We may earn an affiliate commission when you visit our partners.
Sean Douglas

This course will introduce you to how Cisco AppDynamics, ThousandEyes, and Intersight Workload Optimizer provide observability across the entire stack of applications, infrastructure, and security with real-time insights and business context.

Read more

This course will introduce you to how Cisco AppDynamics, ThousandEyes, and Intersight Workload Optimizer provide observability across the entire stack of applications, infrastructure, and security with real-time insights and business context.

These days, many organizations are experiencing enormous challenges in providing, securing, and optimizing an ever-growing demand of web/mobile applications and digital services in a cost-effective manner. As these applications can now be deployed from anywhere – within their private data center, public cloud, SaaS – it is beyond human scale to monitor everything that impacts the applications. In this course, Introduction to Application Observability Using Cisco AppDynamics and ThousandEyes, you will be introduced to Cisco’s application observability solution and the foundation components of that solution – AppDynamics, ThousandEyes, and Intersight Optimizer. First, you’ll learn how the core foundational components of full-stack observability provides insight and visibility into both the application and user digital experience. Next, you will learn how to navigate AppDynamics and deploy ThousandEyes agents into your hybrid-cloud environments so that you can create various tests and process their results. Finally, you’ll learn how AppDynamics Secure Application can be used to protect the application against attacks in real time, as well as identify vulnerabilities and threats. When you’re finished with this course, you’ll have fundamental knowledge of application observability to translate concepts and ideas from the hands-on demonstrations to be utilized for your organization, clients, and customers.

Enroll now

What's inside

Syllabus

Course Overview
Examining Core Foundation of Full-stack Observability
Implementing Application Monitoring with Cisco AppDynamics
Implementing Digital Experience Monitoring Using Cisco ThousandEyes
Read more
Implementing Optimization with AppDynamics and Intersight
Implementing Secure Application with AppDynamics

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines overarching components of full-stack observability
Teaches application monitoring, which is core for keeping code running smoothly
Provides real-time insights and business context for developers using Cisco AppDynamics and ThousandEyes
Teaches how to implement optimizations with AppDynamics and Intersight
Explores how to implement secure applications using AppDynamics to enhance business

Save this course

Save Securing Linux for the Cloud to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Securing Linux for the Cloud with these activities:
Review basic networking concepts
Refresh your understanding of fundamental networking concepts to enhance your comprehension of AppDynamics and ThousandEyes.
Browse courses on Networking Basics
Show steps
  • Read articles or watch videos about basic networking concepts.
  • Take a quiz or practice questions to test your understanding.
AppDynamics resources collection
Gather a collection of useful AppDynamics resources, such as documentation, tutorials, and blog posts.
Show steps
  • Use Google or other search engines to find AppDynamics resources.
  • Bookmark or save the links to the most relevant resources.
  • Organize the resources into categories, such as documentation, tutorials, and blog posts.
  • Share your collection with other students or colleagues.
AppDynamics user group meeting
Connect with other AppDynamics users to share knowledge, ask questions, and stay up-to-date with the latest trends.
Browse courses on Networking
Show steps
  • Find a local AppDynamics user group.
  • Attend a meeting and introduce yourself.
  • Participate in discussions and ask questions.
  • Share your own experiences and insights.
  • Follow up with new connections after the meeting.
Four other activities
Expand to see all activities and additional details
Show all seven activities
ThousandEyes synthetic monitoring exercises
Complete hands-on exercises to develop proficiency in using ThousandEyes for synthetic monitoring and network performance testing.
Browse courses on Network Monitoring
Show steps
  • Sign up for a free trial of ThousandEyes.
  • Create a few synthetic tests to monitor your network.
  • Analyze the results of your tests.
  • Use ThousandEyes to troubleshoot any network issues you identify.
AppDynamics metric analysis exercises
Solve a series of exercises that provide hands-on practice in analyzing metrics and identifying performance issues using AppDynamics.
Show steps
  • Download sample AppDynamics data.
  • Import the data into your favorite data analysis tool.
  • Analyze the data to identify trends, outliers, and performance bottlenecks.
  • Create visualizations to illustrate your findings.
  • Write a brief report summarizing your analysis.
Network troubleshooting with ThousandEyes
Practice real-world network troubleshooting scenarios to strengthen understanding of ThousandEyes capabilities and network troubleshooting techniques.
Browse courses on Network Troubleshooting
Show steps
  • Register for a free ThousandEyes account.
  • Create a few simple synthetic tests to monitor your network.
  • Introduce latency to your network using a tool like tc.
  • Use ThousandEyes to troubleshoot the latency issue.
  • Write a brief report on your findings, including steps taken to troubleshoot the issue.
Mock vulnerability report
Create a comprehensive vulnerability report as if working as a security analyst, using AppDynamics Secure Application to detect and prioritize vulnerabilities.
Browse courses on Vulnerability Assessment
Show steps
  • Install and configure AppDynamics Secure Application on a target system.
  • Run a vulnerability scan and analyze the results.
  • Determine the severity and potential impact of the vulnerabilities.
  • Prioritize the vulnerabilities based on risk and impact.
  • Create a detailed report documenting the findings and recommendations for remediation.

