0,00  0

Cart

No products in the cart.

DO430 Securing Kubernetes Clusters with Red Hat Advanced Cluster Security Analysis and High Level Design

Additional information

Opis

Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation.  In particular, their security teams have several needs:

  • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
  • Assess compliance based on industry-standard benchmarks and get remediation guidance
  • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

Note: This course is offered as a 3-day in-person class, a 4-day virtual class, or is self-paced. Durations might vary based on the delivery. For full course details, scheduling, and pricing, select your location and then “get started” from the right menu.

Course Content Summary

  • Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues
  • Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions
  • Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain
  • Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline
  • Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance
  • Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management

Najczęściej zadawane pytania:

Potrzebujesz więcej informacji, napisz do nas:

Note:
The course outline is subject to change as technology advances and the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact us at osec@osec.pl
Autoryzowany partner
Cena netto
Cena netto: {{ product.price }} {{ post_meta('waluta') }}

1905,00 

Cena brutto

1905,00 

Cena w PLN jest orientacyjna (wyliczana z EUR/USD wg kursu sprzedaży NBP z dnia wystawienia faktury). Przyjmujemy wpłaty w PLN lub EURO.

Uwagi

Oferujemy szkolenia wirtualne, self-paced oraz stacjonarne (w Warszawie i w lokalizacjach klienta).
W celu ustalenia szczegółów prosimy o kontakt na osec@osec.pl

Twoje IT. Twoje zasady. Twoje możliwości.

Join our newsletter to stay up to date on features and releases.

By subscribing, you agree to our Privacy Policy and consent to updates.
© 2025  OSEC sp. z o.o.  All rights reserved.
Polityka prywatności