RH415 – Red Hat Security: Linux in Physical, Virtual, and Cloud
Length 4 days
Course overview
View dates & book now
Register interest
Why study this course
Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.
Request Course Information
By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.
What you’ll learn
As a result of attending this course, you should be able to use security technologies included in Red Hat Enterprise Linux to manage security risk and help meet compliance requirements.
You should be able to demonstrate these skills:
Analyze and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customizing baseline policy content provided with Red Hat Enterprise Linux
Monitor security-relevant activity on your systems with the kernel’s audit infrastructure
Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines
Confirm the integrity of files and their permissions with AIDE
Prevent unauthorized USB devices from being used with USBGuard
Protect data at rest but provide secure automatic decryption at boot using NBDE
Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights
Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower
Red Hat at DDLS
Red Hat is the leading provider of open source, enterprise IT solutions. DDLS is proud to offer clients the ability to attend over 40 official Red Hat training courses through a resell agreement with Red Hat. Maximise the return on your Red Hat technology investment with lab-intensive, Instructor-Led Training run by Red Hat themselves. Alternatively, for those unable to attend training, log in and learn with Red Hat Online Learning.
From our state-of-the-art classrooms to telepresence to your offices, our instructor-led training caters to your needs.
Track Record
30 years driving innovative, award-winning learning solutions
More Courses, More Often
When you train with DDLS you get more courses, more often, in more locations and from more vendors.
Quality instructors and content
Expert instructors with real world experience and the latest vendor- approved in-depth course content.
Partner-Preferred Supplier
Chosen and awarded by the world’s leading vendors as preferred training partner.
Ahead of the technology curve
No matter your chosen technologies or platforms, we can help you stay one step ahead.
Train Anywhere
From our state-of-the-art classrooms to telepresence to your offices, our instructor-led training caters to your needs.
Track Record
30 years driving innovative, award-winning learning solutions
More Courses, More Often
When you train with DDLS you get more courses, more often, in more locations and from more vendors.
Quality instructors and content
Expert instructors with real world experience and the latest vendor- approved in-depth course content.
Partner-Preferred Supplier
Chosen and awarded by the world’s leading vendors as preferred training partner.
Ahead of the technology curve
No matter your chosen technologies or platforms, we can help you stay one step ahead.
Train Anywhere
From our state-of-the-art classrooms to telepresence to your offices, our instructor-led training caters to your needs.
Track Record
30 years driving innovative, award-winning learning solutions
More Courses, More Often
When you train with DDLS you get more courses, more often, in more locations and from more vendors.
Who is the course for?
System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organisation’s security policies.
Course subjects
Manage security and risk
Define strategies to manage security on Red Hat Enterprise Linux servers
Automate configuration and remediation with Ansible
Remediate configuration and security issues with Ansible Playbooks
Protect data with LUKS and NBDE
Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted
Restrict USB device access
Protect system from rogue USB device access with USBGuard
Control authentication with PAM
Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs)
Record system events with audit
Record and inspect system events relevant to security, using the Linux kernel’s audit subsystem and supporting tools
Monitor file system changes
Detect and analyze changes to a server’s file systems and their contents using AIDE
Mitigate risk with SELinux
Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses
Manage compliance with OpenSCAP
Evaluate and remediate a server’s compliance with security policies by using OpenSCAP
Automate compliance with Red Hat Satellite
Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite
Analyze and remediate issues with Red Hat Insights
Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights
Perform a comprehensive review
Review the content covered in this course by completing hands-on review exercises
For candidates who have not earned their RHCE, confirmation of the correct skill set knowledge can be obtained by passing the online skills assessment.
THIRD PARTY REGISTRATION
DDLS offers certification and training in Red Hat, JBoss and Ansible through our partnership with Red Hat. This arrangement requires DDLS to provide your details to Red Hat for course and exam registration purposes.
Terms & Conditions
The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.
Request Course Information
By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.