Vendors

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

img-course-overview.jpg

What You'll Learn

  • Learn Linux multitenancy isolation and least-privilege technologies. 
  • Investigate trusted repositories, as well as signing and scanning images. 
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline. 
  • Integrate web application single sign-on. Automate policy-based deployments. Configure security context constraints (SCC). 
  • Manage API access control. 
  • Provide secure network I/O. Deliver secure storage I/O.

Who Should Attend

  • System administrators 
  • IT security administrators 
  • IT security engineers 
  • DevOps engineers 
  • Cloud developers 
  • Cloud architects
img-who-should-learn.png

Prerequisites

  • Become a Red Hat Certified Engineer (RHCE®), or demonstrate equivalent Red Hat Enterprise Linux knowledge and experience 
  • Become a Red Hat Certified Specialist in OpenShift Administration, or demonstrate equivalent Red Hat OpenShift Container Platform knowledge and experience

Learning Journey

Coming Soon...

1. Describe host security technologies 
Understand the core technologies that make Red Hat Enterprise Linux a robust and trusted container host. 

2. Establish trusted container images 
Describe the registries, services, and methods that comprise the Red Hat image ecosystem. 

3. Implement security in the build process 
Learn automated methods for integrating security checks into build and deployment pipelines. 

4. Manage user access control 
Apply methods for integrating and managing user authentication for operators and for web applications. 

5. Control the deployment environment 
Determine how a container platform secures the deployment process through policies and automation. 

6. Manage secure platform orchestration 
Study how a container platform secures the orchestration process through policies and infrastructure. 

7. Provide secure network I/O 
Discover the technologies and control features that enable multitenancy and project isolation. 

8. Deliver secure storage I/O 
Enable authorized, multitenant storage access through a firm understanding of related technologies and control features.

Red Hat Certified Specialist in Security: Containers and OpenShift Exam-EX425

Frequently Asked Questions (FAQs)

  • Why get Red Hat certified?

    Red Hat certifications are highly respected in the IT industry and validate your expertise in open source technologies, particularly Red Hat Enterprise Linux (RHEL) and Red Hat OpenShift.

    These certifications demonstrate your ability to design, deploy, and manage complex enterprise environments using Red Hat solutions, increasing your value to employers and opening doors to a wide range of career opportunities.

  • What to expect for the examination?

    Red Hat certification exams are performance-based, meaning you'll be evaluated on your ability to perform real-world tasks in a live environment.

    This ensures that you not only understand the theoretical concepts but also have the practical skills to apply them.

    Note: Certification requirements and policies may be updated by Red Hat from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is Red Hat certification valid for?

    Red Hat certifications are current for three years.

    According to Red Hat, these certifications do not “expire”, or become “terminated” or “invalid”, but they can become “non-current”.

    There are different ways to keep a certification current, depending on the type of certification. You always have the option of retaking an exam to renew its associated certification.

    In some instances, you can earn other certifications to keep your certification current. This approach allows IT professionals to expand their skills and knowledge into new areas, which is increasingly important for a successful IT career.

    Note: Certification requirements and policies may be updated by Red Hat from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 24 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Course Curriculum

Training Schedule

Training Schedule

Exam & Certification

Exam & Certification

FAQs

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name
Email
Phone
I'm inquiring for
Inquiry Details

By submitting this form, you consent to Trainocate processing your data to respond to your inquiry and provide you with relevant information about our training programs, including occasional emails with the latest news, exclusive events, and special offers.

You can unsubscribe from our marketing emails at any time. Our data handling practices are in accordance with our Privacy Policy.