Buch, Englisch, 233 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 394 g
With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
Buch, Englisch, 233 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 394 g
ISBN: 978-1-4842-6433-1
Verlag: Apress
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Chapter 1: Introduction to IT SecurityChapter Goal: Introduction to IT Security conceptsSub-Topics:Networking basicsSystem administration and IT InfrastructureStandardizing security in Red Hat Enterprise LinuxConclusion
Chapter 2: Red Hat Hybrid Cloud InfrastructureChapter Goal: To understand the concepts and technologies related to cloud infrastructure and automating the security process.Sub - Topics:Basics of Cloud InfrastructureIntroduction to Hybrid Cloud ArchitectureOrchestration with Red Hat OpenShiftBuilding Hybrid Cloud with Red Hat Cloud Suite
Chapter 3: Security in DevOps and AutomationChapter Goal: To grasp and gain a better understanding of the importance of security in DevOps and automation using Red Hat technologiesSub - Topics:Difference between DevOps and DevSecOpsAutomation with Red Hat Ansible Automation PlatformDevSecOps Integration with Red Hat OpenShiftInfrastructure as Code and Security as CodeBenefits of Red Hat Consulting
Chapter 4: Red Hat Hyperconverged InfrastructureChapter Goal: To learn about the advantages of using a hyper-converged infrastructure and how to ensure its security.Sub - Topics:What is a hyper-converged infrastructure?Red Hat Hyperconverged Infrastructure for VirtualizationOpen & Scalable Red Hat VirtualizationFlexibility with Red Hat Gluster StorageRed Hat Hyperconverged Infrastructure for CloudCloud Computing with Red Hat OpenStack PlatformScalability with Red Hat Ceph StorageHyperconverged Infrastructure Security best practices
Chapter 5: Red Hat Smart Management and Red Hat InsightsChapter Goal: To learn how to manage Red Hat Infrastructure across every environment and also learn about predictive analytics and how it improves the security of any infrastructureSub - Topics:Introduction to Red Hat SatelliteInfrastructure Controlling with Red Hat Smart ManagementLearn how to evaluate vulnerabilities and verify compliancePredictive analytics using Red Hat Insights
Chapter 6: Red Hat Security AuditingChapter Goal: Learn about the importance and best practices of Security Auditing in Red Hat Enterprise LinuxSub - Topics:System AuditingRed Hat security auditing best practicesConclusion
Chapter 7: Case StudiesChapter Goal: Learn about some of the real-world examples regarding IT Security and ramifications caused due to security negligence.Sub - Topics:Learn more about the real-world case studies related to some of the impacting IT and cybersecurity incidents and what the technological world has learned from them.