Contact us
Account Log in

Red Hat Certification

Red Hat Certified Specialist in Security: Linux

Jump to section

A Red Hat Certified Specialist in Security: Linux has demonstrated the knowledge, skills, and abilities needed to secure Red Hat® Enterprise Linux® systems and to enforce compliance with security policies.

Certification details

Skills

Prove your skills and knowledge

A Red Hat Certified Specialist in Security: Linux is able to:

  • Configure intrusion detection.
  • Configure encrypted storage.
  • Restrict USB devices.
  • Manage PAM authentication.
  • Configure system auditing.
  • Configure SELinux.
  • Use OpenSCAP and other tools to audit security policy compliance.

Audience

Is this certification right for you?

If you’re a system administrator responsible for managing large enterprise environments or securing your organization’s infrastructure, or if you’re a Red Hat Certified Engineer intent on pursuing the Red Hat Certified Architect (RHCA) credential, you may be interested in becoming a Red Hat Certified Specialist in Security: Linux.

Exams

Test your skills and knowledge

Red Hat Certified Specialist in Security: Linux (EX415)
An IT professional who passes this exam will earn a Red Hat Certified Specialist endorsement that also counts toward earning the RHCA credential.

Training

The best way to learn is to do

We recommend this course to help you prepare to earn a Red Hat Certified Specialist in Security: Linux credential:

Do you have questions? Get in touch.

Red Hat logo LinkedInYouTubeFacebookTwitter

Products

Tools

Try, buy, & sell

Communicate

About Red Hat

We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Subscribe to our newsletter, Red Hat Shares

Sign up now

Select a language

© 2022 Red Hat, Inc.