Vendors

Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation.  In particular, their security teams have several needs:

  • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
  • Assess compliance based on industry-standard benchmarks and get remediation guidance
  • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

img-course-overview.jpg

What You'll Learn

Impact on the Organization

Securing Kubernetes Clusters with Red Hat Advanced Cluster Security supports customers who run containerized workloads on Kubernetes, and who often face several security-related challenges:

  • Delays in container deployments due to security issues
  • Revenue loss due to Kubernetes-related security incidents
  • Decreased developer productivity due to time that is spent to address security concerns

This course teaches how RHACS provides actionable solutions to address these challenges, to help teams secure their Kubernetes environments more effectively and to streamline development workflows to include security checks at an early stage.

Impact on the Individual

As a result of attending this course, students will be able to install and use RHACS and to secure their Kubernetes workloads and clusters according to the best industry practice.

Students should be able to demonstrate the following skills:

  • Installing RHACS Central and importing secure clusters
  • Troubleshooting and fixing common installation issues
  • Interpreting vulnerability results and generating reports
  • Identifying and mitigating risks in deployments
  • Creating and enforcing build, deployment, and runtime policies
  • Implementing policy checks in a CI/CD pipeline to secure the software supply chain
  • Applying network segmentation to reduce attacks
  • Generating and applying network policies within a CI/CD pipeline by using roxctl commands
  • Managing and retrieving compliance evidence
  • Applying third-party integrations for centralized alert notification, backup and restore, and identity and permission management

Who Should Attend

  • Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments
  • Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards
  • Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications
img-who-should-learn.png

Prerequisites

  • Red Hat OpenShift Administration II: Configuring a Production Cluster | DO280

Learning Journey

Coming Soon...

Module 1: Installing Red Hat Advanced Cluster Security for Kubernetes

Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues.

Module 2: Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes

Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions.

Module 3: Policy Management with Red Hat Advanced Cluster Security for Kubernetes

Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain.

Module 4: Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes

Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline.

Module 5: Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes

Run in-built compliance scans and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance.

Module 6: Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes

Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.

  • Red Hat Certified Specialist in OpenShift Advanced Cluster Security Exam (EX430)
  • Red Hat Advanced Cluster Management for Kubernetes Classroom Training (DO432)
img-exam-cert

Frequently Asked Questions (FAQs)

  • Why get Red Hat certified?

    Red Hat certifications are highly respected in the IT industry and validate your expertise in open source technologies, particularly Red Hat Enterprise Linux (RHEL) and Red Hat OpenShift.

    These certifications demonstrate your ability to design, deploy, and manage complex enterprise environments using Red Hat solutions, increasing your value to employers and opening doors to a wide range of career opportunities.

  • What to expect for the examination?

    Red Hat certification exams are performance-based, meaning you'll be evaluated on your ability to perform real-world tasks in a live environment.

    This ensures that you not only understand the theoretical concepts but also have the practical skills to apply them.

    Note: Certification requirements and policies may be updated by Red Hat from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is Red Hat certification valid for?

    Red Hat certifications are current for three years.

    According to Red Hat, these certifications do not “expire”, or become “terminated” or “invalid”, but they can become “non-current”.

    There are different ways to keep a certification current, depending on the type of certification. You always have the option of retaking an exam to renew its associated certification.

    In some instances, you can earn other certifications to keep your certification current. This approach allows IT professionals to expand their skills and knowledge into new areas, which is increasingly important for a successful IT career.

    Note: Certification requirements and policies may be updated by Red Hat from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 24 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Course Curriculum

Training Schedule

Training Schedule

Exam & Certification

Exam & Certification

FAQs

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name*
Email*
Phone*
I'm inquiring for
Inquiry Details

By submitting this form, you consent to Trainocate processing your data to respond to your inquiry and provide you with relevant information about our training programs, including occasional emails with the latest news, exclusive events, and special offers.

You can unsubscribe from our marketing emails at any time. Our data handling practices are in accordance with our Privacy Policy.