Published onExercise 1Understanding our hackathon environmentLet's get familiar with our hackathon setup.Get started →
Published onExercise 2Laying the foundations for cluster securityCan't have security without a security platformGet started →
Published onExercise 3Encrypting cluster internal network trafficIs OpenShift secure by default?Get started →
Published onExercise 4Securing vulnerable workloadsHow do we deal with vulnerable workloads we can't patch?Get started →
Published onExercise 5Understanding cluster complianceLet's apply an industry benchmark!Get started →
Published onExercise 7Bonus challenge - Supply chain shmozzleTime to sign your life away...Get started →