe how the Puppet file server works

Configuration Management

  • describe how to extend the functionality of Facter
  • discover the ways Puppet uses local directories
  • describe how to create Ruby based facts
  • describe how to provide advanced configuration with modules
  • describe how to provide advanced configuration with roles and profiles

Practice: Refactoring Puppet Configuration

  • refactor Puppet Configuration

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.