Securing Kubernetes Clusters with Red Hat Advanced Cluster Security (DO430) [DO430]
placeRedHat Virtual French 2 feb. 2026 tot 5 feb. 2026 |
placeRedHat Virtual English 9 feb. 2026 tot 12 feb. 2026 |
Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.
OVERVIEW
Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.
Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:
- Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
- Assess compliance based on industry-standard benchmarks…
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.
OVERVIEW
Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.
Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:
- Integrate RHACS with DevOps practices and know how to use it
to automate DevSecOps, to enable their teams to operationalize and
secure their supply chain, infrastructure, and workloads
- Assess compliance based on industry-standard benchmarks and get
remediation guidance
- Apply vulnerability management, policy enforcement, and network
segmentation to secure their workloads
RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.
Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.
Note: This course is offered as a 3-day in-person class, a 4-day virtual class, or is self-paced. Durations might vary based on the delivery. For full course details, scheduling, and pricing, select your location and then “get started” from the right menu.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
OBJECTIVES
- Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues
- Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions
- Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain
- Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline
- Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance
- Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management
AUDIENCE
- Security practitioners who are responsible for identifying,
analyzing, and mitigating security threats within Kubernetes
environments
- Infrastructure administrators who are tasked with managing and
securing Kubernetes clusters and ensuring that the infrastructure
is robust and compliant with security standards
- Platform engineers who follow DevOps and DevSecOps practices, who
integrate security into the CI/CD pipeline, to ensure the secure
deployment and continuous monitoring of containerized
applications
CERTIFICATION
- Red Hat Certified Specialist in OpenShift Advanced Cluster Security Exam (EX430)
NEXT STEP
- Red Hat Advanced Cluster Management for Kubernetes Classroom Training (DO432)
CONTENT
- Installing Red Hat Advanced Cluster Security for
Kubernetes
Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues. - Vulnerability Management with Red Hat Advanced Cluster
Security for Kubernetes
Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions. - Policy Management with Red Hat Advanced Cluster
Security for Kubernetes
Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain. - Network Segmentation with Red Hat Advanced Cluster
Security for Kubernetes
Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline. - Manage Compliance with Industry Standards with Red Hat
Advanced Cluster Security for Kubernetes
Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance. - Integrate External Components with Red Hat Advanced
Cluster Security for Kubernetes
Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
