Programm
Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.
Course content summary
Course content summary
- Learn Linux multitenancy isolation and least-privilege technologies.
- Investigate trusted repositories, as well as signing and scanning images.
- Implement security in a continuous integration and continuous development (CI/CD) pipeline.
- Integrate web application single sign-on.
- Automate policy-based deployments.
- Configure security context constraints (SCC).
- Manage API access control.
- Provide secure network I/O.
- Deliver secure storage I/O.
Ziele
Describe host security technologies
- Understand the core technologies that make Red Hat Enterprise Linux a robust and trusted container host.
- Describe the registries, services, and methods that comprise the Red Hat image ecosystem.
- Learn automated methods for integrating security checks into build and deployment pipelines.
- Apply methods for integrating and managing user authentication for operators and for web applications.
- Determine how a container platform secures the deployment process through policies and automation.
- Study how a container platform secures the orchestration process through policies and infrastructure.
- Discover the technologies and control features that enable multitenancy and project isolation.
- Enable authorized, multitenant storage access through a firm understanding of related technologies and control features.
Voraussetzungen
Red Hat recommends these prerequisites:
- RHCE certification or equivalent knowledge
- Red Hat Certified Specialist in OpenShift Administration or equivalent knowledge