Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415)

Live Online (VILT) & Classroom Corporate Training Course

Redhat logo

Master the essentials of securing Linux systems across all platforms.

How can we help you?

  • CloudLabs
  • Projects
  • Assignments
  • 24x7 Support
  • Lifetime Access

Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415)

Overview

This course is designed for IT professionals aiming to enhance their skills in securing Linux systems deployed on physical hardware, virtual machines, and cloud platforms. Participants will learn to implement robust security measures, manage compliance, and mitigate risks using industry-standard tools and practices.

Objectives

By the end of this course, leaner will be able to:

  • Define and implement strategies to manage security on Linux systems.
  • Automate configuration and remediation using Ansible Playbooks.
  • Encrypt data on storage devices and manage automatic decryption during system boot.
  • Protect systems from unauthorized USB device access.
  • Manage authentication, authorization, and session settings using Pluggable Authentication Modules (PAM).
  • Record and inspect system events relevant to security using the Linux kernel’s Audit system.
  • Detect and analyze changes to a server’s file systems using AIDE.
  • Enhance security between processes using SELinux and advanced techniques.
  • Evaluate and remediate a server’s compliance with security policies using OpenSCAP.
  • Identify and correct common issues and vulnerabilities using Red Hat Insights.
  • Automate and scale compliance checks using Red Hat Satellite.

Prerequisites

  • Experience as a system administrator responsible for supporting physical and virtual infrastructure, systems, and servers.
  • Familiarity with IT security practices and compliance requirements.
  • Basic knowledge of automation tools and cloud infrastructure.

Course Outline

Module 1: Managing Security and Risk2025-01-29T11:24:36+05:30
  • Develop strategies to manage security on Linux systems.
Module 2: Automating Configuration and Remediation with Ansible2025-01-29T11:28:25+05:30
  • Use Ansible Playbooks to remediate configuration and security issues.
Module 3: Protecting Data with LUKS and NBDE2025-01-29T11:30:21+05:30
  • Encrypt data on storage devices using LUKS.
  • Manage automatic decryption during system boot with NBDE.
Module 4: Restricting USB Device Access2025-01-29T11:31:22+05:30
  • Implement USBGuard to protect systems from unauthorized USB devices.
Module 5: Controlling Authentication with PAM2025-01-29T11:32:18+05:30
  • Configure PAM to manage authentication and authorization settings.
Module 6: Recording System Events with Audit2025-01-29T11:33:08+05:30
  • Utilize the Linux kernel’s Audit system to record and inspect security-relevant events.
Module 7: Monitoring File System Changes2025-01-29T11:33:54+05:30
  • Deploy AIDE to detect and analyze changes in file systems.
Module 8: Mitigating Risk with SELinux2025-01-29T11:34:38+05:30
  • Apply SELinux policies to improve security and process confinement.
Module 9: Managing Compliance with OpenSCAP2025-01-29T11:35:39+05:30
  • Assess and remediate system compliance using OpenSCAP.
Module 10: Analyzing and Remediating Issues with Red Hat Insights2025-01-29T11:36:34+05:30
  • Identify and address common security vulnerabilities using Red Hat Insights.
Module 11: Automating Compliance with Red Hat Satellite2025-01-29T11:37:28+05:30
  • Scale and automate compliance checks with Red Hat Satellite.
Module 12: Comprehensive Review2025-01-29T11:38:46+05:30
  • Consolidate and review the skills and knowledge acquired throughout the course.
2025-01-30T13:09:57+05:30
Go to Top