- Course overview
- Course details
- Prerequisites
Course overview
About this course
This course addresses security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.
Learn how to:
- Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues
- Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions
- Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain
- Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline
- Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance
- Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management
Audience profile
- Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments
- Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards
- Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications
Course details
Module 1. Installing Red Hat Advanced Cluster Security for Kubernetes
Module 2. Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes
Module 3. Policy Management with Red Hat Advanced Cluster Security for Kubernetes
Module 4. Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes
Module 5. Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes
Module 6. Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes
Prerequisites
- Red Hat OpenShift Administration II: Configuring a Production Cluster | DO280 course
Enquiry
Course : Securing Kubernetes Clusters with Red Hat Advanced Cluster Security
Enquiry
request for : Securing Kubernetes Clusters with Red Hat Advanced Cluster Security