This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course covers the same material as RH415, but includes the Red Hat Certified Specialist in Security: Linux exam (EX415). This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.
* Actual course outline may vary depending on offering center. Contact your sales representative for more information.
As a result of attending this course, you should be able to use security technologies included in Red Hat Enterprise Linux to manage security risk and help meet compliance requirements.
You should be able to demonstrate these skills:
Analyze and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customizing baseline policy content provided with Red Hat Enterprise Linux.
Monitor security-relevant activity on your systems with the kernel's audit infrastructure.
Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines.
Confirm the integrity of files and their permissions with AIDE.
Prevent unauthorized USB devices from being used with USBGuard.
Protect data at rest but provide secure automatic decryption at boot using NBDE.
Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights.
Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower.