Got a question? Call 1800 853 276   |   

RH415 – Red Hat Security: Linux in Physical, Virtual, and Cloud

  • Length 4 days
  • Price $5007.20 inc GST
Course overview
View dates &
book now
  • Register interest

Why study this course

Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.

This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.

Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.


What you’ll learn

As a result of attending this course, you should be able to use security technologies included in Red Hat Enterprise Linux to manage security risk and help meet compliance requirements.

You should be able to demonstrate these skills:

  • Analyze and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customizing baseline policy content provided with Red Hat Enterprise Linux

  • Monitor security-relevant activity on your systems with the kernel’s audit infrastructure

  • Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines

  • Confirm the integrity of files and their permissions with AIDE

  • Prevent unauthorized USB devices from being used with USBGuard

  • Protect data at rest but provide secure automatic decryption at boot using NBDE

  • Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights

  • Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower


Red Hat at DDLS

Red Hat is the leading provider of open source, enterprise IT solutions. DDLS is proud to offer clients the ability to attend over 40 official Red Hat training courses through a resell agreement with Red Hat. Maximise the return on your Red Hat technology investment with lab-intensive, Instructor-Led Training run by Red Hat themselves. Alternatively, for those unable to attend training, log in and learn with Red Hat Online Learning.


Stay ahead of the technology curve

Don’t let your tech outpace the skills of your people

Quality instructors and content

Expert instructors with real world experience and the latest vendor- approved in-depth course content.

Partner-Preferred Supplier

Chosen and awarded by the world’s leading vendors as preferred training partner.

Ahead of the technology curve

No matter your chosen technologies or platforms, we can help you stay one step ahead.

Who is the course for?

System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organisation’s security policies.


Course subjects

Manage security and risk

  • Define strategies to manage security on Red Hat Enterprise Linux servers

Automate configuration and remediation with Ansible

  • Remediate configuration and security issues with Ansible Playbooks

Protect data with LUKS and NBDE

  • Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted

Restrict USB device access

  • Protect system from rogue USB device access with USBGuard

Control authentication with PAM

  • Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs)

Record system events with audit

  • Record and inspect system events relevant to security, using the Linux kernel’s audit subsystem and supporting tools

Monitor file system changes

  • Detect and analyze changes to a server’s file systems and their contents using AIDE

Mitigate risk with SELinux

  • Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses

Manage compliance with OpenSCAP

  • Evaluate and remediate a server’s compliance with security policies by using OpenSCAP

Automate compliance with Red Hat Satellite

  • Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite

Analyze and remediate issues with Red Hat Insights

  • Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights

Perform a comprehensive review

  • Review the content covered in this course by completing hands-on review exercises


Prerequisites

For candidates who have not earned their RHCE, confirmation of the correct skill set knowledge can be obtained by passing the online skills assessment.


THIRD PARTY REGISTRATION

DDLS offers certification and training in Red Hat, JBoss and Ansible through our partnership with Red Hat. This arrangement requires DDLS to provide your details to Red Hat for course and exam registration purposes.


Terms & Conditions

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.



Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.