- Popular Certifications
- ITIL 4 Foundation
- Project Management Certification (PMP)
- Certified Agile SCRUM Master
- Popular Practice Exams
- ITIL 4 Foundation
Learning Style
Provider
Difficulty
Course Duration
Learn to mitigate and manage threats to OpenShift container-based infrastructure
Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.
This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.
You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.
This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:
Brand | Red Hat |
---|---|
Subjects | DevOps |
Lab Access | No |
Technology | Red Hat |
Learning Style | Virtual Classroom |
Learning Type | Course |
Difficulty | Intermediate |
Course Duration | 5 Days |
Language | English |
Paul has over 2 decades of of technical experience as a senior engineer, operations manager & project lead.
He has had hands-on impact within internal IT infrastructure, as well as in hundreds of unique customer environments that resulted in an in-depth knowledge of a wide range of security, identity, cloud, and infrastructure products & features; and a breadth of knowledge in associated network devices and applications.
His specialties include:
Identity, AD, Azure AD, Azure AD Connect, Azure MFA, ADFS, WAP, e-Gap, IAG, UAG, Firewalls, DirectAccess, Load balancers, PKI, Troubleshooting application and network issues, quickly learning new applications/technologies, building and leading tech teams, project management, creating scalable processes.