Kurzy a certifikace Red Hat

Security

DO425 - Red Hat Security: Securing Containers and OpenShift

2.000 EUR
Days4
25. 11.28. 11. 2019
Praha
ENG
27. 1.30. 1. 2020
Praha
ENG

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat® Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

Audience

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

Goals

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

Outline

  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

See the complete course outline here.

Study materials

Printed Red Hat authorized book included.

Prerequisites for this course

Following courses

Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform exam (EX425)

Red Hat Security: Identity Management and Active Directory Integration (RH362)

Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415)Red Hat OpenShift Administration II: High Availability (DO380)

Red Hat OpenShift Development II: Creating Microservices with Red Hat OpenShift Application Runtimes (DO292)

Poptejte kurz u nás

Kurzy
Submit
* Povinné pole