This workshop will take you through a series of exercises created with one purpose in mind: to provide you with hands-on examples that demonstrate how you can integrate Snyk into your Red Hat workflows in order to identify and fix potential vulnerabilities in your applications.