Securing Kubernetes Clusters with Red Hat Advanced Cluster Security (DO430)

Price
$3,525.00 USD

Duration
4 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:

  • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
  • Assess compliance based on industry-standard benchmarks and get remediation guidance
  • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

All deliveries require access to ROLE for the remote classroom environment.

Course Objectives

  • Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues
  • Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions
  • Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain
  • Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline
  • Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance
  • Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management

Who Should Attend?

  • Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments
  • Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards
  • Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Course Prerequisites

Agenda

1 - Installing Red Hat Advanced Cluster Security for Kubernetes

  • Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues.

2 - Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes

  • Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions.

3 - Policy Management with Red Hat Advanced Cluster Security for Kubernetes

  • Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain.

4 - Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes

  • Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline.

5 - Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes

  • Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance.

6 - Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes

  • Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.
 

Upcoming Class Dates and Times

Sep 29, 30, Oct 1, 2
10:00 AM - 4:00 PM
ENROLL $3,525.00 USD
Feb 9, 10, 11, 12
10:00 AM - 4:00 PM
ENROLL $3,525.00 USD
CourseID: 3606015E
 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with New Horizons