Let’s make it work for you 

Overview

Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.
Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:
  • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
  • Assess compliance based on industry-standard benchmarks and get remediation guidance
  • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads
  • RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.
Target Audience
  • Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments
  • Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards
  • Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications
Read more +

Prerequisites

Red Hat OpenShift Administration II: Configuring a Production Cluster | DO280

Read more +

Delegates will learn how to

  • Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues
  • Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions
  • Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain
  • Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline
  • Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance
  • Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management
Read more +

Outline

Installing Red Hat Advanced Cluster Security for Kubernetes
Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues.
Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes
Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions.
Policy Management with Red Hat Advanced Cluster Security for Kubernetes
Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain.
Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes
Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline.
Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes
Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance.
Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes
Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.
Read more +

Why choose QA

Need to know

Frequently asked questions

How can I create an account on myQA.com?

There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.

If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".

If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.

Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.

How do QA’s virtual classroom courses work?

Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.

We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.

How do QA’s online courses work?

QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course.

Once you have purchased the Online course and have completed your registration, you will receive the necessary details to enable you to immediately access it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.

All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.

When will I receive my joining instructions?

Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.

When will I receive my certificate?

Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.

Let's talk

A member of the team will contact you within 4 working hours after submitting the form.

By submitting this form, you agree to QA processing your data in accordance with our Privacy Policy and Terms & Conditions. You can unsubscribe at any time by clicking the link in our emails or contacting us directly.