Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
1. Introduction to OpenStack
- Evolution of the cloud and OpenStack
- Key cloud features
- Cloud deployment models
- Private, public, and hybrid clouds
- On-premise, IaaS, PaaS, and SaaS
- OpenStack-based public and private cloud deployments
- Open source and commercial OpenStack distributions
- OpenStack deployment models
- The OpenStack ecosystem
- Core modules
- Supporting tools
- Integration capabilities
- OpenStack lifecycle management
- OpenStack certification pathways
2. Cloud security and OpenStack
Security domains within private clouds
Threat classification and attack vectors
System and network documentation standards
System management practices
Vulnerability management strategies
Configuration management and policy enforcement
System backup and recovery procedures
Server hardening techniques
OpenStack management interfaces
Dashboard access
API interactions
SSH connectivity
Out-of-Band (OOB) management
Secure communication protocols
TLS and HTTPS implementation
Reference architectures
3. OpenStack architecture and security
Keystone - Identity Service
Keystone architecture overview
Authentication methods and supported backends
Token types and token lifecycle management
Authorization in OpenStack - roles and oslo.policy
Keystone resources - domains, projects, and users
Configuring CLI clients using openrc and clouds.yaml
OpenStack service catalog
Quota management in OpenStack
Glance - Image Service
Glance architecture
Cloud-adapted image configurations
Importing new images
Securing Glance service deployments
Image metadata management
Neutron - Networking Service
Neutron architecture
Neutron service distribution
Network configurations in OpenStack deployments
Network isolation within Neutron
Core Neutron resources
Compute node networking
Tenant (self-service) networks and subnets
Routing for tenant networks (East-West routing)
Provider networks
Accessing external resources (North-South routing)
Network namespaces
Physical traffic handling in Neutron nodes
Floating IP management
Security Groups
Role-Based Access Control (RBAC)
Nova - Compute Service
Nova architecture
Hypervisors in the compute service
QEMU versus KVM
Keypair management
Flavor management
Instance metadata
Instance features
Creating, verifying, and managing virtual instances
Inspecting VMs at the compute node
Assigning Security Groups and Floating IPs
Monitoring instance ports
Anti-spoofing (port security) in OpenStack
L3 virtual resources (router functions for instance traffic)
Nova-scheduler - compute node selection
Metadata service and configuration drive
Instance migration
Hardening the compute service
Cinder - Block Storage Service
Cinder architecture
Volume features
Creating volumes
Attaching and accessing volumes
Storage backends - iSCSI and Ceph
Volume wipe procedures
Barbican - Key Management Service
Barbican architecture
Storing passphrases
Generating and storing symmetric encryption keys
Volume encryption mechanisms
- Configuring Cinder storage types for volume encryption
- Limitations of volume encryption
- Storing X.509 certificate bundles
4. Other aspects related to architecture & security
- Tenant data privacy
- Instance security measures
- Oslo.policy - creating custom roles and API authorization
- High Availability in OpenStack
Requirements
- Foundational understanding of networking principles
- Familiarity with cloud computing concepts
- Practical experience administering Linux operating systems
14 Hours
Testimonials (3)
I found new things.
Cristian
Course - OpenStack Security
Depth of knowledge. A true SME in Openstack. Patient and very helpful. Explained complex topics in an understandable and digestible way.
Jake McIlwaine - Gamma
Course - OpenStack Security
The trainer was extremely knowledgable and helpful. While walking through the exercises, I wasn't rushed and was allowed to make mistakes (to a point) and then help was given to correct to them where needed.