Detailed Course Outline
Managing Security and Risk
Define and implement strategies to manage security on Red Hat Enterprise Linux systems.
Automating Configuration and Remediation with Ansible
Remediate configuration and security issues automatically with Ansible Playbooks.
Protecting Data with LUKS and NBDE
Encrypt data on storage devices with LUKS, and use NBDE to manage automatic decryption when servers are booted.
Restricting USB Device Access
Protect systems from rogue USB device access with USBGuard.
Controlling Authentication with PAM
Manage authentication, authorization, session settings, and password controls by configuring Pluggable Authentication Modules (PAM).
Recording System Events with Audit
Record and inspect system events relevant to security by using the Linux kernel's Audit system and supporting tools.
Monitoring File System Changes
Detect and analyze changes to a server's file systems and their contents by using AIDE.
Mitigating Risk with SELinux
Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analysis.
Managing Compliance with OpenSCAP
Evaluate and remediate a server's compliance with security policies by using OpenSCAP.
Analyzing and Remediating Issues with Red Hat Insights
Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights.
Automating Compliance with Red Hat Satellite
Automate and scale OpenSCAP compliance checks by using Red Hat Satellite.
Comprehensive Review
Review tasks from Red Hat Security: Linux in Physical, Virtual, and Cloud.