Alert:

This is the sole official MRGT platform. All information on our partners and affiliates is published here. Any individual or organization claiming association outside this site is unauthorized, and MRGT accepts no responsibility for their training programs, services, or any other engagements.

Your Pathway to
Global IT Certification

Master Open-Source Excellence with Industry-Leading Technologies

Red Hat is the world’s leading provider of open-source enterprise solutions. It delivers high-performing cloud, Kubernetes, Linux, and container technologies through a community-powered model. Red Hat supports cloud-native application development, environment standardization, automation, security, and complicated environment management.

Mature Resources Global Technologies (MRGT) is Authorized  Red Hat Training Partner. We are proud to offer Red Hats full portfolio of courses and certifications: Red Hat Enterprise Linux, Red Hat JBoss Middleware, Red Hat JBoss Fuse, DevOps, and cloud. Customers will be able to prove their skills by taking certification exams that span the entire Red Hat product portfolio, including the Red Hat Certified System Administrator (RHCSA) and Red Hat Certified Engineer (RHCE) exams for both Red Hat Enterprise Linux and Red Hat OpenStack Platform.

Infrastructure

Learn to manage, secure, and automate enterprise IT infrastructure using Red Hat Enterprise Linux.

Edit Content
Red Hat Certified System Administrator (RHCSA)

Course Outline

Access systems and get help: Log in to local and remote Linux systems, and investigate problem resolution methods provided through Red Hat Insights and support.
Navigate file systems: Copy, move, create, delete, and organize files while working from the bash shell.
Manage local users and groups:  Create, manage, and delete local users and groups and administer local password policies.
Control access to files: Set Linux file system permissions on files and to interpret the security effects of different permission settings.
Manage SELinux security: Protect and manage the security of a server by using SELinux.
Tune system performance: Evaluate and control processes, set tuning parameters, and adjust process scheduling priorities on a Red Hat Enterprise Linux system.
Install and update software packages: Download, install, update, and manage software packages from Red Hat and DNF package repositories.
Manage basic storage: Create and manage storage devices, partitions, file systems, and swap spaces from the command line.
Control services and the boot process: Control and monitor network services, system daemons, and the boot process using systemd.
Manage networking: Configure network interfaces and settings on Red Hat Enterprise Linux servers.
Analyze and store logs: Locate and accurately interpret logs of system events for troubleshooting purposes.
Implement advanced storage features: Create and manage logical volumes containing file systems and swap spaces from the command line, and configure advanced storage features with Stratis and VDO.
Schedule future tasks: Schedule tasks to automatically execute in the future.
Access network-attached storage: Access network-attached storage, using the NFS protocol.
Manage network security: Control network connections to services using the system firewall and SELinux rules.
Running Containers: Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.

Course Outline

Manage security and risk: Define strategies to manage security on Red Hat Enterprise Linux servers.
Automate configuration and remediation with Ansible: Remediate configuration and security issues with Ansible Playbooks.
Protect data with LUKS and NBDE: Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted.
Restrict USB device access: Protect system from rogue USB device access with USBGuard.
Control authentication with PAM: Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs).
Record system events with audit: Record and inspect system events relevant to security, using the Linux kernel’s audit subsystem and supporting tools.
Monitor file system changes: Detect and analyze changes to a server’s file systems and their contents using AIDE.
Mitigate risk with SELinux: Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses.
Manage compliance with OpenSCAP: Evaluate and remediate a server’s compliance with security policies by using OpenSCAP.
Automate compliance with Red Hat Satellite: Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite.
Analyze and remediate issues with Red Hat Insights: Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights.
Perform a comprehensive review: Review the content covered in this course by completing hands-on review exercises.

