category
Securing Kubernetes Clusters with Red Hat Advanced Cluster Security Red Hat Learning Subscription Course
Type
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R42 900,00
Price excluding VAT
Introduction
Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:
- Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
- Assess compliance based on industry-standard benchmarks and get remediation guidance
- Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads
RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.
This course is based on Red Hat Advanced Cluster Security 4.6. The Red Hat Certified Specialist in OpenShift Advanced Cluster Security Exam (EX430) is included in this offering.
Audience Profile
- Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments
- Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards
- Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications
Pre-requisites
Red Hat OpenShift Administration II: Configuring a Production Cluster | DO280
Course Objectives
As a result of attending this course, students will be able to install and use RHACS and to secure their Kubernetes workloads and clusters according to the best industry practice.
Students should be able to demonstrate the following skills:
- Installing RHACS Central and importing secure clusters
- Troubleshooting and fixing common installation issues
- Interpreting vulnerability results and generating reports
- Identifying and mitigating risks in deployments
- Creating and enforcing build, deployment, and runtime policies
- Implementing policy checks in a CI/CD pipeline to secure the software supply chain
- Applying network segmentation to reduce attacks
- Generating and applying network policies within a CI/CD pipeline by using roxctl commands
- Managing and retrieving compliance evidence
- Applying third-party integrations for centralized alert notification, backup and restore, and identity and permission management
Course Content
| Session 1: Installing Red Hat Advanced Cluster Security for Kubernetes |
| Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues. |
| Session 2: Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes |
| Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions. |
| Session 3: Policy Management with Red Hat Advanced Cluster Security for Kubernetes |
| Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain. |
| Session 4: Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes |
| Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline. |
| Session 5: Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes |
| Run in-built compliance scans and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance. |
| Session 6: Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes |
| Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management. |
Associated Certifications and Exam
The Red Hat Certified Specialist in OpenShift Advanced Cluster Security is a performance-based test used to assess the skills and knowledge to manage Red Hat Advanced Cluster Security for Kubernetes.
By passing this exam, you become a Red Hat Certified Specialist in OpenShift Advanced Cluster Security that also counts towards earning a Red Hat Certified Architect (RHCA®).
This exam is based on Red Hat Advanced Cluster Security for Kubernetes 4.6.
Audience for this exam
- Platform Engineers, Cloud Administrators, System Administrators, Security Administrators, and other infrastructure-related IT roles who are responsible for providing and supporting security for applications deployed on Red Hat OpenShift Container Platform
- Enterprise Architects, Site Reliability Engineers, DevOps Engineers, and other application-related IT roles who are responsible for designing secure infrastructure for applications deployed on Red Hat OpenShift Container Platform
Prerequisites for this exam
- Experience with importing secured clusters into Red Hat Advanced Cluster security for Kubernetes
- Experience with monitoring and managing vulnerabilities with Red Hat Advanced Cluster Security for Kubernetes
- Experience with Implementing deploy-time and runtime policies with Red Hat Advanced Cluster Security for Kubernetes
- Experience with managing network segmentation with Red Hat Advanced Cluster Security for Kubernetes
- Experience with managing compliance to industry standards with Red Hat Advanced Cluster Security for Kubernetes
- Experience with integrating Red Hat Advanced Cluster Security for Kubernetes with third parties
- Red Hat OpenShift Administration II: Configuring a Production Cluster (DO280)or equivalent experience
- Red Hat OpenShift Administration III: Scaling Deployments in the Enterpriseor equivalent experience
- Red Hat Advanced Cluster Security for Kubernetes 4.6 or equivalent experience
Upon completion of courses within a Red Hat Learning Subscription (RHLS), Red Hat issues digital badges and certificates of attendance. These are recognized as official proof of completion.
Red Hat Overview
Business today demands additional flexibility, efficiency and performance from technology solutions. Authorized Red Hat training and certification provides our customers with the skills required to maximize your Red Hat Enterprise technology investment and keep the IT organization running at optimal performance.
Torque IT considers authorized Red Hat training to be an integral part of any Red Hat technology implementation. Red Hat authorized training, and associated certification, ensures that you get the most from your technology investment and that you are able to operate above the technology curve.
Red Hat certifications are universally recognized as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them. Authorized Red Hat training and certification is the industry standard for any solution that includes designing, selling, implementing, upgrading, managing and utilizing Red Hat technology solutions.
For half a decade, Torque IT has maintained the status of Certified Red Hat Training Partner in South Africa which is the highest level of accreditation that Red Hat authorizes to Learning Partners that offer technical, product, and solutions training. These achievements reflect our commitment to providing our customers with quality skills development, enablement, training, and certification solutions that demonstrate exceptional depth, breadth, and expertise across Linux Platforms, JBoss Middleware, Virtualization, Cloud computing, Storage and Mobile certifications. Torque IT is recognized by Red Hat, and the industry, as having met rigorous standards for educational competency, service, customer satisfaction and investment in technologies that will prepare the next generation of IT industry professionals to exploit Red Hat technology solutions.
Our portfolio of authorized Red Hat courses provide customers with various enablement and certification paths that cater for a wide variety of existing skills and certifications. Whether you require an accelerated transition from Solaris or are a Windows administrator seeking the corresponding Linux skills, our portfolio of authorized courses, customized solutions and professional guidance ensure maximum return on your Red Hat Enterprise investment.