Red Hat Server Hardening

Red Hat Server Hardening

Course ID: RH413 4 Days

Red Hat Server Hardening


Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns. This course can also help you prepare for the Red Hat Certified Specialist in Server Security and Hardening exam (EX413).



  • Needs technical guidance on how to enhance the security of Red Hat Enterprise Linux systems
  • Responsible for implementing security policy requirements on Red Hat Enterprise Linux systems consistently and in a reproducible, scalable way
  • Must be able to demonstrate that systems meet security policy requirements
  • Maintains continued adherence to security requirements, including management of security-critical operating system/software updates RHCE-level skills highly recommended


Red Hat Certified Architect – RHCA


Red Hat Certified Specialist in Server Security and Hardening exam (EX413)


Instructor-led / Virtual Instructor-led

Singapore: SGD3,800
India: USD3,000


  • Red Hat Certified Engineer (RHCE) certification, Red Hat Certified Systems Administrator (RHCSA) certification, or equivalent experience required
  • For candidates who have not earned their RHCSA or RHCE certifications, confirmation of the required knowledge can be obtained by passing the online skills assessment


  • Deploy identity management to facilitate user account security policies.
  • Implement system auditing and logging based on system and user security policies.
  • Recognize, understand, and apply relevant errata to maintain system integrity.


Module 1: Track security updates

Module 2: Manage software updates

Module 3: Create file systems

Module 4: Manage file systems

Module 5: Manage special permissions

Module 6: Manage additional file access controls

Module 7: Monitor for file system changes

Module 8: Manage user accounts

Module 9: Manage pluggable authentication modules (PAMs)

Module 10: Secure console access

Module 11: Install central authentication

Module 12: Manage central authentication

Module 13: Configure system logging

Module 14: Configure system auditing

Module 15: Control access to network services

What’s Next

Subscribe to our mailing list for special offers and promotions.

Thank you! Your subscription has been confirmed. You'll hear from us soon.