ProductsServer Desktop & Workstation Developer Subscriptions Satellite OpenStack Platform For IBM POWER For SAP Business Applications Management For Scientific ComputingExtended Update Support High Availability High Performance Network Load Balancer Resilient Storage Scalable File System Smart Management Extended Lifecycle SupportA-MQ Accelerate Automate Integrate Application Platform BPM Suite BRMS JBoss community or Red Hat JBoss Middleware Data Grid Data Virtualization Developer Studio Portfolio Edition Fuse Fuse Service Works Operations Network Portal Web Framework Kit Web Server
SolutionsWhy Red Hat Why open hybrid cloud? The new IT Public cloud Cloud resource library Private cloud Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) Cloud applications and workloadsSolaris to Red Hat Enterprise Linux Migration overview Migrate from your UNIX platform How to migrate to Red Hat Enterprise Linux Upgrade to the latest Red Hat Enterprise Linux release Red Hat JBoss Middleware Benefits of migrating to Red Hat Enterprise Linux Migration services Start a conversation with Red Hat
TrainingPopular and new courses Red Hat JBoss Administration curriculum Core System Administration curriculum Red Hat JBoss Middleware development curriculum Advanced System Administration curriculum Linux Development curriculum Cloud Computing, Virtualization, and Storage curriculum
ConsultingSOA and integration Business process management Custom Software Development Enterprise Data and Storage Systems management Migrations
Red Hat Server Hardening Virtual (RH413VT)
Secure a Red Hat Enterprise Linux system to comply with security policy requirements
Red Hat® Server Hardening builds on a student's Red Hat Certified Engineer (RHCE®) certification or equivalent experience to teach how to secure a Red Hat Enterprise Linux® system to comply with security policy requirements. Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns.
Course content summary
- Review errata and apply them to Red Hat Enterprise Linux.
- Use special permissions and file system access control lists.
- Manage users and password-aging policy requirements.
- Install and configure Red Hat Identity Management tools.
- Understand system auditing.
Read the entire course outline for more details.
Red Hat virtual training is real-time training conducted by instructors through an online environment. Featuring the same industry-respected content as the corresponding classroom-based courses, virtual training provides an ideal combination of flexibility and knowledge transfer in the convenience of your offices or home.
Length:5 Days ,
Training units: 11
Needs technical guidance on how to enhance the security of Red Hat Enterprise Linux systems
Responsible for implementing security policy requirements on Red Hat Enterprise Linux systems consistently and in a reproducible, scalable way
Must be able to demonstrate that systems meet security policy requirements
Maintains continued adherence to security requirements, including management of security-critical operating system/software updates
RHCE-level skills highly recommended
Red Hat Certified Engineer (RHCE) certification, Red Hat Certified Systems Administrator (RHCSA) certification, or equivalent experience required
For candidates who have not earned their RHCSA or RHCE certifications, confirmation of the required knowledge can be obtained by passing the online skills assessment at http://www.redhat.com/training/skills_assessment/
This course is offered in the following training methods:
Industry-leading instruction in a traditional classroom environment
Instructor-led, real-time training in a virtual environment
Self-paced training conducted online
Private, team training at your location of choice
This course prepares you for these credentials:
Secure a Red Hat Enterprise Linux System to comply with security policy requirements