Formularz kontaktowy

Close

    Szkolenie

    Osoba zgłaszająca


    DO430 Securing Kubernetes Clusters with Red Hat Advanced Cluster Security Analysis and High Level Design

    DO480

    Opis

    Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

    Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation.  In particular, their security teams have several needs:

    • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
    • Assess compliance based on industry-standard benchmarks and get remediation guidance
    • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

    RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

    Note: This course is offered as a 3-day in-person class, a 4-day virtual class, or is self-paced. Durations might vary based on the delivery. For full course details, scheduling, and pricing, select your location and then “get started” from the right menu.

    Course Content Summary

    • Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues
    • Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions
    • Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain
    • Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline
    • Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance
    • Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management

    Cel

    Impact on the organization

    Securing Kubernetes Clusters with Red Hat Advanced Cluster Security supports customers who run containerized workloads on Kubernetes, and who often face several security-related challenges:

    • Delays in container deployments due to security issues
    • Revenue loss due to Kubernetes-related security incidents
    • Decreased developer productivity due to time that is spent to address security concerns

    This course teaches how RHACS provides actionable solutions to address these challenges, to help teams secure their Kubernetes environments more effectively and to streamline development workflows to include security checks at an early stage.

    Impact on the Individual

    As a result of attending this course, students will be able to install and use RHACS and to secure their Kubernetes workloads and clusters according to the best industry practice.

    Students should be able to demonstrate the following skills:

    • Installing RHACS Central and importing secure clusters
    • Troubleshooting and fixing common installation issues
    • Interpreting vulnerability results and generating reports
    • Identifying and mitigating risks in deployments
    • Creating and enforcing build, deployment, and runtime policies
    • Implementing policy checks in a CI/CD pipeline to secure the software supply chain
    • Applying network segmentation to reduce attacks
    • Generating and applying network policies within a CI/CD pipeline by using roxctl commands
    • Managing and retrieving compliance evidence
    • Applying third-party integrations for centralized alert notification, backup and restore, and identity and permission management

    Grupa docelowa

    • Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments
    • Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards
    • Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications

    Wymagania

    Konspekt

    1. Manage a Multicluster Kubernetes Architecture
      • Describe multicluster architectures and use Red Hat OpenShift Platform Plus to solve their challenges.
    2. Inspect Resources from Multiple Clusters Using the RHACM Web Console
      • Describe and navigate the Red Hat Advanced Cluster Management for Kubernetes (RHACM) web console. Configure role-based access control (RBAC) and search for resources across multiple clusters by using the RHACM search engine.
    3. Deploy and Manage Policies for Multiple Clusters with RHACM
      • Deploy and manage policies in a multicluster environment by using Red Hat Advanced Cluster Management for Kubernetes (RHACM) governance.
    4. Install and Customize the RHACM Observability Stack
      • Gain insight into the fleet of managed clusters by using Red Hat Advanced Cluster Management for Kubernetes (RHACM) observability components.
    5. Deploy Applications Across Multiple Clusters with RHACM
      • Deploy and manage applications in a multicluster environment with Red Hat Advanced Cluster Management for Kubernetes GitOps.
    6. Install and Configure Red Hat Quay
      • Install and configure Red Hat Quay on Red Hat OpenShift Container Platform (RHOCP).
    7. Integrate Red Hat Quay with Red Hat OpenShift and RHACM
      • Describe Red Hat Quay use cases in a multicluster environment, and use Red Hat Advanced Cluster Management for Kubernetes (RHACM) to deploy applications and control the image sources allowed in the cluster fleet.
    8. Install and Configure RHACS
      • Install and configure Red Hat Advanced Cluster Security for Kubernetes (RHACS) and learn how it can help organizations with security in multicluster environments.
    9. Multicluster Operational Security Using RHACS
      • Manage the operational security of a Kubernetes cluster fleet using Red Hat Advanced Cluster Security for Kubernetes (RHACS), and integrate RHACS with external services.

    Uwagi

     

    For more details, please contact us at osec@osec.pl

    Note: The course outline is subject to change as technology advances and the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact us at osec@osec.pl
    Cena netto:8001 PLN(1905 EUR)Cena brutto:9841.23 PLNOpis

    Kurs przyjęty do powyższej kalkulacji 1 EUR = 4.2001 PLN – tabela nr. 034/C/NBP/2025, z dnia 2025-02-18. Obowiązująca od: 2025-04-19. Cena w PLN jest orientacyjna (wyliczana z EUR/USD wg kursu sprzedaży NBP z dnia wystawienia faktury). Przyjmujemy wpłaty w PLN lub EURO.

    Uwaga

    Oferujemy szkolenia wirtualne, self-paced oraz stacjonarne (w Warszawie i w lokalizacjach klienta).
    W celu ustalenia szczegółów prosimy o kontakt na osec@osec.pl

     

     

    Opis:

      – Termin gwarantowany (GTR)

    Terminy