Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
1. Introduction to OpenStack for Government
- History of the cloud and OpenStack
- Cloud features
- Cloud models
- private, public, hybrid
- on-premise, IaaS, PaaS, SaaS
- Public and private cloud deployments based on OpenStack
- Open source and commercial OpenStack distributions
- OpenStack deployment models for government
- OpenStack ecosystem
- Modules
- Underlying tools
- Integrations
- OpenStack lifecycle management
- OpenStack certification processes
2. Cloud Security and OpenStack for Government
Security domains in private clouds for government
Threat classification and attack types relevant to government systems
System and network documentation requirements for government
System management practices for government environments
Vulnerability management strategies for government agencies
Configuration management and policy enforcement in government settings
System backup and recovery procedures for government data
Server hardening techniques for enhanced security in government networks
OpenStack Management interfaces tailored for government use
Dashboard functionalities for government administrators
API access controls for secure government operations
SSH configurations for government security standards
Out-of-Band (OOB) management for government systems
Secure communication protocols for government data
TLS and HTTPS implementation in government cloud environments
Reference architectures designed for government compliance
3. OpenStack Architecture and Security for Government
Keystone - Identity Service for secure government access
Keystone architecture for robust government authentication
Authentication mechanisms and available backends for government use
Token types and token management for enhanced security in government clouds
Authorization in OpenStack using roles and oslo.policy for government workflows
Keystone resources - domains, projects, users for government entities
Openrc and clouds.yaml configuration for CLI clients in government environments
OpenStack service catalog for government services
Quota system in OpenStack to manage resource allocation for government agencies
Glance - Image Service for secure government cloud images
Glance architecture tailored for government needs
Images optimized for government cloud environments
Adding new images with government security standards
Securing image service deployment in government settings
Image metadata management for government compliance
Neutron - Networking Service for secure government networks
Neutron architecture designed for government network requirements
Neutron service distribution in government cloud deployments
Networks in OpenStack deployment for government agencies
Network isolation techniques in Neutron for government data
Basic resources in Neutron for government use
Compute node networking configurations for government systems
Tenant (self-service) networks and subnets for government users
Routing for tenant networks (East-West routing) in government clouds
Provider networks for government connectivity
Accessing external resources (North-South routing) in government environments
Network namespaces for secure government network segmentation
Physical traffic management in Neutron nodes for government data
Floating IPs for government cloud instances
Security Groups for enhanced protection in government clouds
Role-based access control (RBAC) for government users
Nova - Compute Service for secure government computing
Nova architecture designed for government compute needs
Hypervisors in the compute service for government use
QEMU vs. KVM for government cloud environments
Keypair management for secure government instances
Flavour management to optimize resource allocation for government users
Instance metadata management for government compliance
Instance features tailored for government requirements
Creating, verifying, and managing virtual instances in government clouds
Inspecting VMs at compute nodes for government administrators
Assigning Security Groups and Floating IPs to government cloud instances
Tapping into instance ports for government monitoring needs
Anti-spoofing (port security) measures in OpenStack for government data
L3 virtual resources (router functions for instance traffic) for secure government networks
Nova-scheduler - compute node selection for optimal resource allocation in government clouds
Metadata service and configuration drive for enhanced government cloud management
Instance migration techniques for government cloud environments
Hardening the compute service to meet government security standards
Cinder - Block Storage Service for secure government data storage
Cinder architecture designed for government needs
Volume features tailored for government use
Creating volumes with government security requirements
Attaching and accessing volumes in government cloud environments
Storage backends (iSCSI, Ceph) for secure government data storage
Volume wipe procedures for government compliance
Barbican - Key Management Service for secure government key management
Barbican architecture designed for government security needs
Storing passphrases securely in government clouds
Generating and storing symmetric encryption keys for government data
Volume encryption mechanisms to protect government information
- Configuring Cinder storage type for volume encryption in government environments
- Limitations of volume encryption for government use cases
- Storing X.509 certificate bundles for secure government communications
4. Other Aspects Related to Architecture & Security for Government
- Tenant data privacy in government cloud environments
- Instance security measures for government instances
- Oslo.policy - creating custom roles and API authorization for government workflows
- High Availability strategies in OpenStack for continuous government operations
Requirements
- Fundamental understanding of networking principles
- Basic familiarity with the cloud computing model
- Practical experience in administering Linux operating systems for government environments
14 Hours
Testimonials (3)
I found new things.
Cristian
Course - OpenStack Security
Depth of knowledge. A true SME in Openstack. Patient and very helpful. Explained complex topics in an understandable and digestible way.
Jake McIlwaine - Gamma
Course - OpenStack Security
The trainer was extremely knowledgable and helpful. While walking through the exercises, I wasn't rushed and was allowed to make mistakes (to a point) and then help was given to correct to them where needed.