Get Free Shipping on orders over $79
Red Hat and IT Security : With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing - Rithik Chatterjee

Red Hat and IT Security

With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing

By: Rithik Chatterjee

eText | 20 November 2020

At a Glance

eText


$74.99

or 4 interest-free payments of $18.75 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Use Red Hat's security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform and about hybrid cloud infrastructure.

The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples.

Red Hat and IT Security will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats.

What You Will Learn

? Understand IT infrastructure security and its best practices

? Implement hybrid cloud infrastructure

? Realign DevOps process into DevSecOps, emphasizing security

? Implement automation in IT infrastructure services using Red Hat Ansible

? Explore Red Hat Smart Management, predictive analytics, and auditing

Who This Book Is For

IT professionals handling network/system administration or the IT infrastructure of an organization. DevOps professionals and cybersecurity analysts would find the book useful.

on
Desktop
Tablet
Mobile

More in Data Encryption

The Book of Mitigations - Felipe Reitz

eBOOK

Cybersecurity Explained - Anders Askåsen

eBOOK