category
Red Hat Security: Linux in Physical Virtual and Cloud Red Hat Learning Subscription Course
Type
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R56 900,00
Price excluding VAT
Introduction
Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. “Red Hat Security: Linux in Physical, Virtual, and Cloud” (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, as virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements, including the kernel’s Audit subsystem, AIDE, SELinux, OpenSCAP and SCAP Workbench, USBGuard, PAM authentication, and Network-Based Device Encryption. You will learn to monitor compliance and to proactively identify, prioritize, and resolve issues by using OpenSCAP, Red Hat Lightspeed (formerly Insights), Red Hat Satellite, and Red Hat Ansible Automation Platform. You will have a basic introduction to how Red Hat Ansible Automation Platform automates the deployment of remediation to systems, by using Ansible Playbooks from OpenSCAP or Red Hat Lightspeed.
This course is based on RHEL 9.2, Ansible Core 2.14, Red Hat Ansible Automation Platform 2.4, Satellite 6.14, and OpenSCAP 1.3.7. The Red Hat Certified Specialist in Security: Linux exam (EX415) is included in this offering.
Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
Audience Profile
- System Administrator – responsible for supporting the company’s physical and virtual infrastructure, systems, and servers
- IT Security Practitioner / Compliance & Auditor – responsible for ensuring the technology environment is protected from attacks and is in compliance with security/privacy rules and regulations
- Automation Architect – Engineer or architect responsible for the company’s automation development and optimizing cloud tools and infrastructure to achieve automation goals
Pre-requisites
Red Hat Certified Engineer (EX294 / RHCE) certification or equivalent Red Hat Enterprise Linux knowledge and experience.
Course Objectives
- As a result of attending this course, students should be able to use security technologies included in Red Hat Enterprise Linux to manage security risk and help meet compliance requirements
- Analyze and remediate system compliance by using OpenSCAP and SCAP Workbench, and using and customizing baseline policy content that is provided with Red Hat Enterprise Linux
- Monitor security-relevant activity on your systems with the kernel’s Audit infrastructure
- Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines
- Confirm the integrity of files and their permissions with AIDE
- Prevent unauthorized USB devices from being used with USBGuard
- Protect data at rest but provide secure automatic decryption at boot by using Network-Bound Device Encryption (NBDE)
- Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Lightspeed
- Analyze and remediate compliance at scale with OpenSCAP, Red Hat Lightspeed, Red Hat Satellite, and Red Hat Ansible Automation Platform
Course Content
| Session 1: Managing Security and Risk |
| Define and implement strategies to manage security on Red Hat Enterprise Linux systems. |
| Session 2: Automating Configuration and Remediation with Ansible |
| Remediate configuration and security issues automatically with Ansible Playbooks. |
| Session 3: Protecting Data with LUKS and NBDE |
| Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted. |
| Session 4: Restricting USB Device Access |
| Protect systems from rogue USB device access with USBGuard. |
| Session 5: Controlling Authentication with PAM |
| Manage authentication, authorization, session settings, and password controls by configuring Pluggable Authentication Modules (PAM). |
| Session 6: Recording System Events with Audit |
| Record and inspect system events relevant to security by using the Linux kernel’s Audit system and supporting tools. |
| Session 7: Monitoring File System Changes |
| Detect and analyze changes to a server’s file systems and their contents by using AIDE. |
| Session 8: Mitigating Risk with SELinux |
| Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analysis. |
| Session 9: Managing Compliance with OpenSCAP |
| Evaluate and remediate a server’s compliance with security policies by using OpenSCAP. |
| Session 10: Analyzing and Remediating Issues with Red Hat Lightspeed |
| Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Lightspeed. |
| Session 11: Automating Compliance with Red Hat Satellite |
| Automate and scale OpenSCAP compliance checks by using Red Hat Satellite. |
| Session 12: Comprehensive Review |
| Review tasks from Red Hat Security: Linux in Physical, Virtual, and Cloud. |
Associated Certifications and Exam
The Red Hat Certified Specialist in Security: Linux exam validates your knowledge and abilities in securing Red Hat® Enterprise Linux®.
By passing this exam, you become a Red Hat Certified Specialist in Security: Linux, which also counts toward becoming a Red Hat Certified Architect (RHCA®).
Objectives listed for this exam are based on the most recent Red Hat product version available.
Audience for this exam
These audiences may be interested in becoming a Red Hat Certified Specialist in Security Linux:
- System administrators responsible for managing large enterprise environments
- System administrators responsible for securing their organization’s infrastructure
- Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential
Prerequisites for this exam
- Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineerwould be even better)
- Review the Red Hat Certified Specialist in Security: Linux exam objectives
Upon completion of courses within a Red Hat Learning Subscription (RHLS), Red Hat issues digital badges and certificates of attendance. These are recognized as official proof of completion.
Red Hat Overview
Business today demands additional flexibility, efficiency and performance from technology solutions. Authorized Red Hat training and certification provides our customers with the skills required to maximize your Red Hat Enterprise technology investment and keep the IT organization running at optimal performance.
Torque IT considers authorized Red Hat training to be an integral part of any Red Hat technology implementation. Red Hat authorized training, and associated certification, ensures that you get the most from your technology investment and that you are able to operate above the technology curve.
Red Hat certifications are universally recognized as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them. Authorized Red Hat training and certification is the industry standard for any solution that includes designing, selling, implementing, upgrading, managing and utilizing Red Hat technology solutions.
For half a decade, Torque IT has maintained the status of Certified Red Hat Training Partner in South Africa which is the highest level of accreditation that Red Hat authorizes to Learning Partners that offer technical, product, and solutions training. These achievements reflect our commitment to providing our customers with quality skills development, enablement, training, and certification solutions that demonstrate exceptional depth, breadth, and expertise across Linux Platforms, JBoss Middleware, Virtualization, Cloud computing, Storage and Mobile certifications. Torque IT is recognized by Red Hat, and the industry, as having met rigorous standards for educational competency, service, customer satisfaction and investment in technologies that will prepare the next generation of IT industry professionals to exploit Red Hat technology solutions.
Our portfolio of authorized Red Hat courses provide customers with various enablement and certification paths that cater for a wide variety of existing skills and certifications. Whether you require an accelerated transition from Solaris or are a Windows administrator seeking the corresponding Linux skills, our portfolio of authorized courses, customized solutions and professional guidance ensure maximum return on your Red Hat Enterprise investment.