Red Hat Security: Linux in Physical, Virtual, and Cloud Course Overview
The Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) training course will give you a detailed overview of the tools and techniques used to implement the security. This training course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.
Who should do Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) training?
- System administrators
- IT security administrators
- IT security engineers
- Define strategies to manage security on Red Hat Enterprise Linux servers.
- Remediate configuration and security issues with Ansible Playbooks
- Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted
- Protect system from rogue USB device access with USBGuard
- Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs).
- Record and inspect system events relevant to security, using the Linux kernel’s audit subsystem and supporting tools.
- Detect and analyze changes to a server’s file systems and their contents using AIDE.
- Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses.
- Evaluate and remediate a server’s compliance with security policies by using OpenSCAP.
- Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite.
- Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights.
- Review the content covered in this course by completing hands-on review exercises.