Redhat Technologies

EX415: Red Hat Linux Security

Red Hat Linux Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, virtual machines, or as cloud instances.

Mr. Krishna Sir- KR Network Cloud
Instructor
Mr. Krishna Jeevan Upadhyay
Enquiry Form

    Overview Of Red Hat Certified Specialist in Linux Security

    Red Hat Linux Security | RH415 training

    The security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. Red Hat Linux Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements.

    Objective

    Red Hat Linux Security Certified Specialist | Course Objective

    In this course, the central computer system used for hands-on learning activities is a workstation. Students also use seven other machines for these activities: server A, server B, server C, server D, server E, tower, and satellite. All eight of these systems are in the lab.example.com DNS domain.

    All student computer systems have a standard user account, student, which has the password student. The root password on all student systems is redhat. The admin user password for the Satellite and the Ansible Tower is Redhat.

    • Manage security risk by using security technologies included in Red Hat Linux Security in Red Hat Enterprise Linux.
    • Prepare for the Red Hat Linux Security Specialist certification exam.

    Course Content

    Unit-1 RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD
    • Cloud Storage with Red Hat Ceph Storage
    • Orientation to the Classroom Environment
    • Performing Lab Exercises
    Unit-2 MANAGING SECURITY AND RISK
    • Managing Security and Risk
    • Quiz: Managing Security and Risk
    • Reviewing Recommended Security Practices
    • Guided Exercise: Reviewing Recommended Security Practices
    • Lab: Managing Security and Risk
    • Summary
    Unit-3 AUTOMATING CONFIGURATION AND REMEDIATION WITH ANSIBLE
    • Configuring Ansible for Security Automation
    • Guided Exercise: Configuring Ansible for Security Automation
    • Remediating Issues with Ansible Playbooks
    • Guided Exercise: Remediating Issues with Ansible Playbooks
    • Managing Playbooks with Red Hat Ansible Tower
    • Guided Exercise: Managing Playbooks with Red Hat Ansible Tower
    • Lab: Automating Configuration and Remediation with Ansible
    • Summary
    Unit-4 PROTECTING DATA WITH LUKS AND NBDE
    • Managing File System Encryption with LUKS
    • Guided Exercise: Managing File System Encryption with LUKS
    • Controlling File System Decryption with NBDE
    • Guided Exercise: Controlling File System Decryption with NBDE
    • Lab: Protecting Data with LUKS and NBDE
    • Summary
    Unit-5 RESTRICTING USB DEVICE ACCESS
    • Controlling USB Access with USBGuard
    • Guided Exercise: Controlling USB access with USBGuard
    • Lab: Restricting USB Device Access
    • Summary
    Unit-6 CONTROLLING AUTHENTICATION WITH PAM
    • Auditing the PAM Configuration
    • Guided Exercise: Auditing the PAM Configuration
    • Modifying the PAM Configuration
    • Guided Exercise: Modifying the PAM Configuration
    • Configuring Password Quality Requirements
    • Guided Exercise: Configuring Password Quality Requirements
    • Limiting Access after Failed Logins
    • Guided Exercise: Limiting Access after Failed Logins
    • Lab: Controlling Authentication with PAM
    • Summary
    Unit-7 RECORDING SYSTEM EVENTS WITH AUDIT
    • Configuring Audit to Record System Events
    • Guided Exercise: Configuring Audit to Record System Events
    • Inspecting Audit Logs
    • Guided Exercise: Inspecting Audit Logs
    • Writing Custom Audit Rules
    • Guided Exercise: Writing Custom Audit Rules
    • Enabling Prepackaged Audit Rule Sets
    • Guided Exercise: Enabling Prepackaged Audit Rule Sets
    • Lab: Recording System Events with Audit
    • Summary
    Unit-8 MONITORING FILE SYSTEM CHANGES
    • Detecting File System Changes with AIDE
    • Guided Exercise: Detecting File System Changes with AIDE
    • Investigating File System Changes with AIDE
    • Guided Exercise: Investigating File System Changes with AIDE
    • Lab: Monitoring File System Changes
    • Summary
    Unit-9 MITIGATING RISK WITH SELINUX
    • Enabling SELinux from the Disabled State
    • Guided Exercise: Enabling SELinux from the Disabled State
    • Controlling Access with Confined Users
    • Guided Exercise: Controlling Access with Confined Users
    • Auditing the SELinux Policy
    • Guided Exercise: Auditing the SELinux Policy
    • Lab: Mitigating Risk with SELinux
    • Summary
    Unit-10 MANAGING COMPLIANCE WITH OPENSCAP
    • Installing OpenSCAP
    • Guided Exercise: Installing OpenSCAP
    • Scanning and Analyzing Compliance
    • Guided Exercise: Scanning and Analyzing Compliance
    • Customizing OpenSCAP Policy
    • Guided Exercise: Customizing OpenSCAP Policy
    • Remediating OpenSCAP Issues with Ansible
    • Guided Exercise: Remediating OpenSCAP Issues with Ansible
    • Lab: Managing Compliance with OpenSCAP
    Unit-11 AUTOMATING COMPLIANCE WITH RED HAT SATELLITE
    • Configuring Red Hat Satellite for OpenSCAP
    • Guided Exercise: Configuring Red Hat Satellite for OpenSCAP
    • Scan OpenSCAP Compliance with Red Hat Satellite
    • Guided Exercise: Scan OpenSCAP Compliance with Red Hat Satellite
    • Customize the OpenSCAP Policy in Red Hat Satellite
    • Guided Exercise: Customizing OpenSCAP Policy in Red Hat Satellite
    • Lab: Automating Compliance with Red Hat Satellite
    • Summary
    Unit-12 ANALYZING AND REMEDIATING ISSUES WITH RED HAT INSIGHTS
    • Registering Systems with Red Hat Insights
    • Quiz: Registering Systems with Red Hat Insights
    • Reviewing Red Hat Insights Reports
    • Quiz: Reviewing Red Hat Insights Reports
    • Automating Issue Remediation
    • Guided Exercise: Automating Issue Remediation
    • Lab: Automating Issue Remediation
    • Summary
    Unit- 13 COMPREHENSIVE REVIEW
    • Comprehensive Review
    • Lab: Automating Configuration and Remediation with Ansible
    • Lab: Protecting Data with LUKS and NBDE
    • Lab: Restricting USB Device Access and Mitigating Risk with SELinux
    • Comprehensive Review Audit Rule Sets
    • Lab: Recording Events, Monitoring File System Changes and Managing
    • Compliance with OpenSCAP

