Log in / Register Account


Identify and mitigate threats to OpenShift container-based infrastructure

Watch recording from July 23, 2019

As organizations shift toward a container-based delivery system for their applications, understanding how to make these containers and the underlying infrastructure more secure is a key priority. Companies are increasingly turning to Red Hat® OpenShift® Container Platform to deploy and manage their containers, and infrastructure administrators and security professionals must adapt to identify and mitigate threats to this platform and their applications.

Red Hat Training has developed a new course, Red Hat Security: Securing containers and OpenShift, to explore implementing and managing security-focused architecture, policies, and procedures for modern containerized applications. The course covers using trusted container images and registries, configuring appropriate security constraints, taking advantage of existing core Linux® technologies like SELinux, and providing a more secure network and storage I/O.

In this webinar, our expert will cover:

  • The core technologies that make Red Hat Enterprise Linux a trusted container host.
  • Implementation of security in the container build process.
  • Management of a security-focused platform orchestration.
  • An outline of the course.

Join us to understand the skills needed to maintain a high level of security in the evolving world of containerized applications and OpenShift installations.


Live event date: Tuesday, July, 23, 2019 | 2 p.m. ET

On-demand event: Available for one year afterward.

John Walter

Solutions Architect, Training and Certification, Red Hat

John Walter is a solutions architect for the Red Hat Training and Certification team specializing in cloud and DevOps technologies. He is a Red Hat Certified Architect with a deep knowledge of Red Hat Enterprise Linux and its layered products.