Course Outline

Introduction to troubleshooting: Describe a generalized strategy for troubleshooting.
Take proactive steps to prevent small issues: Prevent small issues from becoming large problems by employing proactive system administration techniques.
Troubleshoot boot issues: Identify and resolve issues that can affect a system’s ability to boot.
Identify hardware issues: Identify hardware problems that can affect a system’s ability to operate.
Troubleshoot storage issues: Identify and fix issues related to storage.
Troubleshoot RPM issues: Identify and fix problems in, and using, the package management subsystem.
Troubleshoot network issues: Identify and resolve network connectivity issues.
Troubleshoot application issues: Debug application issues.
Deal with security issues: Identify and fix issues related to security subsystems.
Troubleshoot kernel issues: Identify kernel issues and assist Red Hat Support in resolving kernel issues.
Red Hat Enterprise Linux Diagnostics and Troubleshooting comprehensive review: Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.

Course Outline

Identity Management in Red Hat Enterprise Linux: Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture.
Identity Management Core Technologies:Review the core technologies of Identity Management (IdM) in Red Hat Enterprise Linux.
Installing Identity Management in Red Hat Enterprise Linux: Install Identity Management servers, replicas, and clients on Red Hat Enterprise Linux 9.
Implementing an Identity Management Topology: Implement continuous functionality and high availability of IdM services in single-site and geographically distributed topologies.
Managing the CA and DNS Integrated Services: Manage the Certificate Authority (CA) and the Domain Name System (DNS) services that are integrated with Identity Management.
Managing Users and Controlling User Access: Configure users for authorized access to services and resources.
Configuring Alternative Authentication Services: Configure and manage smart card authentication, secrets, and two-factor authentication.
Integrating Identity Management with Active Directory: Implement a cross-forest trust between Identity Management and Active Directory, and configure ID views to map POSIX attributes to Active Directory users.
Integrating Identity Management with Red Hat Utilities: Integrate an Identity Management deployment with Red Hat Satellite and Red Hat Ansible Automation Platform.
Troubleshooting and Disaster Recovery Planning for IdM: Troubleshooting and preparing for disaster recovery with Identity Management.
Comprehensive Review: Build a small, resilient Identity Management topology to include multiple replicas and clients, populated with multiple users, credentials, policies, and access rights.

Course Outline

Course Outline

Introduction to troubleshooting:Describe a generalized strategy for troubleshooting.
Take proactive steps to prevent small issues: Prevent small issues from becoming large problems by employing proactive system administration techniques.
Troubleshoot boot issues: Identify and resolve issues that can affect a system’s ability to boot.
Identify hardware issues: Identify hardware problems that can affect a system’s ability to operate.
Troubleshoot storage issues: Identify and fix issues related to storage.
Troubleshoot RPM issues: Identify and fix problems in, and using, the package management subsystem.
Troubleshoot network issues: Identify and resolve network connectivity issues.
Troubleshoot application issues: Debug application issues.
Deal with security issues: Identify and fix issues related to security subsystems.
Troubleshoot kernel issues: Identify kernel issues and assist Red Hat Support in resolving kernel issues.
Red Hat Enterprise Linux Diagnostics and Troubleshooting comprehensive review: Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.

Cloud

Build skills to deploy and manage cloud-native applications and hybrid cloud environments with Red Hat OpenStack and OpenShift.

Edit Content
Red Hat Certified System Administrator in Red Hat OpenStack (RHCSA in OpenStack)

Course Outline

Introduction to Red Hat OpenStack Platform: Describe OpenStack personas, launch an instance, and describe the OpenStack components and architecture.
Manage application projects in a multitenant cloud: Create and configure projects with secure user access and sufficient resources to support cloud user application deployment requirements.
Manage OpenStack networking: Describe how IP networks are implemented in OpenStack, including fundamental TCP/IP stack behavior, software-defined networking elements, and the common types of networks available to self-service cloud users.
Configure resources to launch a non-public instance: Configure the requisite resource types for launching a basic non-public instance, including vCPUs, memory, and a system disk image, and launch an instance of an application component that runs in a tenant network with no public access.
Configure virtual machine system disks: Identify the available choices for configuring, storing and selecting block-based virtual machine (VM) system disks, including the choice of ephemeral or persistent disks for specific use cases.
Provide additional storage strategies: Identify the available choices for additional cloud storage techniques, including object-based storage, network file sharing, and volumes sourced from a file sharing service.
Configure resources to launch an instance with public access: Identify and configure the additional resource types required to launch instances with public access for specific use cases, including networking and access security elements.
Automate customized cloud application launches: Configure and deploy a typical multi-tier cloud application stack, defined as an architected template of scalable VM instances, including per-instance launch customizations.
Manage cloud application placement: Introduce overcloud layouts more complex than a single site, and explain the management resources to control the placement of launched instances, including segregation elements such as cells and availability zones, and placement attributes such as requisite compute node resources.

