Manage the security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual and cloud environments
Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances.
This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.
Maintaining the security of computer systems is a process of managing risk by implementing processes and standards supported by technology and tools. In this course, you will learn about resources that can be used to help you implement and meet your security requirements.
To book this course, you need to subscribe to a one-year Red Hat Learning Subscription Course (RHLS Course). The subscription includes:
Please note that invoicing takes place when the order is placed.
After attending this course, you should be able to use security technologies included in Red Hat Enterprise Linux to manage security risks and help meet compliance requirements.
You should be able to demonstrate that you have these skills:
System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring that they comply with the organization’s security policy.
Red Hat is the leading provider of open source software solutions for business Enterprises around the world rely on our broad portfolio of hybrid cloud infrastructure, application services, cloud-based application development, and automation solutions to deliver IT services on any infrastructure quickly and cost-effectively.
Get access to hands-on training to stay ahead of technology trends and gain the knowledge you need to get certified. Whether you’re just starting out and need Linux training or you’re a seasoned professional seeking automation certification, we can help.
Test your expertise, find your skills gaps and get recommendations on where to start with Red Hat training
Manage security and risk Define strategies to manage security on Red Hat Enterprise Linux servers.
Automate configuration and remediation with Ansible Fix configuration and security issues with Ansible Playbooks.
Protect data with LUKS and NBDE Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are started.
Restrict access to USB devices Protect your system from unauthorized USB devices with USBGuard.
Control authentication with PAM Manage authentication, authorization, session settings, and password controls by configuring the Pluggable Authentication Module (PAM).
Record system events with audit Record and inspect system events relevant to security using the Linux kernel audit subsystem and support tools.
Monitor file system changes Detect and analyze changes to a server’s file system and their contents using AIDE.
Reduce risks with SELinux Improve security and demarcation between processes by using SELinux and advanced SELinux technologies and analytics.
Manage compliance with OpenSCAP Evaluate and remediate a server’s compliance with security policies using OpenSCAP.
Automate compliance with Red Hat Satellite Automate and scale your ability to perform OpenSCAP checks and fix compliance issues with Red Hat Satellite.
Analyze and fix issues with Red Hat Insights Identify, discover, and fix common problems and security issues with Red Hat Enterprise Linux systems using Red Hat Insights.
Perform a comprehensive review Review the content of this course by doing practical review exercises.
Note: The course outline is subject to change as technology evolves and the underlying work changes. For questions or confirmation on a specific objective or topic, please contact one of our Red Hatters.
Course Overview
5 days
Can’t find a (suitable) date, but are interested in the course? Send in an expression of interest and we will do what we can to find a suitable opportunity.
Customized Courses
The course can be adapted from several perspectives:
In interaction with the course leader, we ensure that the course meets your needs.
Send an expression of interest for the training
Send an expression of interest for the training