System Security for Red Hat Linux
System Security for Red Hat Linux Course Overview
This highly practical instructor led System Security for Red Hat Linux course is aimed at Linux System Administrators who wish to enhance their knowledge of Red Hat Linux security and increase the security of their Red Hat Linux systems.
The course covers security related tasks for Red Hat Enterprise Linux (RHEL) and CentOS Linux systems. The topics taught would also be relevant for all Linux distributions.
Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
----------------------------------------------------------------------------------------------------------------------------------
Who will the Course Benefit?
The System Security for Red Hat Linux course is aimed at Linux System Administrators who wish to expand their knowledge of the many Red Hat Linux security features and increase the security level of their Red Hat Linux systems.
----------------------------------------------------------------------------------------------------------------------------------------
Course Objectives
This course aims to provide the delegate with the knowledge to be able to query their Red Hat Linux system for most security related events and harden many aspects of their system. The course explains the; Linux logging and auditing framework, SELinux, the firewall, certificate authorities, network time, Secure Shell, Pluggable Authentication Modules, host intrusion and detection, password cracking, the sudo command, encrypting files and OpenVPN.
-------------------------------------------------------------------------------------------------------------------------------------
Course Description
System Security for Red Hat Linux online course get started with introduction of security principles and policy. System Security for Red Hat Linux online course intention is to provide a foundation to implement security principles.
System Security for Red Hat Linux online course will allow the participants to learn the development culture and vital parts of System Security for Red Hat Linux.
System Security for Red Hat Linux online course is ideally developed for Linux users and administrators who wants to know more about System Security for Red Hat Linux.
In the System Security for Red Hat Linux online training course, Uplatz provides an in-depth online training for the participants or learners to gain knowledge and able to secure systems using security controls. Uplatz provides appropriate teaching and expertise training to equip the participants for implementing the learnt concepts in an enterprise.
System Security for Red Hat Linux online training course curriculum covers security requirements, firewalls, linux services, wireless security.
With the help of System Security for Red Hat Linux online course, the learners can discover:
-
Inhouse Terminology and concepts related to the System Security for Red Hat Linux
-
Fundamentals of System Security for Red Hat Linux
-
Understand linux services
-
Configure a router-based firewall
Uplatz provides an in-depth training to the learners to accelerate their knowledge and skill set required for a Red Hat Linux security administrator.
-------------------------------------------------------------------------------------------------------------------------------------
This is a System Security for Red Hat Linux course by Uplatz.
System Security for Red Hat Linux
System Security for Red Hat Linux Training Course
Course Introduction
- Administration and Course Materials
- Course Structure and Agenda
- Delegate and Trainer Introductions
Session 1: INTRODUCTION TO LINUX SECURITY
- Linux Native Security
- Areas of Security
- Common Attack Methods
- Basic Security Precautions
- Standards and Compliance
Session 2: SECURING THE USER ENVIRONMENT
- Managing User Accounts
- Bash history
- Configuring History
- Confining User History
Session 3: LOGGING WITHIN LINUX
- Linux Log Files
- systemd Journal
- Linux Audit Framework
- Generating Audit Queries
- Configuring Auditing
- Defining Auditing Rules
Session 4: SELinux
- DAC vs MAC
- The SELinux Policy
- SELinux Contexts
- SELinux Key Commands
- Viewing SELinux Decisions
- SELinux Booleans
- Exporting SELinux Configuration
System Security for Red Hat Linux Training Course
Session 5: SELinux MODULES
- SELinux Entities
- SELinux Modules
- Administering Modules
- Creating Modules With audit2allow
- Writing SELinux Modules
- The Type Enforcement File
Session 6: RED HAT FIREWALL
- Firewalld Overview
- Firewalld vs IPTables
- Firewall Zones
- Configuring Firewall
- Creating a Firewall Service
- Configuring Firewall Zones
- Rich Rules
- Fail2ban Installation and Configuration
Session 7: SECURING SSH
- Key Algorithms
- SSH Agents
- SSH Server Options
- The known_hosts File
- Certificate Based Authentication
- Verifying Signed Certificates
Session 8: SECURING APPLICATIONS
- Certificate Based Authentication
- Creating a Certificate Authority
- Configuring Logging with TLS
- TCP Wrappers
- Network Time
- chrony Security
- Authenticating chrony Clients
System Security for Red Hat Linux Training Course
Session 9: INTRUSION DETECTION AND PREVENTION
- Detecting Intrusions with AIDE
- Installing and Configuring AIDE
- Detecting and Removing Rootkits
- Installing and Configuring ClamAV
Session 10: SECURING PACKAGES
- Red Hat Package Management
- Obtaining Detailed Update Information
- Package Management History
- Creating an rpm Package
- Signing an rpm Package
- Installing a Signed rpm
- Creating a Package Repository
Session 11: PLUGGABLE AUTHENTICATION MODULES
- PAM File Format
- PAM Configuration File
- Using PAM to Allow/Deny a Service
- Restricting Access to SSH
- Increasing Password Complexity
- Delaying Failed Logins
- Controlling Access by Time
- Limiting user Resources
Session 12: CRACKING LINUX PASSWORDS
- Password Hashing Methods
- Verifying Password Strength
- Types Of Password Attacks
- Password Cracking
- Installing a Password Cracking Utility
- Installing a Word List
- Resetting a Lost root Password
System Security for Red Hat Linux Training Course
Session 13: SUDO AND RESTRICTING LOGINS
- Configuring Sudo
- Basic Examples
- Password Administration
- Running Sudo On Remote Systems
- Sudoedit
- Sudo Logging
- Sudo Digests
- Include Statements
- Restricting root Access
Session 14: SECURING THE LINUX FILESYSTEM
- Linux Filesystem Security
- Protecting the Boot Menu
- Securely Erasing Data
- Data Sanitisation Methods
- Extended Permissions
- Extended File Attributes
- File Access Control Lists
- LUKS Encrypted Partitions
Session 15: AN OVERVIEW OF RED HAT IDENTITY MANAGEMENT
- Red Hat Identity Management
- The Identity Management Domain
- IdM Server Configuration Options
APPENDIX A: IdM INSTALLATION
- IdM Server Prerequisites
- Verifying DNS Configuration
- IdM Server Installation
- IdM Client Installation
APPENDIX B: SECURING VSFTPD WITH SSL/TLS
- Creating an SSL Certificate
- Configuring VSFTPD FOR SSL/TLS
System Security for Red Hat Linux online certification course with the help of expert professionals training is recognized across the globe. Because of the increased adoption of the Linux security services in various companies the participants are able to find the job opportunity easily. The leading companies hire Red Hat Linux security administrator considering their skill of understanding firewall and configure Linux services. System Security for Red Hat Linux online certification course is known for their knowledge in managing system environments along with Linux security services. After pursuing System Security for Red Hat Linux online certification course the participants can become as a Linux system administrator, security administrator, redhat security administrator and can pursue a wide range of career paths.