感謝您提交詢問!我們的一位團隊成員將在短時間內與您聯繫。
感謝您提交預訂!我們的一位團隊成員將在短時間內與您聯繫。
課程簡介
Sovereign Architecture Design
- Threat modeling: identifying cloud dependencies and data egress points.
- Network topology: DMZ, internal zones, management network.
- Hardware selection: server, storage, networking, UPS.
- Disaster recovery sites and air-gap requirements.
Identity and Access Foundation
- Authentik deployment for SSO across all services.
- LDAP directory and group policy design.
- Step CA for service-to-service mTLS.
- YubiKey and hardware token enrollment.
Communication and Collaboration Hub
- Synapse/Element for chat and federation.
- Jitsi Meet for video conferencing.
- Roundcube/Nextcloud Mail for email.
- Nextcloud for file sync, calendars, and contacts.
- OnlyOffice integration for document editing.
Development and Operations Platform
- Gitea for source code and CI/CD.
- Woodpecker CI for automated builds.
- Nexus or Harbor for artifact and container registry.
- Wazuh for security monitoring and compliance.
- Uptime Kuma for service health dashboards.
AI and Knowledge Management
- Ollama deployment with local LLM serving.
- LibreChat for internal AI assistant access.
- Obsidian or Logseq for personal knowledge bases.
- Hoarder/ArchiveBox for web content preservation.
Security and Perimeter
- pfSense or OPNsense firewall deployment.
- Suricata IDS/IPS with custom rules.
- WireGuard/OpenVPN for remote access.
- Pi-hole DNS filtering and local resolution.
- Vaultwarden for team password management.
Backup, DR, and Operations
- BorgBackup central repository for all services.
- Database dump automation and off-site replication.
- Runbook documentation and incident response procedures.
- Capacity planning and scaling triggers.
- Quarterly sovereignty audit and dependency review.
Capstone Project
- Students present their fully operational sovereign stack.
- Peer review of architecture decisions and tradeoffs.
- Load testing and failure injection.
- Documentation handoff and operational readiness assessment.
最低要求
- Advanced proficiency in Linux, networking, and container orchestration.
- Completion of at least two other Data Sovereignty courses or equivalent professional experience.
- Familiarity with DNS, TLS, firewall configurations, and backup concepts.
Audience
- Senior infrastructure architects designing sovereign organizations.
- CTOs and CISOs formulating digital independence roadmaps.
- Government and defense digital transformation teams.
35 小時
客戶評論 (2)
Craig在培訓中非常投入,始終確保我們保持專注,將示例調整到我們的日常活動中,並在被提問時總是提供答案,即使信息未在演示中提及。
Ecaterina Ioana Nicoale - BOOKING HOLDINGS ROMANIA SRL
課程 - DevOps Foundation®
機器翻譯
培訓師的高度承諾和專業知識
Jacek - Softsystem
課程 - DevOps Engineering Foundation (DOEF)®
機器翻譯