DevOps

Master DevOps practices including CI/CD, automation, and container orchestration using Ansible and Kubernetes.

Edit Content
Red Hat OpenShift Administration

Course Outline

Introduction to Kubernetes and OpenShift: Identify the main Kubernetes cluster services and OpenShift platform services, and monitor them from the web console.
Kubernetes and OpenShift Command-Line Interfaces and APIs: Access an OpenShift cluster from the command line, and query its Kubernetes API resources to assess the health of a cluster.
Run Applications as Containers and Pods: Run and troubleshoot containerized applications as unmanaged Kubernetes pods.
Deploy Managed and Networked Applications on Kubernetes: Deploy applications and expose them to network access from inside and outside a Kubernetes cluster.
Manage Storage for Application Configuration and Data: Externalize application configurations in Kubernetes resources, and provision storage volumes for persistent data files.
Configure Applications for Reliability: Configure applications to work with Kubernetes for high availability and resilience.
Manage Application Updates: Manage reproducible application updates and rollbacks of code and configurations

Course Outline

Declarative Resource: Management Deploy and update applications from resource manifests that are parameterized for different target environments.
Deploy Packaged Applications: Deploy and update applications from resource manifests that are packaged for sharing and distribution.
Authentication and Authorization: Configure authentication with the HTPasswd identity provider and assign roles to users and groups.
Network Security: Protect network traffic between applications inside and outside the cluster.
Expose non-HTTP/SNI Applications: Expose applications to external access without using an Ingress controller.
Enable Developer Self-Service: Configure clusters for safe self-service by developers from multiple teams and disallow selfservice if projects have to be provisioned by the operations staff.
Manage Kubernetes Operators: Install and update Operators that are managed by the Operator Lifecycle Manager and by the Cluster Version Operator.
Application Security: Run applications that require elevated or special privileges from the host Operating System or Kubernetes.
OpenShift Updates: Update an OpenShift cluster and minimize disruption to deployed applications.

Application Development

Develop, deploy, and maintain scalable applications using Red Hat’s open-source development tools and frameworks.

Edit Content
Red Hat Certified Specialist in OpenShift Application Development

Course Outline

Red Hat OpenShift Container Platform for Developers: Define the Red Hat OpenShift architecture, concepts and terminology, and set up the developer environment.
Deploying Simple Applications: Deploy simple applications by using the Red Hat OpenShift web console and command-line tools.
Building and Publishing Container Images: Build, deploy and manage the lifecycle of container images by using a container registry.
Managing Red Hat OpenShift Builds: Describe the Red Hat OpenShift build process and build container images.
Managing Red Hat OpenShift Deployments: Describe the different Red Hat OpenShift deployment strategies and how to monitor the health of applications.
Deploying Multi-container Applications: Deploy multi-container applications by using Red Hat OpenShift templates, Helm charts, and Kustomize.
Continuous Deployment using Red Hat OpenShift Pipelines: Implement CI/CD workflows by using Red Hat OpenShift Pipelines
Red Hat OpenShift Container Platform for Developers: Define the Red Hat OpenShift architecture, concepts and terminology, and set up the developer environment.
Deploying Simple Applications: Deploy simple applications by using the Red Hat OpenShift web console and command-line tools.
Building and Publishing Container Images
Build, deploy and manage the lifecycle of container images by using a container registry.
Managing Red Hat OpenShift Builds: Describe the Red Hat OpenShift build process and build container images.
Managing Red Hat OpenShift Deployments: Describe the different Red Hat OpenShift deployment strategies and how to monitor the health of applications.
Deploying Multi-container Applications: Deploy multi-container applications by using Red Hat OpenShift templates, Helm charts, and Kustomize.
Continuous Deployment using Red Hat OpenShift Pipelines: Implement CI/CD workflows by using Red Hat OpenShift Pipelines

