DO425 Red Hat Security: Securing Containers and OpenShift

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

Candidates should be able to use security technologies included in Red Hat OpenShift Container Platform and Red Hat Enterprise Linux to manage security risk and help meet compliance requirements. 

Skills to be demonstrated:

  • Use recommended practices to ensure that images for container deployment come from trusted sources, including the use of secure registries, signed images, secure access protocols, and authorized access controls.
  • Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines.
  • Configure security context constraints to control the actions that pods can perform and to declare what a pod has the ability to access.
  • Implement the Linux computer security (seccomp) and Linux capabilities features to control the vulnerability footprint of a containerized application.
  • Implement and configure single sign-on for web applications, including the use of JWT for token sharing.
  • Explain and implement network isolation and encryption techniques to segregate application traffic to allow only authorized access.
  • Implement and explain storage management techniques to segregate volume storage I/O to allow only authorized access.
  • Observe and explain how the build process can be extended to include automated security testing and vulnerability scanning to ensure that no exploits are introduced into the final container images to be deployed.
  • Manage container deployment policies and configuration to control application placement, resource capacity, container affinity, and application demand scaling.
  • Manage OpenShift project access and quotas to ensure private and authorized self-service access, as well as to limit exposure to rogue tokens and denial-of-service attempts.

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

COURSE DETAILS

As a result of attending this course, you should be able to use security technologies included in Red Hat OpenShift Container Platform and Red Hat Enterprise Linux to manage security risk and help meet compliance requirements. You should be able to demonstrate these skills:

  • Use recommended practices to ensure that images for container deployment come from trusted sources, including the use of secure registries, signed images, secure access protocols, and authorized access controls.
  • Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines.
  • Configure security context constraints to control the actions that pods can perform and to declare what a pod has the ability to access.
  • Implement the Linux computer security (seccomp) and Linux capabilities features to control the vulnerability footprint of a containerized application.
  • Implement and configure single sign-on for web applications, including the use of JWT for token sharing.
  • Explain and implement network isolation and encryption techniques to segregate application traffic to allow only authorized access.
  • Implement and explain storage management techniques to segregate volume storage I/O to allow only authorized access.
  • Observe and explain how the build process can be extended to include automated security testing and vulnerability scanning to ensure that no exploits are introduced into the final container images to be deployed.
  • Manage container deployment policies and configuration to control application placement, resource capacity, container affinity, and application demand scaling.
  • Manage OpenShift project access and quotas to ensure private and authorized self-service access, as well as to limit exposure to rogue tokens and denial-of-service attempts.

PREREQUISITES FOR THIS COURSE

CERTIFICATION EXAM

The Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform exam (EX425) tests your ability to identify and mitigate threats to OpenShift container-based infrastructure. The exam focuses on implementing and managing secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

By passing this exam, you become a Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform, which also counts toward becoming a Red Hat Certified Architect (RHCA).

This exam is based on Red Hat® OpenShift® Container Platform 3.11.

Date Course Location Batch No
No Course Schedules Available

Date Course Location Exam Code
No Exam Schedules Available

Name Exam Code Certification Date
Afrin Fathima Nazar EX200 RHCSA 26-Feb-2020
Biju Thomas EX200 RHCSA 26-Feb-2020
Roshan Jose EX200 RHCSA 26-Feb-2020
Sebin Chacko EX200 RHCSA 26-Feb-2020
Lithin Cherian EX300 RHCE 26-Feb-2020
Mac T Mohan EX300 RHCE 26-Feb-2020

No Placement Details Available

Course Features

  • Duration : 4 days (6 Hrs/ Day)

  • Training delivered by top Red Hat Official Instructors

  • Modes of Training Available : Classroom, Instructor-led online training, Virtual Training and Video Classroom

  • Instructor-led online training and Video Classroom gives you 90 Days Unlimited Access to course content and 80 Hours of Lab Time

Request More Information

7 Reasons to Join IPSR

Here are 7 top reasons for you to choose IPSR for your Career Enhancement

  • Industry-oriented  Training led by Corporate Trainers and Skilled Professionals with real time experience
  • Dedicated team for Placements which has guided more than 1 lakh candidates to IT / ITeS jobs
  • Recruitment on all days through 1500+ tie-up companies including MNCs like Amazon, Red Hat, Nissan Digital, TCS, UST Global, Wipro, Tech Mahindra, etc.
  • World’s leading Red Hat Training  and Certification Partner with 37 National & International Awards
  • Received IT Educational Excellence Award from Ex-Defence Minister of India
  • A Public Limited IT Company led by Academicians and Industry Experts
  • 2 Decades of expertise in Software product development, Training services, Placement services & Digital Marketing services