Red Hat Security and Server Hardening (RH413)
Detailed Course Outline
Module 1: Track security updates
- Understand how Red Hat Enterprise Linux produces updates and how to use yum to perform queries to identify what errata are available.
Module 2: Manage software updates
- Develop a process for applying updates to systems including verifying properties of the update.
Module 3: Create file systems
- Allocate an advanced file system layout and use file system encryption.
Module 4: Manage file systems
- Adjust file system properties through security related options and file system attributes.
Module 5: Manage special permissions
- Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions and locate files with these permissions enabled.
Module 6: Manage additional file access controls
- Modify default permissions applied to files and directories; work with file access control lists.
Module 7: Monitor for file system changes
- Configure software to monitor the files on your machine for changes.
Module 8: Manage user accounts
- Set password-aging properties for users; audit user accounts.
Module 9: Manage pluggable authentication modules (PAMs)
- Apply changes to PAMs to enforce different types of rules on users.
Module 10: Secure console access
- Adjust properties for various console services to enable or disable settings based on security.
Module 11: Install central authentication
- Install and configure a Red Hat Identity Management server and client.
Module 12: Manage central authentication
- Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted to users on those systems.
Module 13: Configure system logging
- Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems.
Module 14: Configure system auditing
- Enable and configure system auditing.
Module 15: Control access to network services
- Manage firewall rules to limit connectivity to network services.