Details

Red Hat and IT Security


Red Hat and IT Security

With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing

von: Rithik Chatterjee

CHF 53.50

Verlag: Apress
Format: PDF
Veröffentl.: 20.11.2020
ISBN/EAN: 9781484264348
Sprache: englisch

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<p></p><p>Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform and about hybrid cloud infrastructure. </p><p>The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples.</p><p><i>Red Hat and IT Security</i> will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change&nbsp;by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats.</p><p><b>What You Will Learn</b></p><p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Understand IT infrastructure security and its best practices</p><p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Implement hybrid cloud infrastructure </p><p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Realign DevOps process into DevSecOps, emphasizing security</p><p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Implement automation in IT infrastructure services using Red Hat Ansible</p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Explore Red Hat Smart Management, predictive analytics, and auditing</p><p><b>Who This Book Is For</b></p><p> IT professionals handling network/system administration or the IT infrastructure of an organization. DevOps professionals and cybersecurity analysts would find the book useful.<br></p>
<div><b>Chapter 1:&nbsp; Introduction to IT Security</b></div><div>Chapter Goal: Introduction to IT Security concepts</div><div>Sub-Topics:</div><div>Networking basics</div><div>System administration and IT Infrastructure</div><div>Standardizing security in Red Hat Enterprise Linux</div><div>Conclusion</div><br><div><b>Chapter 2: Red Hat Hybrid Cloud Infrastructure</b></div><div>Chapter Goal: To understand the concepts and technologies related to cloud infrastructure and automating the security process.</div><div>Sub - Topics:</div><div>Basics of Cloud Infrastructure</div><div>Introduction to Hybrid Cloud Architecture</div><div>Orchestration with Red Hat OpenShift</div><div>Building Hybrid Cloud with Red Hat Cloud Suite</div><div><br></div><div><b>Chapter 3: Security in DevOps and Automation</b></div><div>Chapter Goal: To grasp and gain a better understanding of the importance of security in DevOps and automation using Red Hat technologies</div><div>Sub - Topics:</div><div>Difference between DevOps and DevSecOps</div>Automation with Red Hat Ansible Automation Platform<div>DevSecOps Integration with Red Hat OpenShift</div><div>Infrastructure as Code and Security as Code</div><div>Benefits of Red Hat Consulting</div><div><br></div><div><b>Chapter 4: Red Hat Hyperconverged Infrastructure</b></div><div>Chapter Goal: To learn about the advantages of using a hyper-converged infrastructure and how to ensure its security.</div><div>Sub - Topics:</div><div>What is a hyper-converged infrastructure?</div><div>Red Hat Hyperconverged Infrastructure for Virtualization</div><div>Open & Scalable Red Hat Virtualization</div><div>Flexibility with Red Hat Gluster Storage</div><div>Red Hat Hyperconverged Infrastructure for Cloud</div>Cloud Computing with Red Hat OpenStack Platform<div>Scalability with Red Hat Ceph Storage</div><div>Hyperconverged Infrastructure Security best practices&nbsp;</div><div><br></div><div><b>Chapter 5: Red Hat Smart Management and Red Hat Insights</b></div><div>Chapter Goal: To learn how to manage Red Hat Infrastructure across every environment and also learn about predictive analytics and how it improves the security of any infrastructure</div><div>Sub - Topics:</div><div>Introduction to Red Hat Satellite</div><div>Infrastructure Controlling with Red Hat Smart Management</div><div>Learn how to evaluate vulnerabilities and verify compliance</div><div>Predictive analytics using Red Hat Insights</div><div><br></div><div><b>Chapter 6: Red Hat Security Auditing</b></div><div>Chapter Goal: Learn about the importance and best practices of Security Auditing in Red Hat Enterprise Linux</div><div>Sub - Topics:</div><div>System Auditing</div><div>Red Hat security auditing best practices</div><div>Conclusion</div><div><br></div><div><b>Chapter 7: Case Studies</b></div><div>Chapter Goal: Learn about some of the real-world examples regarding IT Security and ramifications caused due to security negligence.</div><div>Sub - Topics:</div><div>Learn more about the real-world case studies related to some of the impacting IT and cybersecurity incidents and what the technological world has learned from them.</div><p></p>
<p>Rithik Chatterjee graduated as an electronics and telecommunications engineer. As he was interested in the networking domain, he completed his course in IT infrastructure management. Later on, he was accredited as a Red Hat Certified System Administrator and Red Hat Certified Engineer. Working for a startup, his responsibilities included network/system administration, IT security, information security, and DevOps. Having gained a better understanding of the IT landscape, his interest and goals leaned towards cybersecurity leading to his training and certification as an EC-Council Certified Ethical Hacker.</p><p> His hobbies include landscape and wildlife photography, blogging, reading, and watching anime. To pursue his hobby of writing he developed his own blogging website (Inspirio Scripts), also encouraging budding authors like him to pen their thoughts.<br></p>
<p>Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process.&nbsp;Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform andabout hybrid cloud infrastructure.</p><p>The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples.</p><p><i>Red Hat and IT Security</i>&nbsp;will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change&nbsp;by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern&nbsp;cybersecurity&nbsp;threats.</p>You will:</p><p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Understand IT&nbsp;infrastructure&nbsp;security and its best practices</p><p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Implement hybrid cloud infrastructure</p><p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Realign DevOps process into DevSecOps, emphasizing security</p><p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Implement automation in IT infrastructure services using Red Hat Ansible</p><p>●&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Explore Red Hat Smart Management, predictive analytics, and auditing</p>
<p>Explains hybrid cloud infrastructure and automating the security process with Red Hat cloud suite</p><p>Covers Red Hat security auditing best practices</p><p>Explains Red Hat security tools with real-life examples and implementation</p>

Diese Produkte könnten Sie auch interessieren:

Quantifiers in Action
Quantifiers in Action
von: Antonio Badia
PDF ebook
CHF 118.00
Managing and Mining Uncertain Data
Managing and Mining Uncertain Data
von: Charu C. Aggarwal
PDF ebook
CHF 118.00