Synopses & Reviews
Synopsis
Chapter 1: Introduction to IT SecurityChapter Goal: Introduction to IT Security conceptsSub-Topics: Networking basicsSystem administration and IT InfrastructureStandardizing security in Red Hat Enterprise LinuxConclusion
Chapter 2: Red Hat Hybrid Cloud InfrastructureChapter Goal: To understand the concepts and technologies related to cloud infrastructure and automating the security process.Sub - Topics: Basics of Cloud InfrastructureIntroduction to Hybrid Cloud ArchitectureOrchestration with Red Hat OpenShiftBuilding Hybrid Cloud with Red Hat Cloud Suite
Chapter 3: Security in DevOps and AutomationChapter Goal: To grasp and gain a better understanding of the importance of security in DevOps and automation using Red Hat technologiesSub - Topics: Difference between DevOps and DevSecOpsAutomation with Red Hat Ansible Automation PlatformDevSecOps Integration with Red Hat OpenShiftInfrastructure as Code and Security as CodeBenefits of Red Hat Consulting
Chapter 4: Red Hat Hyperconverged InfrastructureChapter Goal: To learn about the advantages of using a hyper-converged infrastructure and how to ensure its security.Sub - Topics: What is a hyper-converged infrastructure?Red Hat Hyperconverged Infrastructure for VirtualizationOpen & Scalable Red Hat VirtualizationFlexibility with Red Hat Gluster StorageRed Hat Hyperconverged Infrastructure for CloudCloud Computing with Red Hat OpenStack PlatformScalability with Red Hat Ceph StorageHyperconverged Infrastructure Security best practices
Chapter 5: Red Hat Smart Management and Red Hat InsightsChapter Goal: To learn how to manage Red Hat Infrastructure across every environment and also learn about predictive analytics and how it improves the security of any infrastructureSub - Topics: Introduction to Red Hat SatelliteInfrastructure Controlling with Red Hat Smart ManagementLearn how to evaluate vulnerabilities and verify compliancePredictive analytics using Red Hat Insights
Chapter 6: Red Hat Security AuditingChapter Goal: Learn about the importance and best practices of Security Auditing in Red Hat Enterprise LinuxSub - Topics: System AuditingRed Hat security auditing best practicesConclusion
Chapter 7: Case StudiesChapter Goal: Learn about some of the real-world examples regarding IT Security and ramifications caused due to security negligence.Sub - Topics: Learn more about the real-world case studies related to some of the impacting IT and cybersecurity incidents and what the technological world has learned from them.