Security for Red Hat Linux

4 Day Course
Hands On
Code RHLSS

Book Now - 2 Delivery Methods Available:

Scheduled Virtual Onsite

Overview

This highly practical instructor led Security for Red Hat Linux course is aimed at Linux System Administrators who wish to enhance their knowledge of Red Hat Linux security and increase the security of their Red Hat Linux systems.

The course covers security related tasks for Red Hat Enterprise Linux (RHEL) and CentOS Linux systems. The topics taught would also be relevant for all Linux distributions.

Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.

Objectives

The delegate will learn and acquire skills as follows:

  • Linux security basics, precautions and common attack methods
  • Viewing and configuring the key Linux log files
  • Querying and configuring the Linux Audit Framework
  • Knowledge and execution of key SELinux commands
  • Modifying SELinux policy and policy modules
  • Configuring the Red Hat firewall
  • Securing Linux applications with certificates
  • Securing applications with TCP wrappers
  • Securing SSH
  • Installing and configuring a Host Intrusion Detection System
  • Detecting root kits, viruses and other malware
  • Identifying security updates and signing packages
  • Increasing system security with PAM
  • Installing and configuring a password cracking utility
  • Basic and advanced sudo configuration
  • Securing Linux logins
  • Enhancing filesystem security and encrypting files
  • Configuring enhanced permissions and Access Control Lists
  • Configuring an OpenVPN server and client

Target Audience

The Security for Red Hat Linux course is aimed at Linux System Administrators who wish to expand their knowledge of the many Red Hat Linux security features and increase the security level of their Red Hat Linux systems.

Additional Information

  • Course technical content is subject to change without notice.
  • Course content is structured as sessions, this does not strictly map to course timings. Concepts, content and practicals often span sessions.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Hide all

Linux Security Overview (5 topics)

  • Linux Native Security
  • Areas of Security
  • Common Attack Methods
  • Basic Security Precautions
  • Standards and Compliance

Command Line History (3 topics)

  • History Variables
  • Configuring History
  • Confining User History

Logging Within Linux (4 topics)

  • Linux Log Files
  • The systemd Journal
  • Linux Audit Framework
  • Configuring Auditing

SELinux (6 topics)

  • DAC vs MAC
  • The SELinux Policy
  • Viewing SELinux Decisions
  • SELinux Commands
  • SELinux Domains
  • Modifying SELinux Policy

Advanced SELinux Configuration (3 topics)

  • SELinux Entities
  • SELinux Modules
  • Creating SELinux Modules

Red Hat Firewall (5 topics)

  • Firewall Zones
  • Configuring the Firewall
  • Creating a Firewall Service
  • Configuring Firewall Zones
  • Installing and Configuring Fail2ban

Securing Applications (4 topics)

  • Certificate Based Authentication
  • TCP Wrappers
  • Network Time
  • Authenticating chrony Clients

Securing SSH (5 topics)

  • Key Algorithms
  • SSH Agents
  • SSH Server Options
  • Certificate Based Authentication
  • SSH Tunneling

Intrusion Detection and Prevention (5 topics)

  • Detecting Intrusions With AIDE
  • Configuring AIDE Rules
  • Detecting and Removing Rootkits
  • Viruses
  • Installing and Configuring ClamAV

Securing Packages (6 topics)

  • Red Hat Package Management
  • Package Management History
  • Rolling Back Packages
  • Creating and Signing an rpm Package
  • Installing a Signed rpm
  • Creating a Package Repository

Security via Pluggable Authentication Modules (7 topics)

  • PAM File Format
  • Main PAM Configuration File
  • Using PAM Allow/Deny a Service
  • Restricting SSH
  • Increasing Password Complexity
  • Delaying Failed Logins
  • Controlling Limits and Access

Cracking Linux Passwords (5 topics)

  • Types of Password Attacks
  • Verifying Password Strength
  • Installing and Configuring a Cracking Utility
  • Installing a Word List
  • Resetting a Lost root Password

Sudo and Restrictions Logins (7 topics)

  • Restricting Linux Accounts
  • Automatic Logout
  • sudo
  • Configuring sudo for Remote Systems
  • Advanced sudo Configuration
  • Extended File Attributes
  • Securing Linux History

Securing the Filesystem (8 topics)

  • Filesystem Security Considerations
  • Protecting the Boot Menu
  • Filesystem Options
  • Securely Erasing Data
  • vim Security Considerations
  • Access Control Lists
  • Enhanced Permissions
  • Filesystem Encryption

Virtual Private Networks (3 topics)

  • Overview Virtual Private Networks
  • OpenVPN Installation and Configuration
  • Server and Client Configuration

Prerequisites

Delegates attending this course should have experience of administering Linux in an Enterprise environment to the level covered in the Administering Red Hat Linux 7 - Part 1 course.

Additional Learning

The courses below may help you meet the knowledge level required to take this course. If you are unsure please ask a training advisor .

Scheduled Dates

Please select from the dates below to make an enquiry or booking.

Pricing

Different pricing structures are available including special offers. These include early bird, late availability, multi-place, corporate volume and self-funding rates. Please arrange a discussion with a training advisor to discover your most cost effective option.

Code Location Duration Price Nov Dec Jan Feb Mar Apr
RHLSS 4 Days $2,100

Course PDF

Print

Share this Course

+1
Share

Recommend this Course

Sections