Skip to main Content

Securing Kubernetes Clusters with Red Hat Advanced Cluster Security (DO430)

  • Kursuskode DO430
  • Varighed 3 dage
  • Sprog Engelsk

Leveringsmetoder

Åbent kursus (Virtuelt) Pris

DKR20,920.00

Ekskl. Moms

Anmod om gruppetræning Køb

Leveringsmetoder

Kurset er tilgængeligt i følgende formater:

  • Firma kursus

    Et lukket firma kursus

  • Åbent kursus

    Traditionel klasserumsundervisning

  • Åbent kursus (Virtuelt)

    Live klasserumsundervisning du tilgår virtuelt

Anmod om dette kursus Med en anden leveringsløsning

Beskrivelse

Toppen

Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation.  In particular, their security teams have several needs:

- Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
- Assess compliance based on industry-standard benchmarks and get remediation guidance
- Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

Note: Starting January 1, 2026, Red Hat introduces RHLS-Course — a flexible subscription model now included with this catalog offering. This replaces the previous direct virtual class enrollment from Global Knowledge.
When you purchase this item, you’ll receive an RHLS subscription at the course level, giving you the freedom to choose the schedule that works best and self-enroll in your selected class.
Your RHLS subscription includes:
• One live, instructor-led virtual session
• 12 months of self-paced learning access
• One certification exam with a free retake

 Onsite Classroom-based sessions and closed course options remain unchanged.

Updated Jan2026

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Kursusdato

Toppen
    • Leveringsmetode: Åbent kursus (Virtuelt)
    • Dato: 05-07 maj, 2026 | 10:00 AM to 6:00 PM
    • Kursussted: Virtual (W. Europe )
    • Sprog: engelsk

    DKR20,920.00

    • Leveringsmetode: Åbent kursus (Virtuelt)
    • Dato: 26-28 maj, 2026 | 10:00 AM to 6:00 PM
    • Kursussted: Virtual (W. Europe )
    • Sprog: engelsk

    DKR20,920.00

    • Leveringsmetode: Åbent kursus (Virtuelt)
    • Dato: 01-03 september, 2026 | 10:00 AM to 6:00 PM
    • Kursussted: Virtual (W. Europe )
    • Sprog: engelsk

    DKR20,920.00

Målgruppe

Toppen
  • Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments
  • Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards
  • Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications

Kursets formål

Toppen

After this course participants should be able to:

  • Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues
  • Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions
  • Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain
  • Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline
  • Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance
  • Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management

Kursusindhold

Toppen
  1. Installing Red Hat Advanced Cluster Security for Kubernetes
    Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues.
  2. Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes
    Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions.
  3. Policy Management with Red Hat Advanced Cluster Security for Kubernetes
    Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain.
  4. Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes
    Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline.
  5. Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes
    Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance.
  6. Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes
    Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.

Forudsætninger

Toppen
  • Red Hat OpenShift Administration II: Configuring a Production Cluster | DO280 is a prerequisite or equivalent knowledge

Take Red Hat free assessment to gauge whether this offering is the best fit for your skills Red Hat Skills Assessment

Certificeringstest

Toppen
  • Red Hat Certified Specialist in OpenShift Advanced Cluster Security Exam (EX430)

Efterfølgende kurser

Toppen
  • Red Hat Advanced Cluster Management for Kubernetes Classroom Training (DO432)

Mere information

Toppen
  • Official course book provided to participants