Show all

OpenShift security

You will learn where security risks can occure process during OpenShift operation and how to deal with them.
Level
Designed for participants with advanced knowledge and experience
advanced
Course length
5 days
Language
 cz  eu
Course code
KT21180022
Security
Category:
Do you want this tailor-made course to your company? Contact us

Courses on a specific date with a live lecturer

Term
Language
Place
Form
?
How and where the course takes place.
Price without VAT
20. - 24. 5. 2024
Language
Place
Praha
Form
classroom
?
The course with an instructor in classroom.
Code of the course: KT21180022-0025
Price without VAT
38 900 Kč
7. - 11. 10. 2024
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: KT21180022-0028
Price without VAT
38 900 Kč
14. - 18. 10. 2024
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: KT21180022-0024
Price without VAT
38 900 Kč
18. - 22. 11. 2024
Language
Place
Praha
Form
classroom
?
The course with an instructor in classroom.
Code of the course: KT21180022-0026
Price without VAT
38 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: KT21180022-0007
Price without VAT
38 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: KT21180022-0008
Price without VAT
38 900 Kč

Expressions of participants

ilustrační obrázek Martin S.
Martin S.
Diebold Nixdorf s.r.o.
"Helpful, pragmatic, prepared. I am very satisfied, professional work. Thank you!"

Course description

This training focuses on securing the environment for running applications in OpenShift. You will learn best practices for securing host servers, trusting container images, a secure image building process, user access control, operating environment security and interface management, network and data storage security in OpenShift, and finally SSO deployment using Keycloak.

Required knowledge

It is advisable to have previous experience with application development, containerization concepts and basic knowledge of server and network management.

Target audience

Especially for OpenShift administrators, but also to security specialists. You will get an overview of how to secure the individual components of OpenShift.

Course content

  • Security of host nodes
  • Credibility of container images
  • Security build process
  • User access control
  • Securing the operating environment
  • Security management interface
  • Network security in OpenShift
  • Storage security in OpenShift
  • Deploy keycloack for SSO
Legal Notice
OpenShift is registered trademarks of Red Hat, Inc. in the USA and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by OpenShift or Red Hat, Inc.

Materials

Materials are in electronic form.

Objectives

After completing the course, participants will be able to design and implement security measures in the OpenShift environment for their applications and deployments. 

Lecturers

Jiří Snopek
Jiří Snopek

Jirka's passion for imparting experience and knowledge to perfectly developed courses and trainings. He improves his teaching skills with foreign lecturers. He uses modern technology, new approaches, visualizations, labs for his courses.

Jirka is an expert in open source and shares his knowledge in our Linux, Ansible, containerization, OpenShift, Kubernetes, ArgoCD, Grafana, Proxmox courses.

Jiří leads a team focused on the development and operation of web and mobile applications. He is a Linux system administrator and information technology and banking infrastructure architect. Experienced in automation, optimization, infrastructure architecture and application design.

His certifications: Red Hat Certified Trainer of the Year (2019) EMEA - DevOps, Red Hat Certified Specialist in Hybrid Cloud Management, Red Hat Certified Architect Level III, Red Hat Certified Specialist in OpenShift Application Development

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Náhledový obrázek novinky
Open Source: OKD/OpenShift 7. 10. 2021
Can Openshift be the right choice?

OpenShift is a platform for operating containers in a corporate environment. It facilitates the standardization of the operation of your applications and at the same time simplifies the operation and increases the safety and reliability of the operation. It allows you to assign selected permissions to, for example, supplier companies and thus have control over a larger part or the entire application development cycle. At the same time, it brings you a unified way of monitoring and collecting logs.

Náhledový obrázek novinky
Open Source: Container 17. 6. 2021
Training path of OpenShift, Ansible, Linux and containers

For better orientation in our courses focused on OpenShift, Linux, Ansible and Containers, we have prepared a clear map of recommended training links for you.

Previous courses

Follow-up courses

Expressions of participants

ilustrační obrázek Martin S.
Martin S.
Diebold Nixdorf s.r.o.
"Helpful, pragmatic, prepared. I am very satisfied, professional work. Thank you!"

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Náhledový obrázek novinky
Open Source: OKD/OpenShift 7. 10. 2021
Can Openshift be the right choice?

OpenShift is a platform for operating containers in a corporate environment. It facilitates the standardization of the operation of your applications and at the same time simplifies the operation and increases the safety and reliability of the operation. It allows you to assign selected permissions to, for example, supplier companies and thus have control over a larger part or the entire application development cycle. At the same time, it brings you a unified way of monitoring and collecting logs.

Náhledový obrázek novinky
Open Source: Container 17. 6. 2021
Training path of OpenShift, Ansible, Linux and containers

For better orientation in our courses focused on OpenShift, Linux, Ansible and Containers, we have prepared a clear map of recommended training links for you.

Why with us