Red Hat Security: Linux in Physical, Virtual, and Cloud/EX415 Singapore.

Red Hat Security: Linux in Physical, Virtual, and Cloud Course Overview

The Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) training course will give you a detailed overview of the tools and techniques used to implement the security. This training course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.

Who should do Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) training?

  • System administrators
  • IT security administrators
  • IT security engineers

Module 1: Manage security and risk

  • Define strategies to manage security on Red Hat Enterprise Linux servers.

Module 2: Automate configuration and remediation with Ansible

  • Remediate configuration and security issues with Ansible Playbooks

Module 3: Protect data with LUKS and NBDE

  • Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted

Module 4: Restrict USB device access

  • Protect system from rogue USB device access with USBGuard

Module 5: Control authentication with PAM

  • Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs).

Module 6: Record system events with audit

  • Record and inspect system events relevant to security, using the Linux kernel’s audit subsystem and supporting tools.

Module 7: Monitor file system changes

  • Detect and analyze changes to a server’s file systems and their contents using AIDE.

Module 8: Mitigate risk with SELinux

  • Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses.

Module 9: Manage compliance with OpenSCAP

  • Evaluate and remediate a server’s compliance with security policies by using OpenSCAP.

Module 10: Automate compliance with Red Hat Satellite

  • Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite.

Module 11: Analyze and remediate issues with Red Hat Insights

  • Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights.

Module 12: Perform a comprehensive review

  • Review the content covered in this course by completing hands-on review exercises.


Leave a Reply

Your email address will not be published. Required fields are marked *