Exercise 1Vulnerability analysis with RHACSrhacscvepwnkitopenshiftacscontainersIn this first exercise we'll analyze container images for vulnerabilities.
Exercise 2Creating customised CVE reports with RHACSrhacscvecampaignspwnkitopenshiftsecurityIn the second exercise we'll generate and export data for a CVE campaign, using the RHACS RESTful API.
Exercise 3Blocking vulnerable workloads from OpenShiftadmissioncontrolopenshiftrhacscveIn the third exercise we'll block vulnerable container images from OpenShift
Exercise 4Detecting unauthorized application behaviour at runtime with RHACSruntimeunauthorizedopenshiftrhacsebpfIn this exercise we'll identify and block unauthorized behaviours in container applications at runtime.