Course Outline

Course Outline

Red Hat Virtualization overview: Explain the purpose and architecture of Red Hat Virtualization.
Install and configure Red Hat Virtualization: Install a minimal Red Hat Virtualization environment and use it to create a virtual machine.
Create and manage datacenters and clusters: Organize hypervisors into groups using datacenters and clusters.
Manage user accounts and roles: Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities.
Adding physical hosts: Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed.
Scale Red Hat Virtualization infrastructure: Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed.
Manage Red Hat Virtualization networks: Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization.
Manage Red Hat Virtualization storage: Create and manage data and ISO storage domains.
Deploy and manage virtual machines: Operate virtual machines in the Red Hat Virtualization environment.
Migrate virtual machines: Migrate and control automatic migration of virtual machines.
Manage virtual machine images: Manage virtual machine snapshots and disk images.
Automating virtual machine deployment: Automate deployment of virtual machines by using templates and cloud-init.
Back up and upgrade Red Hat Virtualization: Back up, restore, and upgrade the software in a Red Hat Virtualization environment.
Explore high-availability practices: Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features.
Perform comprehensive review: Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization.

Course Outline

Storage

Gain hands-on experience in deploying and managing scalable, resilient storage solutions with Red Hat Gluster Storage and Ceph.

Edit Content
Red Hat Certified System Administrator in Red Hat Gluster Storage

Course Outline

Course Outline

Course Outline

Middleware

Learn how to integrate and automate business processes using Red Hat JBoss Middleware for modern application environments.

Edit Content
Red Hat Certified Specialist in Camel Development

Course Outline

Course Outline

Course Outline

Overview of JBoss Enterprise Application Platform (JBoss EAP)
Learn the concepts and terminology of JBoss EAP 7.
Install and run a JBoss EAP instance.
Understand extensions, profiles, and subsystems.
Configure JBoss EAP in standalone mode
Run and configure JBoss EAP in standalone mode.
Configure interfaces and socket binding groups.
Script configure and deploy applications
Configure JBoss EAP with command line interface.
Deploying applications in standalone mode.
Configure JBoss Enterprise Application Platform as a managed domain
Run JBoss EAP as a managed domain.
Assign a domain controller.
Configure a host controller and domain controller.
Configure servers in a managed domain
Manage domain server architecture.
Configure servers and server groups.
Configure datasources
Explore the datasource subsystem and configure JDBC drivers, datasources, and an XA datasource.
Configure the logging subsystem
Configure loggers and logging handlers.
Configure the messaging subsystem
Explore the messaging subsystem.
Configure messaging resources, journals, and other settings.
Secure JBoss EAP
Configure a database security realm, an LDAP security realm, and password vault.
Secure a JMS Destination.
Configure the Java Virtual Machine (JVM)
Configure the JVM in standalone mode and in a managed domain.
Configure the web subsystem
Explore and configure the features of the web subsystem.
Deploy clustered applications
Explore clustered applications.
Configure subsystems that support clustered applications and configure load balancing.
Deploy HA Singleton applications.
Configure the batch subsystem
Explore and configure batch jobs and batch subsystem.
Discover new features in JBoss EAP 7
Explore the new features in JBoss EAP 7. Migrate JBoss EAP 6 applications to JBoss EAP 7.
Comprehensive Review of Red Hat JBoss Application Administration I
Review the tasks in Red Hat JBoss Application Administration I.

Course Outline

Start your Training Today!

Jumpstart your future with in-demand tech skills. Submit your details and our team will get in touch to guide you through the next steps.