Red Hat Certification

Red Hat Certified Specialist in Security: Linux

Jump to section

A Red Hat Certified Specialist in Security: Linux has demonstrated the knowledge, skills, and abilities needed to secure Red Hat® Enterprise Linux® systems and to enforce compliance with security policies.

Certification details

Skills

Prove your skills and knowledge

A Red Hat Certified Specialist in Security: Linux is able to:

  • Configure intrusion detection.
  • Configure encrypted storage.
  • Restrict USB devices.
  • Manage PAM authentication.
  • Configure system auditing.
  • Configure SELinux.
  • Use OpenSCAP and other tools to audit security policy compliance.

Audience

Is this certification right for you?

If you’re a system administrator responsible for managing large enterprise environments or securing your organization’s infrastructure, or if you’re a Red Hat Certified Engineer intent on pursuing the Red Hat Certified Architect (RHCA) credential, you may be interested in becoming a Red Hat Certified Specialist in Security: Linux.

Exams

Test your skills and knowledge

Red Hat Certified Specialist in Security: Linux (EX415)
An IT professional who passes this exam will earn a Red Hat Certified Specialist endorsement that also counts toward earning the RHCA credential.

Training

The best way to learn is to do

We recommend this course to help you prepare to earn a Red Hat Certified Specialist in Security: Linux credential:

Do you have questions? Get in touch.