感谢您发送咨询!我们的团队成员将很快与您联系。
感谢您发送预订!我们的团队成员将很快与您联系。
课程大纲
Sovereign Architecture Design
- Threat modeling: identifying cloud dependencies and data egress points.
- Network topology: DMZ, internal zones, management network.
- Hardware selection: server, storage, networking, UPS.
- Disaster recovery sites and air-gap requirements.
Identity and Access Foundation
- Authentik deployment for SSO across all services.
- LDAP directory and group policy design.
- Step CA for service-to-service mTLS.
- YubiKey and hardware token enrollment.
Communication and Collaboration Hub
- Synapse/Element for chat and federation.
- Jitsi Meet for video conferencing.
- Roundcube/Nextcloud Mail for email.
- Nextcloud for file sync, calendars, and contacts.
- OnlyOffice integration for document editing.
Development and Operations Platform
- Gitea for source code and CI/CD.
- Woodpecker CI for automated builds.
- Nexus or Harbor for artifact and container registry.
- Wazuh for security monitoring and compliance.
- Uptime Kuma for service health dashboards.
AI and Knowledge Management
- Ollama deployment with local LLM serving.
- LibreChat for internal AI assistant access.
- Obsidian or Logseq for personal knowledge bases.
- Hoarder/ArchiveBox for web content preservation.
Security and Perimeter
- pfSense or OPNsense firewall deployment.
- Suricata IDS/IPS with custom rules.
- WireGuard/OpenVPN for remote access.
- Pi-hole DNS filtering and local resolution.
- Vaultwarden for team password management.
Backup, DR, and Operations
- BorgBackup central repository for all services.
- Database dump automation and off-site replication.
- Runbook documentation and incident response procedures.
- Capacity planning and scaling triggers.
- Quarterly sovereignty audit and dependency review.
Capstone Project
- Students present their fully operational sovereign stack.
- Peer review of architecture decisions and tradeoffs.
- Load testing and failure injection.
- Documentation handoff and operational readiness assessment.
要求
- Advanced Linux, networking, and container orchestration.
- Completion of at least two other Data Sovereignty courses or equivalent experience.
- Familiarity with DNS, TLS, firewall, and backup concepts.
Audience
- Senior infrastructure architects designing sovereign organizations.
- CTOs and CISOs planning digital independence roadmaps.
- Government and defense digital transformation teams.
35 小时
客户评论 (2)
Craig在培训中非常投入,始终确保我们保持专注,将示例调整到我们的日常活动中,并在被提问时总是提供答案,即使信息未在演示中提及。
Ecaterina Ioana Nicoale - BOOKING HOLDINGS ROMANIA SRL
课程 - DevOps Foundation®
机器翻译
培训师的高度承诺和专业知识
Jacek - Softsystem
课程 - DevOps Engineering Foundation (DOEF)®
机器翻译