Career center

Learners who complete Securing Linux for the Cloud will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information and systems from security threats. They use their knowledge of information security techniques and tools to create and manage information security measures that can prevent, detect, and respond to security threats. This course will introduce you to the basics of information security, including information security techniques, information security tools, and information security applications. It will also provide you with hands-on experience in using information security techniques and tools to create and manage information security measures.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security measures to protect an organization's information and systems. They use their knowledge of security principles and security technologies to create and manage security measures that prevent, detect, and respond to security threats. This course will introduce you to the basics of security, including security principles, security technologies, and security practices. It will also provide you with hands-on experience in using security tools and practices to protect an organization's information and systems.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting an organization's computer networks and systems from cyber threats. They use their knowledge of cybersecurity techniques and tools to create and manage cybersecurity measures that can prevent, detect, and respond to cyber threats. This course will introduce you to the basics of cybersecurity, including cybersecurity techniques, cybersecurity tools, and cybersecurity applications. It will also provide you with hands-on experience in using cybersecurity techniques and tools to create and manage cybersecurity measures.
DevOps Engineer
DevOps Engineers are responsible for bridging the gap between software development and IT operations. They use their knowledge of software development and IT operations to create and maintain software applications that are reliable, scalable, and secure. This course will introduce you to the basics of DevOps, including DevOps principles, DevOps tools, and DevOps practices. It will also provide you with hands-on experience in using DevOps tools and practices to create and maintain software applications.
Cloud Engineer
Cloud Engineers are responsible for designing, building, and maintaining cloud-based infrastructure. They use their knowledge of cloud computing technologies to create and manage cloud-based applications and services. This course will introduce you to the basics of cloud computing, including cloud computing architectures, cloud computing services, and cloud computing security. It will also provide you with hands-on experience in designing and building cloud-based applications and services using a variety of cloud computing technologies.
Network Engineer
Network Engineers are responsible for designing, building, and maintaining computer networks. They use their knowledge of networking technologies to create and manage networks that are reliable, scalable, and secure. This course will introduce you to the basics of networking, including networking architectures, networking protocols, and networking security. It will also provide you with hands-on experience in designing and building networks using a variety of networking technologies.
Machine Learning Engineer
Machine Learning Engineers are responsible for designing, developing, and maintaining machine learning models. They use their knowledge of machine learning techniques and tools to create and manage machine learning models that can learn from data and make predictions. This course will introduce you to the basics of machine learning, including machine learning techniques, machine learning tools, and machine learning applications. It will also provide you with hands-on experience in using machine learning techniques and tools to create and manage machine learning models.
Software Developer
Software Developers are responsible for designing, developing, and maintaining software applications. They use their knowledge of programming languages and software development tools to create software that meets the needs of users. This course will introduce you to the basics of software development, including programming languages, software design principles, and software testing. It will also provide you with hands-on experience in developing software applications using a variety of programming languages and software development tools.
Quality Assurance Analyst
Quality Assurance Analysts are responsible for testing software applications to ensure that they meet the needs of users. They use their knowledge of quality assurance techniques and tools to create and manage test plans that can be used to test software applications for defects. This course will introduce you to the basics of quality assurance, including quality assurance techniques, quality assurance tools, and quality assurance applications. It will also provide you with hands-on experience in using quality assurance techniques and tools to create and manage test plans.
Data Scientist
Data Scientists are responsible for using data to solve business problems. They use their knowledge of data science techniques and tools to collect, analyze, and interpret data to identify trends, patterns, and insights. This course will introduce you to the basics of data science, including data science techniques, data science tools, and data science applications. It will also provide you with hands-on experience in using data science techniques and tools to solve business problems.
Business Analyst
Business Analysts are responsible for understanding the needs of a business and developing solutions to meet those needs. They use their knowledge of business analysis techniques and tools to create and manage business analysis reports that can be used to inform decision-making. This course will introduce you to the basics of business analysis, including business analysis techniques, business analysis tools, and business analysis applications. It will also provide you with hands-on experience in using business analysis techniques and tools to create and manage business analysis reports.
