The Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) training course will give you a detailed overview of the tools and techniques used to implement the security. This training course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.
System administrators responsible for managing large enterprise environments,
System administrators responsible for securing their organization's infrastructure,
Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential.
The Red Hat Certified Specialist in Security: Linux exam validates your knowledge and abilities in securing Red Hat Enterprise Linux. By passing this exam, you become a Red Hat Certified Specialist: Linux, which also counts toward becoming a Red Hat Certified Architect (RHCA).
Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better),
Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform.
Install Red Hat Ansible Engine on a control node,
Configure managed nodes,
Configure simple inventories,
Perform basic management of systems,
Run a provided playbook against specified nodes.
Install AIDE,
Configure AIDE to monitor critical system files.
Encrypt and decrypt block devices using LUKS,
Configure encrypted storage persistence using NBDE,
Change encrypted storage passphrases.
Install USBGuard,
Write device policy rules with specific criteria to manage devices,
Manage administrative policy and daemon configuration.
Configure password quality requirements,
Configure failed login policy,
Modify PAM configuration files and parameters.
Write rules to log auditable events,
Enable prepackaged rules,
Produce audit reports.
Enable SELinux on a host running a simple application,
Interpret SELinux violations and determine remedial action,
Restrict user activity with SELinux user mappings,
Analyze and correct existing SELinux configurations.
Install OpenSCAP and Workbench,
Use OpenSCAP and Red Hat Insights to scan hosts for security compliance,
Use OpenSCAP Workbench to tailor policy,
Use OpenSCAP Workbench to scan an individual host for security compliance,
Use Red Hat Satellite server to implement an OpenSCAP policy,
Apply OpenSCAP remediation scripts to hosts.