RH415 - Red Hat Security: Linux in Physical, Virtual, and Cloud
Length 4 days
$5236 inc GST
View dates &
Why study this course
Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.
Request Course Information
What you’ll learn
As a result of attending this course, you should be able to use security technologies included in Red Hat Enterprise Linux to manage security risk and help meet compliance requirements.
You should be able to demonstrate these skills:
Analyse and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customising baseline policy content provided with Red Hat Enterprise Linux
Monitor security-relevant activity on your systems with the kernel’s audit infrastructure
Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines
Confirm the integrity of files and their permissions with AIDE
Prevent unauthorised USB devices from being used with USBGuard
Protect data at rest but provide secure automatic decryption at boot using NBDE
Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights
Analyse and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower
Red Hat at Lumify Work
Red Hat is the leading provider of open source, enterprise IT solutions. Lumify Work is proud to offer clients the ability to attend over 40 official Red Hat training courses through a resell agreement with Red Hat. Maximise the return on your Red Hat technology investment with lab-intensive, Instructor-Led Training run by Red Hat themselves. Alternatively, for those unable to attend training, log in and learn with Red Hat Online Learning.
System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organisation’s security policies.
Manage security and risk Define strategies to manage security on Red Hat Enterprise Linux servers
Automate configuration and remediation with Ansible Remediate configuration and security issues with Ansible Playbooks
Protect data with LUKS and NBDE Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted
Restrict USB device access Protect system from rogue USB device access with USBGuard
Control authentication with PAM Manage authentication, authorisation, session settings, and password controls by configuring pluggable authentication modules (PAMs)
Record system events with audit Record and inspect system events relevant to security, using the Linux kernel’s audit subsystem and supporting tools
Monitor file system changes Detect and analyse changes to a server’s file systems and their contents using AIDE
Mitigate risk with SELinux Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses
Manage compliance with OpenSCAP Evaluate and remediate a server’s compliance with security policies by using OpenSCAP
Automate compliance with Red Hat Satellite Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite
Analyse and remediate issues with Red Hat Insights Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights
Perform a comprehensive review Review the content covered in this course by completing hands-on review exercises
For candidates who have not earned their RHCE, confirmation of the correct skill set knowledge can be obtained by passing the online skills assessment.
THIRD PARTY REGISTRATION
Lumify Work offers certification and training in Enterprise Linux, Ansible, JBoss, OpenShift, OpenStack, and more through our partnership with Red Hat. This arrangement requires Lumify Work to provide your details to Red Hat for course and/or exam registration purposes.
Terms & Conditions
The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.
Request Course Information
Personalise your schedule with Lumify USchedule
Interested in a course that we have not yet scheduled? Get in touch, and ask for your preferred date and time. We can work together to make it happen.