You will discover how to use secure and trusted container images, registries, and source code; manage network and storage isolation; implement application single sign-on; and configure appropriate security constraints and service role–based access control. You will also understand how existing core Linux technologies - such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.
This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.