> > > RH414 Detailed outline

Red Hat Security and Server Hardening + EX413 (RH414)

Course Description Schedule Course Outline

Detailed Course Outline

Module 1: Track security updates

  • Understand how Red Hat Enterprise Linux produces updates and how to use yum to perform queries to identify what errata are available.

Module 2: Manage software updates

  • Develop a process for applying updates to systems including verifying properties of the update.

Module 3: Create file systems

  • Allocate an advanced file system layout and use file system encryption.

Module 4: Manage file systems

  • Adjust file system properties through security related options and file system attributes.

Module 5: Manage special permissions

  • Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions and locate files with these permissions enabled.

Module 6: Manage additional file access controls

  • Modify default permissions applied to files and directories; work with file access control lists.

Module 7: Monitor for file system changes

  • Configure software to monitor the files on your machine for changes.

Module 8: Manage user accounts

  • Set password-aging properties for users; audit user accounts.

Module 9: Manage pluggable authentication modules (PAMs)

  • Apply changes to PAMs to enforce different types of rules on users.

Module 10: Secure console access

  • Adjust properties for various console services to enable or disable settings based on security.

Module 11: Install central authentication

  • Install and configure a Red Hat Identity Management server and client.

Module 12: Manage central authentication

  • Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted to users on those systems.

Module 13: Configure system logging

  • Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems.

Module 14: Configure system auditing

  • Enable and configure system auditing.

Module 15: Control access to network services

  • Manage firewall rules to limit connectivity to network services.