Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. This course is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, as virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements, including the kernel's Audit subsystem, AIDE, SELinux, OpenSCAP and SCAP Workbench, USBGuard, PAM authentication, and Network-Based Device Encryption. You will learn to monitor compliance and to proactively identify, prioritize, and resolve issues by using OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Automation Platform. You will have a basic introduction to how Red Hat Ansible Automation Platform automates the deployment of remediation to systems, by using Ansible Playbooks from OpenSCAP or Red Hat Insights.
1 Managing Security and Risk
Define and implement strategies to manage security on Red Hat Enterprise Linux systems.
2 Automating Configuration and Remediation with Ansible
Remediate configuration and security issues automatically with Ansible Playbooks.
3 Protecting Data with LUKS and NBDE
Encrypt data on storage devices with LUKS, and use NBDE to manage automatic decryption when servers are booted.
4 Restricting USB Device Access
Protect systems from rogue USB device access with USBGuard.
5 Controlling Authentication with PAM
Manage authentication, authorization, session settings, and password controls by configuring Pluggable Authentication Modules (PAM).
6 Recording System Events with Audit
Record and inspect system events relevant to security by using the Linux kernel's Audit system and supporting tools.
7 Monitoring File System Changes
Detect and analyze changes to a server's file systems and their contents by using AIDE.
8 Mitigating Risk with SELinux
Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analysis.
9 Managing Compliance with OpenSCAP
Evaluate and remediate a server's compliance with security policies by using OpenSCAP.
10 Analyzing and Remediating Issues with Red Hat Insights
Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights.
11 Automating Compliance with Red Hat Satellite
Automate and scale OpenSCAP compliance checks by using Red Hat Satellite.
12 Comprehensive Review
Review tasks from Red Hat Security: Linux in Physical, Virtual, and Cloud.
Self-paced training presents dynamic text-based content and on-demand videos that feature our most experienced Red Hat certified instructors, that gives you the feel of an in-classroom setting without incurring travel costs and risking time away from the office. It includes unlimited access to course content and 80 hours of cloud-based labs, all optimized for self-study. Give your mind the knowledge you need to advance your skills, prepare for certification exams, and further your career.
System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization's security policies.
Be a Red Hat Certified Engineer (RHCE®), or demonstrate equivalent Red Hat Enterprise Linux knowledge and experience