Kurz: EX425 - Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform exam
DataScript s.r.o.
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I bui * System administrators or developers who want to demonstrate their ability to properly secure containers System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform Red Hat Certified Engineers who wish to become Red Hat Certified Architects Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I build hooks Automate builds using Jenkins Automate scanning and code validations as part of the build process Control access to OpenShift Container Platform clusters Configure users with different permission levels, access, and bindings Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication Query users and groups in IdM Log into OpenShift Container Platform using an IdM managed account Configure single sign-on (SSO) Install SSO authentication Configure OpenShift Container Platform to use SSO Integrate web applications with SSO Automate policy-based deployments Configure policies to control the use of images and registries Use secrets to provide access to external registries Automatically pull and use images from a registry Use triggers to verify that automated deployments work Manage orchestration Restrict nodes on which containers may run Use quotas to limit resource utilization Use secrets to automate access to resources Configure network isolation Create software-defined networks (SDN) Associate containers and projects with SDNs Configure and manage secure container storage Configure and secure file-based container storage Configure and secure block-based container storage As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize e ...
Cena kurzu:
...
425
EUR / Kurz
... včetně DPH: 514 EUR / Kurz
Objednat - pro přihlášení na kurz/školení klikněte na zvolený termín školení a místo konání
Popis kurzu
EX425 - Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform exam
Kurz je určen pro ...
Audience
- System administrators or developers who want to demonstrate their ability to properly secure containers
- System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform
- Red Hat Certified Engineers who wish to become Red Hat Certified Architects
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features
- Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups
- Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set
- Configure security context constraints
Use trusted registries
- Load images into a registry
- Query images in a registry
Work with trusted container images
- Identify a trusted container image
- Sign images
- View signed images
- Scan images
- Load signed images into a registry
Build secure container images
- Perform simple S2I builds
- Implement S2I build hooks
- Automate builds using Jenkins
- Automate scanning and code validations as part of the build process
Control access to OpenShift Container Platform clusters
- Configure users with different permission levels, access, and bindings
- Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication
- Query users and groups in IdM
- Log into OpenShift Container Platform using an IdM managed account
Configure single sign-on (SSO)
Lektoři kurzu
Lektoři z firmy: DataScript s.r.o.
[Kurz] Program kurzu (obsah přednášky/semináře/rekvalifikace/studia) ...
- System administrators or developers who want to demonstrate their ability to properly secure containers
- System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform
- Red Hat Certified Engineers who wish to become Red Hat Certified Architects
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features
- Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups
- Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set
- Configure security context constraints
Use trusted registries
- Load images into a registry
- Query images in a registry
Work with trusted container images
- Identify a trusted container image
- Sign images
- View signed images
- Scan images
- Load signed images into a registry
Build secure container images
- Perform simple S2I builds
- Implement S2I build hooks
- Automate builds using Jenkins
- Automate scanning and code validations as part of the build process
Control access to OpenShift Container Platform clusters
- Configure users with different permission levels, access, and bindings
- Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication
- Query users and groups in IdM
- Log into OpenShift Container Platform using an IdM managed account
Configure single sign-on (SSO)
- Install SSO authentication
- Configure OpenShift Container Platform to use SSO
- Integrate web applications with SSO
Automate policy-based deployments
- Configure policies to control the use of images and registries
- Use secrets to provide access to external registries
- Automatically pull and use images from a registry
- Use triggers to verify that automated deployments work
Manage orchestration
- Restrict nodes on which containers may run
- Use quotas to limit resource utilization
- Use secrets to automate access to resources
Configure network isolation
- Create software-defined networks (SDN)
- Associate containers and projects with SDNs
Configure and manage secure container storage
- Configure and secure file-based container storage
- Configure and secure block-based container storage
As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as total scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites for this exam
- Become a Red Hat Certified System Administrator , or possess comparable work experience and skills ( Red Hat Certified Engineer would be even better)
- Take Red Hat OpenShift I: Containers & Kubernetes (DO180) , or possess comparable work experience using containers
- Review the exam objectives
Recommended courses Red Hat Security: Containers and OpenShift Container Platform (DO425)
[Kurz] Obsah kurzu/školení...
- System administrators or developers who want to demonstrate their ability to properly secure containers
- System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform
- Red Hat Certified Engineers who wish to become Red Hat Certified Architects
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features - Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups
- Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set
- Configure security context constraints
Use trusted registries - Load images into a registry
- Query images in a registry
Work with trusted container images - Identify a trusted container image
- Sign images
- View signed images
- Scan images
- Load signed images into a registry
Build secure container images - Perform simple S2I builds
- Implement S2I build hooks
- Automate builds using Jenkins
- Automate scanning and code validations as part of the build process
Control access to OpenShift Container Platform clusters - Configure users with different permission levels, access, and bindings
- Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication
- Query users and groups in IdM
- Log into OpenShift Container Platform using an IdM managed account
Configure single sign-on (SSO) - Install SSO authentication
- Configure OpenShift Container Platform to use SSO
- Integrate web applications with SSO
Automate policy-based deployments - Configure policies to control the use of images and registries
- Use secrets to provide access to external registries
- Automatically pull and use images from a registry
- Use triggers to verify that automated deployments work
Manage orchestration - Restrict nodes on which containers may run
- Use quotas to limit resource utilization
- Use secrets to automate access to resources
Configure network isolation - Create software-defined networks (SDN)
- Associate containers and projects with SDNs
Configure and manage secure container storage - Configure and secure file-based container storage
- Configure and secure block-based container storage
As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as total scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites for this exam - Become a Red Hat Certified System Administrator , or possess comparable work experience and skills ( Red Hat Certified Engineer would be even better)
- Take Red Hat OpenShift I: Containers & Kubernetes (DO180) , or possess comparable work experience using containers
- Review the exam objectives
Recommended courses Red Hat Security: Containers and OpenShift Container Platform (DO425) |
[Kurz] Cíl školení / poznámka ke kurzu...
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features - Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups
- Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set
- Configure security context constraints
Use trusted registries - Load images into a registry
- Query images in a registry
Work with trusted container images - Identify a trusted container image
- Sign images
- View signed images
- Scan images
- Load signed images into a registry
Build secure container images - Perform simple S2I builds
- Implement S2I build hooks
- Automate builds using Jenkins
- Automate scanning and code validations as part of the build process
Control access to OpenShift Container Platform clusters - Configure users with different permission levels, access, and bindings
- Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication
- Query users and groups in IdM
- Log into OpenShift Container Platform using an IdM managed account
Configure single sign-on (SSO) - Install SSO authentication
- Configure OpenShift Container Platform to use SSO
- Integrate web applications with SSO
Automate policy-based deployments - Configure policies to control the use of images and registries
- Use secrets to provide access to external registries
- Automatically pull and use images from a registry
- Use triggers to verify that automated deployments work
Manage orchestration - Restrict nodes on which containers may run
- Use quotas to limit resource utilization
- Use secrets to automate access to resources
Configure network isolation - Create software-defined networks (SDN)
- Associate containers and projects with SDNs
Configure and manage secure container storage - Configure and secure file-based container storage
- Configure and secure block-based container storage
As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. |
[Školení] Další popis kurzu (úroveň, minimální znalosti, informace o cenách kurzu) ...
Prerequisites for this exam
- Become a Red Hat Certified System Administrator , or possess comparable work experience and skills ( Red Hat Certified Engineer would be even better)
- Take Red Hat OpenShift I: Containers & Kubernetes (DO180) , or possess comparable work experience using containers
- Review the exam objectives
Recommended courses Red Hat Security: Containers and OpenShift Container Platform (DO425)
ODKAZ:
https://www.skoleni-kurzy.eu/kurz-83398Poslední aktualizace: 2024-04-25 00:41:46
DataScript s.r.o.