The security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. Red Hat Linux Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements.
In this course, the central computer system used for hands-on learning activities is a workstation. Students also use seven other machines for these activities: server A, server B, server C, server D, server E, tower, and satellite. All eight of these systems are in the lab.example.com DNS domain.
All student computer systems have a standard user account, student, which has the password student. The root password on all student systems is redhat. The admin user password for the Satellite and the Ansible Tower is Redhat.