RH413: Red Hat Server Hardening | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

RH413: Red Hat Server Hardening

Location

Format What’s this?
Starting From
RM 7208.00
  1. 2160 Hours
  1. HRDF SBL Claimable
  2. Certificate of Attendance available
  3. 90 days of access from date of activation
  1. 4 Days
  1. All of our private classes are customized to your organization's needs.
  2. Click on the button below to send us your details and you will be contacted shortly.
Request more information

Inquiry for: Myself    My Company

By providing your contact details, you agree to our Privacy Policy

 

 

 

Thank You

Our learning consultant will get back to you in 1 business day

RH413: Red Hat Server Hardening

WHAT YOU WILL LEARN

Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns. This course can also help you prepare for the Red Hat Certificate of Expertise in Server Hardening exam (EX413).

AUDIENCE

  • Needs technical guidance on how to enhance the security of Red Hat Enterprise Linux systems
  • Responsible for implementing security policy requirements on Red Hat Enterprise Linux systems consistently and in a reproducible, scalable way
  • Must be able to demonstrate that systems meet security policy requirements
  • Maintains continued adherence to security requirements, including management of security-critical operating system/software updates
  • RHCE-level skills highly recommended

PREREQUISITES

  • Red Hat Certified Engineer (RHCE) certification, Red Hat Certified Systems Administrator (RHCSA) certification, or equivalent experience required
  • For candidates who have not earned their RHCSA or RHCE certifications, confirmation of the required knowledge can be obtained by passing the online skills assessment

METHODOLOGY

This program will be conducted with interactive lectures, PowerPoint presentation, discussion and practical exercise.

COURSE OBJECTIVES

Upon completion of this program, participants should be able to :

  • Review errata and apply them to Red Hat Enterprise Linux
  • Use special permissions and file system access control lists
  • Manage users and password-aging policy requirements
  • Install and configure Red Hat Identity Management tools
  • Understand system auditing

Expand All

Modules

Track security updates

Understand how Red Hat Enterprise Linux produces updates and how to use yum to perform queries to identify what errata are available.

Manage software updates

Develop a process for applying updates to systems including verifying properties of the update.

Create file systems

Allocate an advanced file system layout and use file system encryption.

Manage file systems

Adjust file system properties through security related options and file system attributes.

Manage special permissions

Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions and locate files with these permissions enabled.

Manage additional file access controls

Modify default permissions applied to files and directories; work with file access control lists.

Monitor for file system changes

Configure software to monitor the files on your machine for changes.

Manage user accounts

Set password-aging properties for users; audit user accounts.

Manage pluggable authentication modules (PAMs)

Apply changes to PAMs to enforce different types of rules on users.

Secure console access

Adjust properties for various console services to enable or disable settings based on security.

Install central authentication

Install and configure a Red Hat Identity Management server and client.

Manage central authentication

Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted to users on those systems.

Configure system logging

Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems.

Configure system auditing

Enable and configure system auditing.

Control access to network services

Manage firewall rules to limit connectivity to network services.

Red Hat Certified Trainer

Red Hat Certified Trainer

Read More

Boniface Liew

Boniface Liew

With an IT career spanning more than 15 years, Boniface Liew, a director of BL Digital, has vast experience and knowledge and had served as a Consultant and Specialist across many IT disciplines. From system, database, applications, networking, virtualization and cloud computing, while serving as a contract Trainer and Consultant for various principles such as Microsoft, Red Hat, VMware, Novell, HP and Cirtix.

He has held many positions in the IT industry, such as MIS Director, MIS Manager, IT Manager and Senior System Engineer both in Malaysia and Australia. From end-user to ISP based companies, Boniface has advantages over his peers, in experience, expertise and exposure. He is an excellent communicator with a pleasant personality and a self-driven attitude for excellence.

Read More

Adrian Ling

Adrian Ling

Since 1996, Adrian has been working with Linux – both in his professional capacity as a System Admin in the companies he had worked for as well as his hobby during his spare time. He has built a secure Linux firewall (based on the Slackware distro) on a 486 machine in 1998 which served as his company's main Internet gateway.Since then, he has taught himself PHP programming & developed a fully functional web-based “Staff Leave Application" for his company's internal use, built and sold commercial grade scripts used by online-marketers as well as designed and implemented highly-available MySQL replication across geographical data-centers with automated fail-over monitoring and triggering.In addition to the Linux (RedHat)/System Administration skills, Adrian is also well-versed in the web-application layer, i.e. the LAMP (Linux, Apache, MySQL, PHP) stack. One of his projects which utilizes both skill-sets is the development of the Afterschool.com Education portal which is a custom built Wordpress theme that runs an optimized LAMP stack on secured CentOS server.A strong advocate for the Open Source movement, Adrian's venture into professional training & education is a natural progression in his passion to share his knowledge and experience with others. Read More

Course Reviews

No Remarks

0

0 Ratings