Über Red Hat and IT Security
Chapter 1: Introduction to IT Security
Chapter Goal: Introduction to IT Security concepts
Sub-Topics:
Networking basics
System administration and IT Infrastructure
Standardizing security in Red Hat Enterprise Linux
Conclusion
Chapter 2: Red Hat Hybrid Cloud Infrastructure
Chapter Goal: To understand the concepts and technologies related to cloud infrastructure and automating the security process.
Sub - Topics:
Basics of Cloud Infrastructure
Introduction to Hybrid Cloud Architecture
Orchestration with Red Hat OpenShift
Building Hybrid Cloud with Red Hat Cloud Suite
Chapter 3: Security in DevOps and Automation
Chapter Goal: To grasp and gain a better understanding of the importance of security in DevOps and automation using Red Hat technologies
Sub - Topics:
Difference between DevOps and DevSecOps
Automation with Red Hat Ansible Automation PlatformDevSecOps Integration with Red Hat OpenShift
Infrastructure as Code and Security as Code
Benefits of Red Hat Consulting
Chapter 4: Red Hat Hyperconverged Infrastructure
Chapter Goal: To learn about the advantages of using a hyper-converged infrastructure and how to ensure its security.
Sub - Topics:
What is a hyper-converged infrastructure?
Red Hat Hyperconverged Infrastructure for Virtualization
Open & Scalable Red Hat Virtualization
Flexibility with Red Hat Gluster Storage
Red Hat Hyperconverged Infrastructure for Cloud
Cloud Computing with Red Hat OpenStack PlatformScalability with Red Hat Ceph Storage
Hyperconverged Infrastructure Security best practices
Chapter 5: Red Hat Smart Management and Red Hat Insights
Chapter Goal: To learn how to manage Red Hat Infrastructure across every environment and also learn about predictive analytics and how it improves the security of any infrastructure
Sub - Topics:
Introduction to Red Hat Satellite
Infrastructure Controlling with Red Hat Smart Management
Learn how to evaluate vulnerabilities and verify compliance
Predictive analytics using Red Hat Insights
Chapter 6: Red Hat Security Auditing
Chapter Goal: Learn about the importance and best practices of Security Auditing in Red Hat Enterprise Linux
Sub - Topics:
System Auditing
Red Hat security auditing best practices
Conclusion
Chapter 7: Case Studies
Chapter Goal: Learn about some of the real-world examples regarding IT Security and ramifications caused due to security negligence.
Sub - Topics:
Learn more about the real-world case studies related to some of the impacting IT and cybersecurity incidents and what the technological world has learned from them.
Mehr anzeigen