Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances.
Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization’s security policies.
Choose a training that fits best your learning style and schedule. To hear more about virtual and self-paced training formats, please contact Personal Customer Service firstname.lastname@example.org or through chat-service.
Eine is a Microsoft Office specialist, who has worked as a full-time trainer for over 15 years. She has been involved in planning numerous customized training projects and has operated as a responsible trainer in many Office-migration projects. As an enthusiastic learner herself, she has studied human resource management, business administration and project management alongside working.
Competence: Microsoft Certified Trainer (MCT), MOS Master-level, MCAS for Excel, Outlook, PowerPoint and Word, IPMA Level D – Certified Project Management Associate, ITIL Foundation 2011 Edition, Microsoft Office specialist.