RH415 Red Hat Security: Linux in Physical, Virtual, and Cloud

Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environments

Difficulty
Rating
4days
Duration
3320,00 
+ VAT
Time:
Location:
The chosen training includes following dates:
When paid with Sovelto Access -credits, you will be charged the corresponding amount of credits to the Euro-price. Please contact sales: 020 7776 670 or myyntipalvelu@sovelto.fi for exact amount of credits in your case.

Register before 09.03.2020
Spoken language: English

We are sorry, but the course is already full, please try with another date or location.

Or contact sales: +358 20 7776 670 or myyntipalvelu@sovelto.fi

Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances.

This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.

Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.

Course summary

  • Manage compliance with OpenSCAP.
  • Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniques.
  • Proactively identify and resolve issues with Red Hat Insights.
  • Monitor activity and changes on a server with Linux Audit and AIDE.
  • Protect data from compromise with USBGuard and storage encryption.
  • Manage authentication controls with PAM.
  • Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues.
  • Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Tower.

See more detailed course outline here.

Target audience

System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization’s security policies.

Prerequisites

Need more flexible learning options?

Choose a training that fits best your learning style and schedule. To hear more about virtual and self-paced training formats, please contact Personal Customer Service info@sovelto.fi or through chat-service.

 

Keywords: , , ,

 

Places left:
No participant limit
many
3320,00  + VAT

Responsible person


Eine Lahtisalo

Eine Lahtisalo

Eine is a Microsoft Office specialist, who has worked as a full-time trainer for over 15 years. She has been involved in planning numerous customized training projects and has operated as a responsible trainer in many Office-migration projects. As an enthusiastic learner herself, she has studied human resource management, business administration and project management alongside working.

Competence: Microsoft Certified Trainer (MCT), MOS Master-level, MCAS for Excel, Outlook, PowerPoint and Word, IPMA Level D – Certified Project Management Associate, ITIL Foundation 2011 Edition, Microsoft Office specialist.