    Why Learn RedHat Linux Security?

    • Keep an eye on OpenSCAP consistency.
    • Enable SELinux for a worker from a disabled state, do a necessary analysis of the framework plan, and reduce risk using state-of-the-art SELinux techniques.
    • Take proactive measures to identify and fix problems with Red Hat Insights.
    • Screen action and modifications on an employee using AIDE and Linux Audit.
    • Protect data from a deal by using capacity encryption and USBGuard.
    • Use PAM to monitor validation controls.
    • Ansible Playbooks are physically employed to automate the moderation of security and consistency issues.
    • Using Red Hat Satellite and Red Hat Ansible Tower, scale OpenSCAP and Red Hat insights across the board.

    Audience Includes:

    • System administrators
    • IT Security Administrators
    • IT Security Engineers
    • Other IT professionals

    PREREQUISITE FOR THIS TRAINING

    The Top Reason why to choose KR Network Cloud

    • KR Network Cloud is the Red Hat Authorized Training Partner
    • We have a world-class experienced & Certified Trainer for Red Hat Training
    • All lab facilities are available. labs are facilitated with a computer
    • We provide training as well as Red Hat Certification
    • KR Network Cloud will provide you with the Notes, Videos, and Red Hat Training books
    • We provide corporate as well as industrial training in Delhi
    • Demo sessions, Workshops, Exhibitions, Backup Classes, Practice sessions, ETC
    • Provide Exam Preparations to the Student
    • Our trainer will also help you crack your interview.
    • Job assistance facility for our students is also available
    • Provides online as well as classroom training.
    • Provides More Opportunities for future

    Certificate