Red Hat Security: Securing Containers and OpenShift

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

Course syllabus:

  1. Describe host security technologies

  2. Establish trusted container images

  3. Implement security in the build process

  4. Manage user access control

  5. Control the deployment environment

  6. Manage secure platform orchestration

  7. Provide secure network I/O

  8. Deliver secure storage I/O