Emerging Technology. Immersive Training.
The fastest way to enable your team with enterprise technologies from Red Hat, CloudBees, Cloudera, and more.
Fierce Software offers a series of training workshops created in collaboration with some of our partners from Red Hat, Cloudera, CloudBees, and Sonatype just to name a few. There are courses that focus & highlight on specific vendor technologies and then there are the workshops that are larger efforts sourcing many different technologies, such as our Cyber Threat Hunting or DevSecOps programs.
- Raytheon employees (and subcontractors) are encouraged to select up to three (3) courses they would like to attend.
- Fierce Software will review all submissions and schedule courses based on demand.
- After initial confirmation email, you will receive a 2nd email with guidance and schedule of courses you have selected.
Register today, or learn more below!
Schedule Now
In partnership with
Workshop Catalog
Data Flow
Get hands-on experience with Cloudera Data Flow through a deep-dive learning session on Apache NiFi / MiNiFi and Apache Kafka. Develop expertise in streaming and data flow solutions and understand how these tools can be administered and monitored.
DevSecOps for Developers
This Developer-focused course is a lab-centered, experience-focused course. It highlights simple and clear techniques to use Blue Ocean and Declarative Pipeline for continuous integration and delivery.
Work Safe From Home
Learn the important doās and donāts to keep you company and yourself free from hackers while working at home. Learn typical Tactics, Techniques and Procedures (TTP) to watch for, how to protect yourself and your credentials, and social engineering attacks updated for the corona pandemic.
Advanced Cyber Security Techniques
An overview of essential cyber defense tools and techniques for todayās environment. Latest Tactics, Techniques and Procedures (TTP), how to protect important data, design for security, user training, and the importance of real time monitoring.
Cyber Threat Hunting
How do cyber specialists recognize attacks and identify the attackers? Recognition of attacks, tracing techniques, law enforcement involvement.
Advanced Ansible
Take your automation skills to another level with Fierce Software’s exclusive Advanced Ansible workshop. Start with a primer in the command line and progress to building complex Playbooks, custom Modules, using secrets in Vault, and advanced Workflow Job functions with Approval Nodes and more!
Secure Software Factories
Participants will step through our Secure Software Factory, a culmination of DevSecOps efforts over the years. Build containers, enable continuous deployment & monitoring, scan applications, and even have fun with ChatOps.
Ansible 101 & Ansible Tower
Automation is the the most in-demand skill and workshop participants will learn how to automate with Ansible. Start from the command line and simple tasks, to building complex Playbooks and Roles, and using the Ansible Tower GUI.
Ansible for Networking
This workshops will enable you to create playbooks to automate networking devices from Arista (EOS), Cisco (IOS, IOS XR, NX-OS), Juniper (JunOS), Open vSwitch, and VyOS and many more! Includes Ansible Tower curated content specifically for network use cases.
Ansible for Windows
Learn how to automate your deployments and configurations for Active Directory, IIS, the Windows OS, applications, and more.
Container Security
Learn how to scan, secure and leverage properties in the Linux kernel like seccomp, namespaces, ccgroups to secure your docker containers. Set SELinux policies, storage limits, and Red Hat Cockpit.
Containers 101
Come and build a container! This workshop will introduce you to Linux containers. During the course of this workshop you will gain a foundational container hands-on training with Docker, Buildah, Podman, and Skopeo.
DevSecOps
In this workshop, you’ll be building an OSS DevSecOps pipeline for a Java based website leveraging several containerized tools such as Gogs, Nexus, Jenkins, Sonarqube, and Che hosted on the OpenShift Container Platform.
OpenShift 101
This workshop will have you deploying and creating native docker images for a Node.js based website and learning to leverage the power of Red Hat’s OpenShift Container Platform to build, deploy, scale, and automate.
SELinux Policies
Writing your own SELinux policies doesnāt have to be a terrifying prospect! This workshop will walk you through the process of creating a custom policy for a source-compiled application, using the advanced tooling present in Red Hat Enterprise Linux.