What’s popular in system administration
Your source for what’s next
Popular in live online training
See allJanuary 14, 2022
Linux Systems First Steps
Presented by Brian Ward
Exploring Linux systems: The kernel, user space, filesystems, and beyond Between the programs you run and your computerâs hardware is the operating system, software that consists of a kernel and a ...

January 26, 2022
Exam SC-300: Microsoft Identity and Access Administrator Crash Course
Presented by Razi Rais
Ramp up your cloud security skills with Azure Active Directory Microsoft Identity and Access Administrators design, implement, and operate an organizationâs identity and access management systems using Azure Active Directory (Azure ...

January 18, 2022
Getting Started with Cloud Computing
Presented by Michael Shannon
Essential Knowledge for Cloud Basics and Studying for the CompTIA Cloud+ Exam Cloud computing is quickly becoming one of the most important topics you can learn to stay current in todayâs ...

January 28, 2022
Exam MS-100: Microsoft 365 Identity and Services Crash Course
Presented by Dan Costello
As organizations continue to migrate all of their mission critical applications and services to Microsoft 365, the role of Microsoft 365 Enterprise Administrator is becoming ever more central to the successful ...

February 2, 2022
From IT to DevOps in 4 Hours
Presented by Paul Furlan
Strategies, Guidance, and Techniques for Evolving Your IT Career DevOps has become one of the most popular and talked about concepts within Information Technologies in the past couple of years. At ...

January 25 & 26, 2022
A Practical Introduction to DevSecOps
Presented by Chris Jackson
Leveraging DevSecOps to increase business speed, agility, and security DevOps has taken the world by storm, but what about security? Can you expect to operate at the speed of cloud, and ...

Popular in interactive learning
See allUse No New Privileges Flag to Secure Containers
By O'Reilly Media, Inc.
In this scenario, you'll learn how to block containers from gaining additional user privileges, even when running as a non-root user. ...
Cloud Native Data: Data Partitioning
By Peter Jausovec
Partitioning data to improve scalability and optimize performance ...
Cloud Native Data: Materialized Views
By Peter Jausovec
Generating materialized views over data in multiple data stores ...
RHCSA Challenge - Autostarting Rootless Containers
By Sander van Vugt
In this challenge you'll practice how to run a rootless container and configure this container to automatically start as well. ...
Ethical Hacking: Active Recon - Scanning Containers with Trivy
By Omar / Derek Santos / Santos
In this interactive scenario you will learn how to scan Docker containers to find security vulnerabilities using Trivy. ...
Get Started with Container Security and Seccomp
By O'Reilly Media, Inc.
In this scenario, you'll learn how to apply Seccomp to reduce the attack surface of containers. ...