RH415 Red Hat Security: Linux in Physical, Virtual and Cloud Environments

RH415 Red Hat Security: Linux in Physical, Virtual and Cloud Environments

Course Summary

Manage the security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual and cloud environments

Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances.

This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.

Maintaining the security of computer systems is a process of managing risk by implementing processes and standards supported by technology and tools. In this course, you will learn about resources that can be used to help you implement and meet your security requirements.

To book this course, you need to subscribe to a one-year Red Hat Learning Subscription Course (RHLS Course). The subscription includes:

  • Tillgång till hela RH415-kursen i självstudieformat via Red Hat Learning Subscription.
  • Interactive labs in the cloud (hands-on exercises).
  • Self-paced course materials, videos and exercises .
  • Support via Red Hat platforms.
  • Possibility to participate in a live course (virtual instructor-led) during the subscription period – at no extra cost.
  • Flexibility to plan your learning according to your needs.

Please note that invoicing takes place when the order is placed.

This product is currently out of stock and unavailable.

Course Objective
  • Managing compliance with OpenSCAP.
  • Enable SELinux on a server from a disabled state, perform basic system policy analysis, and reduce risk with advanced SELinux techniques.
  • Proactively identify and resolve issues with Red Hat Insights.
  • Monitor activity and changes on a server with Linux Audit and AIDE.
  • Protect data from intrusion with USBGuard and storage encryption.
  • Manage authentication checks with PAM.
  • Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues.
  • Scale up OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Tower.

After attending this course, you should be able to use security technologies included in Red Hat Enterprise Linux to manage security risks and help meet compliance requirements.

You should be able to demonstrate that you have these skills:

  • Analyze and remediate system compliance using OpenSCAP and SCAP Workbench by using and customizing the baseline policy content provided with Red Hat Enterprise Linux.
  • Monitor security-relevant activity on your systems with the kernel audit infrastructure.
  • Explain and implement advanced SELinux techniques to restrict access for users, processes and virtual machines.
  • Confirm the integrity of files and their permissions with AIDE.
  • Prevent unauthorized USB devices from being used with USBGuard.
  • Protect data at rest but provide secure automatic decryption at startup with NBDE.
  • Proactively identify risks and misconfigurations in systems and fix them with Red Hat Insights.
  • Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower.
Target Audience

System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring that they comply with the organization’s security policy.

Prerequisites
Certification
Trainer

Red Hat is the leading provider of open source software solutions for business Enterprises around the world rely on our broad portfolio of hybrid cloud infrastructure, application services, cloud-based application development, and automation solutions to deliver IT services on any infrastructure quickly and cost-effectively.

Get access to hands-on training to stay ahead of technology trends and gain the knowledge you need to get certified. Whether you’re just starting out and need Linux training or you’re a seasoned professional seeking automation certification, we can help.

Test your expertise, find your skills gaps and get recommendations on where to start with Red Hat training

https://skills.ole.redhat.com/en?partner=informator_se

Course Details

Manage security and risk Define strategies to manage security on Red Hat Enterprise Linux servers.

Automate configuration and remediation with Ansible Fix configuration and security issues with Ansible Playbooks.

Protect data with LUKS and NBDE Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are started.

Restrict access to USB devices Protect your system from unauthorized USB devices with USBGuard.

Control authentication with PAM Manage authentication, authorization, session settings, and password controls by configuring the Pluggable Authentication Module (PAM).

Record system events with audit Record and inspect system events relevant to security using the Linux kernel audit subsystem and support tools.

Monitor file system changes Detect and analyze changes to a server’s file system and their contents using AIDE.

Reduce risks with SELinux Improve security and demarcation between processes by using SELinux and advanced SELinux technologies and analytics.

Manage compliance with OpenSCAP Evaluate and remediate a server’s compliance with security policies using OpenSCAP.

Automate compliance with Red Hat Satellite Automate and scale your ability to perform OpenSCAP checks and fix compliance issues with Red Hat Satellite.

Analyze and fix issues with Red Hat Insights Identify, discover, and fix common problems and security issues with Red Hat Enterprise Linux systems using Red Hat Insights.

Perform a comprehensive review Review the content of this course by doing practical review exercises.

Note: The course outline is subject to change as technology evolves and the underlying work changes. For questions or confirmation on a specific objective or topic, please contact one of our Red Hatters.

Course Overview

5 days

Can’t find a (suitable) date, but are interested in the course? Send in an expression of interest and we will do what we can to find a suitable opportunity.

Customized Courses

The course can be adapted from several perspectives:

  • Content and focus area
  • Extent and scope
  • Delivery approach

In interaction with the course leader, we ensure that the course meets your needs.

Send an expression of interest for the training

Send an expression of interest for the training