<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="35833" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/redhat-do430" lastchanged="2026-03-16T18:32:06+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Securing Kubernetes Clusters with Red Hat Advanced Cluster Security</title><productcode>DO430</productcode><vendorcode>RH</vendorcode><vendorname>Red Hat</vendorname><fullproductcode>RH-DO430</fullproductcode><version>2</version><objective>&lt;p&gt;&lt;strong&gt;Impact on the Organization&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Securing Kubernetes Clusters with Red Hat Advanced Cluster Security supports customers who run containerized workloads on Kubernetes, and who often face several security-related challenges:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Delays in container deployments due to security issues&lt;/li&gt;&lt;li&gt;Revenue loss due to Kubernetes-related security incidents&lt;/li&gt;&lt;li&gt;Decreased developer productivity due to time that is spent to address security concerns&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
This course teaches how RHACS provides actionable solutions to address these challenges, to help teams secure their Kubernetes environments more effectively and to streamline development workflows to include security checks at an early stage.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Impact on the Individual&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As a result of attending this course, students will be able to install and use RHACS and to secure their Kubernetes workloads and clusters according to the best industry practice.&lt;/p&gt;
&lt;p&gt;Students should be able to demonstrate the following skills:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Installing RHACS Central and importing secure clusters&lt;/li&gt;&lt;li&gt;Troubleshooting and fixing common installation issues&lt;/li&gt;&lt;li&gt;Interpreting vulnerability results and generating reports&lt;/li&gt;&lt;li&gt;Identifying and mitigating risks in deployments&lt;/li&gt;&lt;li&gt;Creating and enforcing build, deployment, and runtime policies&lt;/li&gt;&lt;li&gt;Implementing policy checks in a CI/CD pipeline to secure the software supply chain&lt;/li&gt;&lt;li&gt;Applying network segmentation to reduce attacks&lt;/li&gt;&lt;li&gt;Generating and applying network policies within a CI/CD pipeline by using roxctl commands&lt;/li&gt;&lt;li&gt;Managing and retrieving compliance evidence&lt;/li&gt;&lt;li&gt;Applying third-party integrations for centralized alert notification, backup and restore, and identity and permission management&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/redhat-do280&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Red Hat OpenShift Administration II: Configuring a Production Cluster &lt;span class=&quot;fl-prod-pcode&quot;&gt;(DO280)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;</essentials><audience>&lt;ul&gt;
&lt;li&gt;Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments&lt;/li&gt;&lt;li&gt;Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards&lt;/li&gt;&lt;li&gt;Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;p&gt;Course Content Summary&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues&lt;/li&gt;&lt;li&gt;Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions&lt;/li&gt;&lt;li&gt;Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain&lt;/li&gt;&lt;li&gt;Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline&lt;/li&gt;&lt;li&gt;Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance&lt;/li&gt;&lt;li&gt;Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;p&gt;&lt;strong&gt;    Installing Red Hat Advanced Cluster Security for Kubernetes&lt;/strong&gt;&lt;br/&gt;
    Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;    Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes&lt;/strong&gt;&lt;br/&gt;
    Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;    Policy Management with Red Hat Advanced Cluster Security for Kubernetes&lt;/strong&gt;&lt;br/&gt;
    Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;    Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes&lt;/strong&gt;&lt;br/&gt;
    Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;    Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes&lt;/strong&gt;&lt;br/&gt;
    Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;    Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes&lt;/strong&gt;&lt;br/&gt;
    Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.&lt;/p&gt;</outline><objective_plain>Impact on the Organization

Securing Kubernetes Clusters with Red Hat Advanced Cluster Security supports customers who run containerized workloads on Kubernetes, and who often face several security-related challenges:


- Delays in container deployments due to security issues
- Revenue loss due to Kubernetes-related security incidents
- Decreased developer productivity due to time that is spent to address security concerns

This course teaches how RHACS provides actionable solutions to address these challenges, to help teams secure their Kubernetes environments more effectively and to streamline development workflows to include security checks at an early stage.

Impact on the Individual

As a result of attending this course, students will be able to install and use RHACS and to secure their Kubernetes workloads and clusters according to the best industry practice.

Students should be able to demonstrate the following skills:


- Installing RHACS Central and importing secure clusters
- Troubleshooting and fixing common installation issues
- Interpreting vulnerability results and generating reports
- Identifying and mitigating risks in deployments
- Creating and enforcing build, deployment, and runtime policies
- Implementing policy checks in a CI/CD pipeline to secure the software supply chain
- Applying network segmentation to reduce attacks
- Generating and applying network policies within a CI/CD pipeline by using roxctl commands
- Managing and retrieving compliance evidence
- Applying third-party integrations for centralized alert notification, backup and restore, and identity and permission management</objective_plain><essentials_plain>Red Hat OpenShift Administration II: Configuring a Production Cluster (DO280)</essentials_plain><audience_plain>- Security practitioners who are responsible for identifying, analyzing, and mitigating security threats within Kubernetes environments
- Infrastructure administrators who are tasked with managing and securing Kubernetes clusters and ensuring that the infrastructure is robust and compliant with security standards
- Platform engineers who follow DevOps and DevSecOps practices, who integrate security into the CI/CD pipeline, to ensure the secure deployment and continuous monitoring of containerized applications</audience_plain><contents_plain>Course Content Summary


- Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues
- Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions
- Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain
- Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline
- Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance
- Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management</contents_plain><outline_plain>    Installing Red Hat Advanced Cluster Security for Kubernetes

    Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues.

    Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes

    Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions.

    Policy Management with Red Hat Advanced Cluster Security for Kubernetes

    Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain.

    Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes

    Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline.

    Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes

    Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance.

    Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes

    Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.</outline_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="IT" currency="EUR">2175.00</price><price country="DE" currency="EUR">2805.00</price><price country="AT" currency="EUR">2805.00</price><price country="SE" currency="EUR">2805.00</price><price country="SI" currency="EUR">2805.00</price><price country="GB" currency="GBP">2385.00</price><price country="CH" currency="CHF">2805.00</price><price country="FR" currency="EUR">2805.00</price></pricelist><miles/></course>