Red Hat Security Specialist Training by GRRAS Solution Training Institute in Jaipur,Tonk Road
Red Hat Security Specialist Training free videos and free material uploaded by GRRAS Solution Training Institute in Jaipur,Tonk Road .
Fundamental Concepts of Security Managements
Security Management Process
Red Hat’s Development Process and Security Response Practice
Install Red Hat Ansible Engine on a control node.
Configure managed nodes.
Configure simple inventories.
Perform basic management of systems.
Run a provided playbook against specified nodes.
Install AIDE.
Configure AIDE to monitor critical system files.
Encrypt and decrypt block devices using LUKS.
Configure encrypted storage persistence using NBDE.
Change encrypted storage passphrases.
Install USB Guard.
Write device policy rules with specific criteria to manage devices.
Manage administrative policy and daemon configuration.
Configure password quality requirements.
Configure failed login policy.
Modify PAM configuration files and parameters.
Write rules to log auditable events.
Enable prepackaged rules.
Produce audit reports.
Enable SELinux on a host running a simple application.
Interpret SELinux violations and determine remedial action.
Restrict user activity with SELinux user mappings.
Analyze and correct existing SELinux configurations.
Install OpenSCAP and Workbench.
Use OpenSCAP and Red Hat Insights to scan hosts for security compliance.
Use OpenSCAP Workbench to tailor policy.
Use OpenSCAP Workbench to scan an individual host for security compliance.
Use Red Hat Satellite server to implement an OpenSCAP policy.
Apply OpenSCAP remediation scripts to hosts
RHEL 6 or Server Hardening course by Red Hat is aimed at teaching administrators the art of setting up and configuring systems to comply with multiple security recommended practices as well as security policies and audit requirements. There are plethoras of benefits of getting certified in RHEL 6, especially if you want to build for yourself a career in the IT sector. After having completed this course, you will be able to manage software updates, work with file system options and features, assign Special Permissions and Access Control Lists, monitor files for changes, manage user accounts, configure PAM (Pluggable authentication module), among others.
Write a public review