DO425 Red Hat Security: Securing Containers and OpenShift

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Difficulty
Rating
4days
Duration
2900,00 
+ VAT
Time:
Location:
The chosen training includes following dates:
When paid with Sovelto Access -credits, you will be charged the corresponding amount of credits to the Euro-price. Please contact sales: 020 7776 670 or myyntipalvelu@sovelto.fi for exact amount of credits in your case.

Register before 16.03.2020
Spoken language: English

We are sorry, but the course is already full, please try with another date or location.

Or contact sales: +358 20 7776 670 or myyntipalvelu@sovelto.fi

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat® Enterprise Linux® 7.5, Red Hat®OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

This course is also available as part of our Red Hat Learning Subscription. Learn more >>

Course overview

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies – such as namespaces, cgroups, seccomp, capabilities, and SELinux – provide a robust and mature host environment with strongly secure containers.

Course content summary
  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

See more detailed course outline here.

Target Audience

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

Prerequisites

Need more flexible learning options?

Choose a training that fits best your learning style and schedule. To hear more about virtual and self-paced training formats, please contact Personal Customer Service info@sovelto.fi or through our Chat-Service.

 

Keywords: , , ,

 

Places left:
No participant limit
many
2900,00  + VAT

Responsible person


Eine Lahtisalo

Eine Lahtisalo

Eine is a Microsoft Office specialist, who has worked as a full-time trainer for over 15 years. She has been involved in planning numerous customized training projects and has operated as a responsible trainer in many Office-migration projects. As an enthusiastic learner herself, she has studied human resource management, business administration and project management alongside working.

Competence: Microsoft Certified Trainer (MCT), MOS Master-level, MCAS for Excel, Outlook, PowerPoint and Word, IPMA Level D – Certified Project Management Associate, ITIL Foundation 2011 Edition, Microsoft Office specialist.