Show all

OpenShift security

You will learn where security risks can occure process during OpenShift operation and how to deal with them.
Level
Designed for participants with advanced knowledge and experience
advanced
Course length
5 days
Language
 cz  eu
Course code
PU21180022
Security
Category:
Do you want this tailor-made course to your company? Contact us
 

This offer is no longer valid, please choose another one from our offer.

If you are interested in a piece, try us contact

Expressions of participants

ilustrační obrázek Martin S.
Martin S.
Diebold Nixdorf s.r.o.
"Helpful, pragmatic, prepared. I am very satisfied, professional work. Thank you!"

Course description

This training focuses on securing the environment for running applications in OpenShift. You will learn best practices for securing host servers, trusting container images, a secure image building process, user access control, operating environment security and interface management, network and data storage security in OpenShift, and finally SSO deployment using Keycloak.

Required knowledge

It is advisable to have previous experience with application development, containerization concepts and basic knowledge of server and network management.

Target audience

Especially for OpenShift administrators, but also to security specialists. You will get an overview of how to secure the individual components of OpenShift.

Course content

  • Security of host nodes
  • Credibility of container images
  • Security build process
  • User access control
  • Securing the operating environment
  • Security management interface
  • Network security in OpenShift
  • Storage security in OpenShift
  • Deploy keycloack for SSO
Legal Notice
OpenShift is registered trademarks of Red Hat, Inc. in the USA and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by OpenShift or Red Hat, Inc.

Materials

Materials are in electronic form.

Objectives

After completing the course, participants will be able to design and implement security measures in the OpenShift environment for their applications and deployments. 

Lecturers

Jiří Snopek
Jiří Snopek

Jirka's passion for imparting experience and knowledge to perfectly developed courses and trainings. He improves his teaching skills with foreign lecturers. He uses modern technology, new approaches, visualizations, labs for his courses.

Jirka is an expert in open source and shares his knowledge in our Linux, Ansible, containerization, OpenShift, Kubernetes, ArgoCD, Grafana, Proxmox courses.

Jiří leads a team focused on the development and operation of web and mobile applications. He is a Linux system administrator and information technology and banking infrastructure architect. Experienced in automation, optimization, infrastructure architecture and application design.

His certifications: Red Hat Certified Trainer of the Year (2019) EMEA - DevOps, Red Hat Certified Specialist in Hybrid Cloud Management, Red Hat Certified Architect Level III, Red Hat Certified Specialist in OpenShift Application Development

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 1. 8. 2024
How to Become a Cyber Security Expert

If you want to be a cybersecurity expert and become a security architect, we have great news for you. We have prepared a series of courses that will help you fully master the issue of strategic design of the safety and security of the organization.

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Náhledový obrázek novinky
Open Source: OKD/OpenShift 7. 10. 2021
Can Openshift be the right choice?

OpenShift is a platform for operating containers in a corporate environment. It facilitates the standardization of the operation of your applications and at the same time simplifies the operation and increases the safety and reliability of the operation. It allows you to assign selected permissions to, for example, supplier companies and thus have control over a larger part or the entire application development cycle. At the same time, it brings you a unified way of monitoring and collecting logs.

Previous courses

Follow-up courses

Expressions of participants

ilustrační obrázek Martin S.
Martin S.
Diebold Nixdorf s.r.o.
"Helpful, pragmatic, prepared. I am very satisfied, professional work. Thank you!"

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 1. 8. 2024
How to Become a Cyber Security Expert

If you want to be a cybersecurity expert and become a security architect, we have great news for you. We have prepared a series of courses that will help you fully master the issue of strategic design of the safety and security of the organization.

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Náhledový obrázek novinky
Open Source: OKD/OpenShift 7. 10. 2021
Can Openshift be the right choice?

OpenShift is a platform for operating containers in a corporate environment. It facilitates the standardization of the operation of your applications and at the same time simplifies the operation and increases the safety and reliability of the operation. It allows you to assign selected permissions to, for example, supplier companies and thus have control over a larger part or the entire application development cycle. At the same time, it brings you a unified way of monitoring and collecting logs.

Why with us