https://www.youtube.com/watch?v=TaVFcqZwzEc

 

Brian Doran and Jose Simonelli from Red Hat® Consulting go over some security requirements you should consider when deploying any workloads in your infrastructure. We then go over what are some additional considerations when deploying in a virtualized environment and discuss the differences.

Connect with Red Hat Consulting, Training, Certification

Learn more about Red Hat Consulting
Learn more about Red Hat Training
Learn more about Red Hat Certification
Subscribe to the Training Newsletter
Follow Red Hat Training on Twitter
Like Red Hat Training on Facebook
Watch Red Hat Training videos on YouTube
Follow Red Hat Certified Professionals on LinkedIn
Creative Commons License