• There are no suggestions because the search field is empty.

DO430

13 April 2026

Securing Kubernetes Clusters with Red Hat Advanced Cluster Security Overview (DO430)

Course Description Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

3 Days

9:00 - 17:00

Eng

CZ

Course Dates

Date
Availability
Form
Language
Cena
Location
Date
Self Paced Course
The course is available to you for 90 days from your chosen date
Availability
Guaranteed
Form
Vector (1)
Language
Cena
1619.00 EUR
Location
Online
Date
Open Term
Didn’t find a suitable course date? Register and let us know your preferred date!
Availability
Form
Vector (1)
Language
Cena
1905.00 EUR
Location
Prague / Bratislava
Date
13/04/2026 | 09:00 - 17:00
Classroom course led by a live instructor
Availability
Form
Vector (1)
Language
Cena
1905.00 EUR
Location
Prague 2, Czech Republic
Date
03/08/2026 | 09:00 - 17:00
Virtual course led by a live instructor via video conference from the comfort of your home
Availability
Form
Vector (1)
Language
Cena
1905.00 EUR
Location
Online
Date
18/11/2026 | 09:00 - 17:00
Classroom course led by a live instructor
Availability
Form
Vector (1)
Language
Cena
1905.00 EUR
Location
Prague 2, Czech Republic

Register Form

Course Description

Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:

  • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
  • Assess compliance based on industry-standard benchmarks and get remediation guidance
  • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

Course content summary

  • Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues
  • Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions
  • Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain
  • Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline
  • Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance
  • Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management

Course Outline

  1. Installing Red Hat Advanced Cluster Security for Kubernetes
    Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues.
  2. Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes
    Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions.
  3. Policy Management with Red Hat Advanced Cluster Security for Kubernetes
    Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain.
  4. Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes
    Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline.
  5. Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes
    Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance.
  6. Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes
    Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.

Target Audience

  • Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments
  • Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards
  • Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications

Recommended training



Related courses

Do you want to expand your knowledge in this area or build on a completed course? Explore additional training that focuses on the same technology, advanced skills, or related topics.

Red Hat Certified Specialist in Building Resilient Microservices exam (EX328)

Exam Description The Red Hat Certified Specialist in Building Resilient Microservices exam (EX328) tests your skills and knowledge with regard to creating and managing a resilient mesh of microservices, using Red Hat OpenShift Container Platform and ...

1 Day

CZ

450.00 EUR

Red Hat Certified Specialist in OpenShift Advanced Cluster Management Exam (EX432)

Exam Description The Red Hat Certified Specialist in OpenShift Advanced Cluster Management exam (EX432) tests the knowledge, skills, and ability to plan, deploy, and manage Red Hat Advanced Cluster Management for Kubernetes in a multi-cluster ...

1 Day

CZ

450.00 EUR

Multicluster Management with Red Hat Advanced Cluster Management for Kubernetes with Exam (DO433)

Course Description Address challenges with management, compliance, and productivity of a multicluster Kubernetes environment and its applications by using the capabilities of Red Hat Advanced Cluster Management for Kubernetes.

4 Days

9:00 - 17:00

Eng

CZ

2355.00 EUR

Red Hat Certified Specialist in OpenShift Virtualization (EX316)

Exam Description The Red Hat Certified Specialist in OpenShift Virtualization exam (EX316) tests the knowledge, skills, and ability to plan, deploy and manage virtual machines using the Red Hat OpenShift Virtualization operator in a Red Hat ...

1 Day

CZ

450.00 EUR

LET’S FACE IT

Since you got this far, there is probably something on your mind.

Just hit the "Go for ELOS" and please, provide us with some details of what that is.  It's simple as that.

It´s simple as that

Please provide us with as many details as possible. In case your vessel is in a need of immediate help, it will help us help you.