IT Infrastructure & Networks Category Banner Image

RH415 - Red Hat Security: Linux in Physical, Virtual, and Cloud

  • Length 4 days
  • Price  NZD 5120 exc GST
Course overview
View dates &
book now
Course locations >>

Why study this course

Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.

This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.

Request Course Information


What you’ll learn

As a result of attending this course, you should be able to use security technologies included in Red Hat Enterprise Linux to manage security risk and help meet compliance requirements.

You should be able to demonstrate these skills:

  • Analyse and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customising baseline policy content provided with Red Hat Enterprise Linux

  • Monitor security-relevant activity on your systems with the kernel’s audit infrastructure

  • Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines

  • Confirm the integrity of files and their permissions with AIDE

  • Prevent unauthorised USB devices from being used with USBGuard

  • Protect data at rest but provide secure automatic decryption at boot using NBDE

  • Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights

  • Analyse and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower


Red Hat logo

Red Hat at Lumify Work

Red Hat is the leading provider of open source, enterprise IT solutions. Lumify Work is proud to offer clients the ability to attend over 40 official Red Hat training courses through a resell agreement with Red Hat. Maximise the return on your Red Hat technology investment with lab-intensive, Instructor-Led Training run by Red Hat themselves. Alternatively, for those unable to attend training, log in and learn with Red Hat Online Learning.


Who is the course for?

System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organisation’s security policies.


Course subjects

Manage security and risk
Define strategies to manage security on Red Hat Enterprise Linux servers

Automate configuration and remediation with Ansible
Remediate configuration and security issues with Ansible Playbooks

Protect data with LUKS and NBDE
Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted

Restrict USB device access
Protect system from rogue USB device access with USBGuard

Control authentication with PAM
Manage authentication, authorisation, session settings, and password controls by configuring pluggable authentication modules (PAMs)

Record system events with audit
Record and inspect system events relevant to security, using the Linux kernel’s audit subsystem and supporting tools

Monitor file system changes
Detect and analyse changes to a server’s file systems and their contents using AIDE

Mitigate risk with SELinux
Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses

Manage compliance with OpenSCAP
Evaluate and remediate a server’s compliance with security policies by using OpenSCAP

Automate compliance with Red Hat Satellite
Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite

Analyse and remediate issues with Red Hat Insights
Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights

Perform a comprehensive review
Review the content covered in this course by completing hands-on review exercises


Prerequisites

For candidates who have not earned their RHCE, confirmation of the correct skill set knowledge can be obtained by passing the online skills assessment.


THIRD PARTY REGISTRATION

Lumify Work offers certification and training in Enterprise Linux, Ansible, JBoss, OpenShift, OpenStack, and more through our partnership with Red Hat. This arrangement requires Lumify Work to provide your details to Red Hat for course and/or exam registration purposes.


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Awaiting course schedule

If you would like to receive a notification when this course becomes available, enter your details below.

Personalise your schedule with Lumify USchedule

Interested in a course that we have not yet scheduled? Get in touch, and ask for your preferred date and time. We can work together to make it happen.



Loading