Skip to main content

Server Management in Application Management

$249.00
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
How you learn:
Self-paced • Lifetime updates
When you get access:
Course access is prepared after purchase and delivered via email
Who trusts this:
Trusted by professionals in 160+ countries
Your guarantee:
30-day money-back guarantee — no questions asked
Adding to cart… The item has been added

This curriculum spans the technical breadth of a multi-workshop server operations program, addressing the same configuration, automation, and compliance challenges encountered in enterprise infrastructure modernization and hybrid cloud migration projects.

Module 1: Server Infrastructure Planning and Sizing

  • Selecting physical vs. virtual server deployment based on application I/O requirements and compliance constraints.
  • Determining CPU core allocation for database-backed applications under peak concurrency loads.
  • Calculating memory overcommit ratios in virtualized environments while maintaining application responsiveness.
  • Designing storage tiering strategies using SSD and HDD combinations for cost-performance balance.
  • Planning network bandwidth requirements for inter-server communication in clustered applications.
  • Documenting server naming conventions and IP address allocation to support audit and change management.

Module 2: Operating System Configuration and Hardening

  • Disabling unused services and ports on Linux/Windows servers to reduce attack surface.
  • Implementing role-based access control (RBAC) for administrative accounts using group policies or sudo rules.
  • Configuring secure boot and UEFI settings to prevent unauthorized firmware modifications.
  • Applying CIS benchmarks and validating compliance using automated scanning tools.
  • Scheduling and testing OS patching windows to minimize disruption to business-critical applications.
  • Managing kernel parameters (e.g., file handles, network buffers) to support high-throughput applications.

Module 3: Application Deployment and Runtime Management

  • Configuring application server environments (e.g., Tomcat, IIS) with correct JVM or .NET runtime versions.
  • Setting environment-specific configuration files without exposing credentials in source control.
  • Managing application dependencies using isolated virtual environments or containers.
  • Implementing health checks and startup probes for applications in orchestrated environments.
  • Rotating application log files and defining retention policies to prevent disk exhaustion.
  • Validating application startup sequence dependencies with database and message queue services.

Module 4: Monitoring, Alerting, and Performance Tuning

  • Deploying agent-based monitoring tools to collect CPU, memory, and disk I/O metrics at 15-second intervals.
  • Defining alert thresholds for response time degradation that differentiate between noise and incidents.
  • Correlating application error logs with server resource utilization to isolate performance bottlenecks.
  • Using APM tools to trace transaction latency across multiple server tiers and microservices.
  • Generating monthly performance reports to justify hardware upgrades or optimization efforts.
  • Configuring synthetic transactions to monitor critical user workflows proactively.

Module 5: High Availability and Disaster Recovery

  • Designing active-passive vs. active-active server clusters based on RTO and RPO requirements.
  • Configuring shared storage and quorum settings in Windows Failover Clustering or Pacemaker.
  • Testing failover procedures for database and application servers in non-production environments.
  • Replicating server configurations using configuration management tools across DR sites.
  • Scheduling and validating full system backups including application state and configuration files.
  • Documenting recovery runbooks with precise command sequences and escalation paths.

Module 6: Security and Compliance Enforcement

  • Integrating servers into centralized identity providers (e.g., LDAP, Active Directory) for authentication.
  • Enforcing encrypted communication (TLS 1.2+) between application servers and clients.
  • Implementing file integrity monitoring for critical system and application binaries.
  • Generating audit logs for privileged command execution and forwarding them to SIEM systems.
  • Conducting quarterly access reviews to remove orphaned or excessive user permissions.
  • Aligning server configurations with regulatory standards such as HIPAA, PCI-DSS, or SOX.

Module 7: Automation and Configuration Management

  • Authoring Ansible playbooks or Puppet manifests to standardize web server configurations.
  • Using immutable server patterns in cloud environments to eliminate configuration drift.
  • Integrating configuration management with CI/CD pipelines for zero-touch deployments.
  • Managing secrets using HashiCorp Vault or AWS Systems Manager Parameter Store.
  • Version-controlling server configurations in Git and enforcing peer review for changes.
  • Rolling out configuration updates in canary batches to detect unintended side effects.

Module 8: Cloud and Hybrid Server Operations

  • Selecting appropriate cloud instance types based on application memory and compute profiles.
  • Establishing secure site-to-site VPN or Direct Connect links between on-prem and cloud VPCs.
  • Implementing auto-scaling groups with custom metrics to handle variable application loads.
  • Managing hybrid DNS resolution between on-premises and cloud-hosted services.
  • Monitoring cloud spending on server instances and identifying underutilized resources.
  • Applying consistent security group and network ACL policies across hybrid environments.