fbpx

Red Hat Server Hardening

Red Hat Server Hardening

Course ID: RH413 4 Days
   

Red Hat Server Hardening

Overview

Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns. This course can also help you prepare for the Red Hat Certified Specialist in Server Security and Hardening exam (EX413).

Description

Audience

  • Needs technical guidance on how to enhance the security of Red Hat Enterprise Linux systems
  • Responsible for implementing security policy requirements on Red Hat Enterprise Linux systems consistently and in a reproducible, scalable way
  • Must be able to demonstrate that systems meet security policy requirements
  • Maintains continued adherence to security requirements, including management of security-critical operating system/software updates RHCE-level skills highly recommended

Certification

Red Hat Certified Architect – RHCA

Exam

Red Hat Certified Specialist in Server Security and Hardening exam (EX413)

Investment

Instructor-led / Virtual Instructor-led

Singapore: SGD3,800
India: USD3,000

PREREQUISITES

  • Red Hat Certified Engineer (RHCE) certification, Red Hat Certified Systems Administrator (RHCSA) certification, or equivalent experience required
  • For candidates who have not earned their RHCSA or RHCE certifications, confirmation of the required knowledge can be obtained by passing the online skills assessment

OBJECTIVES

  • Deploy identity management to facilitate user account security policies.
  • Implement system auditing and logging based on system and user security policies.
  • Recognize, understand, and apply relevant errata to maintain system integrity.

COURSE CONTENT

Module 1: Track security updates

Module 2: Manage software updates

Module 3: Create file systems

Module 4: Manage file systems

Module 5: Manage special permissions

Module 6: Manage additional file access controls

Module 7: Monitor for file system changes

Module 8: Manage user accounts

Module 9: Manage pluggable authentication modules (PAMs)

Module 10: Secure console access

Module 11: Install central authentication

Module 12: Manage central authentication

Module 13: Configure system logging

Module 14: Configure system auditing

Module 15: Control access to network services

What’s Next

Subscribe to our mailing list for special offers and promotions.

Processing...
Thank you! Your subscription has been confirmed. You'll hear from us soon.
ErrorHere