Data Analyst
Data Analysts are responsible for collecting, analyzing, and interpreting data to identify trends, patterns, and insights. They use their knowledge of data analysis techniques and tools to create and manage data analysis reports that can be used to inform decision-making. This course will introduce you to the basics of data analysis, including data analysis techniques, data analysis tools, and data analysis applications. It will also provide you with hands-on experience in using data analysis techniques and tools to create and manage data analysis reports.
Technical Writer
Technical Writers are responsible for creating and maintaining technical documentation. They use their knowledge of technical writing techniques and tools to create and manage technical documents that can be used to communicate technical information to users. This course will introduce you to the basics of technical writing, including technical writing techniques, technical writing tools, and technical writing applications. It will also provide you with hands-on experience in using technical writing techniques and tools to create and manage technical documents.
User Experience Designer
User Experience Designers are responsible for creating and maintaining user interfaces. They use their knowledge of user experience design techniques and tools to create and manage user interfaces that are easy to use and enjoyable to use. This course will introduce you to the basics of user experience design, including user experience design techniques, user experience design tools, and user experience design applications. It will also provide you with hands-on experience in using user experience design techniques and tools to create and manage user interfaces.
Project Manager
Project Managers are responsible for planning, executing, and closing projects. They use their knowledge of project management techniques and tools to create and manage project plans that can be used to guide project teams to success. This course will introduce you to the basics of project management, including project management techniques, project management tools, and project management applications. It will also provide you with hands-on experience in using project management techniques and tools to create and manage project plans.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Securing Linux for the Cloud.
Provides a comprehensive overview of Kubernetes security, exploring best practices and techniques for hardening your Kubernetes clusters, securing your workloads, and defending against threats.
This widely adopted textbook provides a comprehensive foundation in cloud security, covering cloud security concepts, threats and risks, regulatory compliance, and best practices for securing cloud-based infrastructure, applications, and data.
Aimed at system administrators, this book offers a practical approach to securing Linux systems, covering hardening techniques, intrusion detection and prevention, and incident response, providing valuable insights into securing Linux environments.
This in-depth book explores the security mechanisms of the Linux kernel, providing a strong foundation for understanding the underlying security features of Linux systems.
This classic book provides a comprehensive overview of security engineering principles and practices, offering valuable insights into designing and implementing secure systems.
This textbook offers a comprehensive introduction to network security, covering topics such as cryptography, network protocols, and security standards. It provides a strong foundation for understanding the security concepts discussed in the course.
This comprehensive textbook provides a thorough exploration of cryptography and network security principles. It covers a wide range of topics, from basic concepts to advanced techniques, making it a valuable resource for those seeking a deeper understanding of these subjects.
Provides an overview of cloud computing concepts, technologies, and architectures. It is valuable for understanding the basics of cloud computing and its implications for security.
Discusses cloud security practices and techniques, providing guidance on risk management, security architecture, and incident response in cloud environments, offering valuable insights into securing cloud deployments.
Provides a practical guide to Linux system administration. It covers various tasks, including user management, file permissions, and package management. It can serve as a useful reference for those who want to gain hands-on experience with Linux system administration.
This classic book tells the true story of a security incident investigation. It provides insights into the techniques and tactics used by attackers and valuable read for anyone interested in computer security history.
This autobiography of Kevin Mitnick, a famous hacker, provides a unique perspective on the world of computer security. It offers insights into the motivations and techniques of hackers and can be a valuable read for those interested in the human aspect of cybersecurity.
Offers a comprehensive overview of firewalls and internet security. It covers various topics, including firewall design, intrusion detection, and security policies. It can serve as a valuable resource for those interested in network security.
Explores the human element of security and provides insights into how attackers exploit human vulnerabilities. It offers valuable advice on how to protect against social engineering attacks and can be a beneficial read for those interested in cybersecurity awareness.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Securing Linux for the Cloud.
Introduction to Application Observability Using Cisco...
Most relevant
Observability: Technologies and Implementation
Most relevant
Monitoring and Observability for Application Developers
Most relevant
Observability with OpenTelemetry and Grafana
Most relevant
Introduction to Application Development on Microsoft Azure
Most relevant
Managing Cisco ACI
Certified Kubernetes Application Developer: Application...
Application Security for Developers and DevOps...
Elastic Stack: Getting Started
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser