Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform exam

Datum
18/06/2021
Ganztägig
Kalender-Import: iCal

Veranstaltungsort
ETC Trainingcenter
Modecenterstrasse 22, 1030 - Wien




The Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform exam (EX425) tests your ability to identify and mitigate threats to OpenShift container-based infrastructure. The exam focuses on implementing and managing secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

By passing this exam, you become a Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform, which also counts toward becoming a Red Hat Certified Architect (RHCA).
This exam is intended for:

  • System administrators or developers who want to demonstrate their ability to properly secure containers
  • System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform
  • Red Hat Certified Engineers who wish to become Red Hat Certified Architects

To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam.

Understand, identify, and work with containerization features

  • Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups
  • Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set
  • Configure security context constraints

Use trusted registries

  • Load images into a registry
  • Query images in a registry

Work with trusted container images

  • Identify a trusted container image
  • Sign images
  • View signed images
  • Scan images
  • Load signed images into a registry

Build secure container images

  • Perform simple S2I builds
  • Implement S2I build hooks
  • Automate builds using Jenkins
  • Automate scanning and code validations as part of the build process

Control access to OpenShift Container Platform clusters

  • Configure users with different permission levels, access, and bindings
  • Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication
  • Query users and groups in IdM
  • Log into OpenShift Container Platform using an IdM managed account

Configure single sign-on (SSO)

  • Install SSO authentication
  • Configure OpenShift Container Platform to use SSO
  • Integrate web applications with SSO

Automate policy-based deployments

  • Configure policies to control the use of images and registries
  • Use secrets to provide access to external registries
  • Automatically pull and use images from a registry
  • Use triggers to verify that automated deployments work

Manage orchestration

  • Restrict nodes on which containers may run
  • Use quotas to limit resource utilization
  • Use secrets to automate access to resources

Configure network isolation

  • Create software-defined networks (SDN)
  • Associate containers and projects with SDNs

Configure and manage secure container storage

  • Configure and secure file-based container storage
  • Configure and secure block-based container storage

As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. 

Kategorien


Mehr Artikel

Stijn Bannier, Digital Product Manager, Open API.
News

Air France-KLM erklimmt mit API neue Höhen

Air France-KLM hat mit TIBCO Cloud Integration und TIBCO Cloud Mashery Software eine API-geführte, kundenzentrierte Strategie umgesetzt. Sie verknüpfte ihre riesige Anwendungs- und Datenumgebung, um Partnern, Entwicklern und Endbenutzern ein reibungsloses Erlebnis zu bieten – und dem Unternehmen die Fähigkeit zur agilen Veränderung. […]

Palo Stacho, Mitgründer und Head of Operations bei Lucy Security (c) Lucy Security
Kommentar

Die fünf Mythen von simulierten Phishing-Nachrichten

Das Schweizer Unternehmen Lucy Security hat in einer weltweiten Onlinestudie „Nutzen und Herausforderungen von Cybersecurity-Awareness 2020“ im Juni 2020 Unternehmen nach dem praktischen Nutzen und den Herausforderungen von Cybersecurity-Awareness befragt. Aufgrund dieser Studie räumt Palo Stacho, Mitgründer und Head of Operations bei Lucy Security, mit fünf Mythen auf. […]