Red Hat Security: Linux in Physical, Virtual, and Cloud Course Overview
The Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) training course will give you a detailed overview of the tools and techniques used to implement the security. This training course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.
Who should do Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) training?
- System administrators
- IT security administrators
- IT security engineers
Module 1: Manage security and risk
- Define strategies to manage security on Red Hat Enterprise Linux servers.
Module 2: Automate configuration and remediation with Ansible
- Remediate configuration and security issues with Ansible Playbooks
Module 3: Protect data with LUKS and NBDE
- Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted
Module 4: Restrict USB device access
- Protect system from rogue USB device access with USBGuard
Module 5: Control authentication with PAM
- Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs).
Module 6: Record system events with audit
- Record and inspect system events relevant to security, using the Linux kernel’s audit subsystem and supporting tools.
Module 7: Monitor file system changes
- Detect and analyze changes to a server’s file systems and their contents using AIDE.
Module 8: Mitigate risk with SELinux
- Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses.
Module 9: Manage compliance with OpenSCAP
- Evaluate and remediate a server’s compliance with security policies by using OpenSCAP.
Module 10: Automate compliance with Red Hat Satellite
- Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite.
Module 11: Analyze and remediate issues with Red Hat Insights
- Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights.
Module 12: Perform a comprehensive review
- Review the content covered in this course by completing hands-on review exercises.