Skip to Scheduled Dates
Course Overview
Your systems may be secure today, but what about tomorrow?
With threats evolving and infrastructure stretching across physical, virtual, and cloud environments, security is no longer a checklist; it’s a continuous, automated strategy. If you’re ready to go beyond the basics and build enterprise-grade defenses for hybrid environments, the Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) course will empower you to take control of security and compliance across Red Hat Enterprise Linux deployments.
Through immersive, hands-on labs, you’ll learn how to proactively manage risk using tools like SELinux, OpenSCAP, Red Hat Insights, Red Hat Satellite, and Ansible Automation Platform. You won’t just react to vulnerabilities; you’ll anticipate and eliminate them at scale.
Who Should Attend
This course is designed for security administrators and system administrators responsible for managing the security of Red Hat Enterprise Linux systems across physical, virtual, and cloud instances. It is ideal for administrators who need to manage the secure operation of servers running Red Hat, ensure compliance with security policies, and proactively manage risk.
Course Objectives
After completing this course, you’ll be able to manage the secure operation of Red Hat systems across on-premises and cloud environments. You’ll use tools like Red Hat Insights, OpenSCAP, and SELinux to help you implement and comply with your organization’s security policies.
- Enable and configure SELinux and implement advanced techniques to restrict access
- Use Red Hat Insights to detect and remediate vulnerabilities
- Evaluate compliance using OpenSCAP and SCAP Workbench
- Encrypt data on storage devices with LUKS and NBDE
- Record and inspect system events using the Linux Audit system
- Manage authentication using PAM
- Scale compliance automation with Red Hat Ansible and Red Hat Satellite
Course Outline
Module 1: Managing Security and Risk
- Understand the process of managing risk
- Define and implement security policies
- Technologies and tools backed by Red Hat
Module 2: Automating with Red Hat Ansible
- Use Red Hat Ansible to deploy remediation
- Automate secure configuration
- Apply provided Ansible Playbooks
Module 3: Encrypting Storage Devices
- Use LUKS to encrypt data
- Use NBDE to manage automatic decryption when servers are booted
- Secure data at rest
Module 4: Restricting USB Access
- Use USBGuard to protect from unauthorized USB devices
- Configure and manage USB access controls
Module 5: Managing Authentication with PAM
- Configure PAM for authentication and session settings
- Manage password and access policies
Module 6: Auditing System Events
- Record and inspect system events relevant to security
- Use the Linux Audit system and supporting tools
Module 7: Monitoring File Integrity
- Detect changes using AIDE
- Monitor and analyze file system integrity
Module 8: SELinux and Advanced Techniques
- Enable SELinux
- Analyze and modify policies
- Implement advanced SELinux techniques to restrict access
Module 9: Evaluating Compliance with OpenSCAP
- Use OpenSCAP and SCAP Workbench
- Identify security gaps and remediate them with Red Hat
Module 10: Detecting Issues with Red Hat Insights
- Proactively identify and resolve issues
- Analyze system risks and apply fixes
Module 11: Scaling Compliance with Red Hat Satellite
- Automate compliance checks
- Manage Red Hat Enterprise Linux systems at scale
Module 12: Review and Capstone
- Apply what you've learned across modules
- Simulated real-world challenge scenarios