Description
You will learn where security risks can occure process during OpenShift operation and how to deal with them.
This training focuses on securing the environment for running applications in OpenShift. You will learn best practices for securing host servers, trusting container images, a secure image building process, user access control, operating environment security and interface management, network and data storage security in OpenShift, and finally SSO deployment using Keycloak.
Goals
After completing the course, participants will be able to design and implement security measures in the OpenShift environment for their applications and deployments. Target
Especially for OpenShift administrators, but also to security specialists. You will get an overview of how to secure the individual components of OpenShift.Contents
- Security of host nodes
- Credibility of container images
- Security build process
- User access control
- Securing the operating environment
- Security management interface
- Network security in OpenShift
- Storage security in OpenShift
- Deploy keycloack for SSO
Legal Notice
OpenShift is registered trademarks of Red Hat, Inc. in the USA and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by OpenShift or Red Hat, Inc.
Prerequisites
It is advisable to have previous experience with application development, containerization concepts and basic knowledge of server and network management.Study Materials
Materials are in electronic form.Followups
OpenShift administration 2, OpenShift administration 3, OpenShift installation, OpenShift post-installation, OpenShift user management and central authentication, OpenShift and persistent storage , OpenShift networking, OpenShift operators and image registers