RH415 – Red Hat Security: Linux in Physical, Virtual and Cloud

Red Hat Security: Linux in Physical, Virtual and Cloud

Course Description

Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) helps you master the art of securing Red Hat Enterprise Linux wherever it lives – whether that’s on physical servers, virtual machines, or up in the cloud. You’ll dive into practical tools and smart strategies for staying compliant, managing risks, and fixing security issues automatically.

Throughout the course, you’ll get hands-on with powerful tools like SELinux, OpenSCAP, SCAP Workbench, Linux Audit, AIDE, USBGuard, PAM, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Automation Platform. These aren’t just buzzwords – they’re your toolkit for monitoring, securing, and managing systems at massive scale.

We’ve built this course on RHEL 9.2, Ansible Core 2.14, Red Hat Ansible Automation Platform 2.4, Satellite 6.14, and OpenSCAP 1.3.7. Plus.

Course Summary
  1. Master compliance checking with OpenSCAP
  2. Set up and fine-tune SELinux policies
  3. Spot and fix risks before they bite with Red Hat Insights
  4. Track system activity using Linux Audit and AIDE
  5. Lock down your data with USBGuard and storage encryption
  6. Take charge of authentication through PAM
  7. Build automated fixes with Ansible Playbooks
  8. Supercharge your security management using Satellite and Ansible Automation Platform
Target Audience
  1. System Administrators – You’re the ones keeping servers and infrastructure running smoothly
  2. IT Security Practitioners / Auditors – You make sure everything’s locked down and compliant
  3. Automation Architects – You’re building smarter, automated security for cloud and infrastructure
Outline for this course

Managing Security and Risk
Define and implement strategies to manage security on Red Hat Enterprise Linux systems.

Automating Configuration and Remediation with Ansible
Remediate configuration and security issues automatically with Ansible Playbooks.

Protecting Data with LUKS and NBDE
Encrypt data on storage devices with LUKS, and use NBDE to manage automatic decryption when servers are booted.

Restricting USB Device Access
Protect systems from rogue USB device access with USBGuard.

Controlling Authentication with PAM
Manage authentication, authorization, session settings, and password controls by configuring Pluggable Authentication Modules (PAM).

Recording System Events with Audit
Record and inspect system events relevant to security by using the Linux kernel’s Audit system and supporting tools.

Monitoring File System Changes
Detect and analyze changes to a server’s file systems and their contents by using AIDE.

Mitigating Risk with SELinux
Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analysis.

Managing Compliance with OpenSCAP
Evaluate and remediate a server’s compliance with security policies by using OpenSCAP.

Analyzing and Remediating Issues with Red Hat Insights
Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights.

Automating Compliance with Red Hat Satellite
Automate and scale OpenSCAP compliance checks by using Red Hat Satellite.

Comprehensive Review
Review tasks from Red Hat Security: Linux in Physical, Virtual, and Cloud.

Impact on the Organization

Here’s the deal: this course gives your teams the know-how to slash security risks and handle compliance like pros even as you grow. You’ll learn how to keep your systems properly configured, run regular audits, and fix issues the right way every time. What’s in it for you? Way less chance of expensive breaches, rock-solid compliance, and the kind of trust that makes customers, auditors, and stakeholders smile.

Impact on the Individual

Ready to level up? You’ll walk away knowing how to:

  1. Handle security risks and compliance using RHEL’s built-in tools.
  2. Dig into your systems and fix problems with OpenSCAP, SCAP Workbench, and baseline policies.
  3. Keep tabs on what’s happening with the Audit subsystem.
  4. Master those tricky SELinux techniques.
  5. Check file integrity using AIDE.
  6. Stop unwanted devices in their tracks with USBGuard.
  7. Lock down your storage with NBDE.
  8. Spot and squash risks using Red Hat Insights.
  9. Make compliance a breeze across your whole organization with Satellite and Ansible Automation Platform.

Book For Free Demo Session

Get a free demo session and explore how our solutions can help you! Experience our expertise firsthand and see how we can add value to your business.

Red Hat Learning Subscription

Comprehensive training and learning pathways on Red Hat products, industry-recognized certifications, and a flexible and dynamic IT learning experience.

Request More Information

Blank Form (#3)