SlideShare a Scribd company logo
www.itstraining.in
RH413: Red Hat Server Hardening
Duration: 04 Days
Prerequisite Courses
• Red Hat Certified Engineer (RHCE) certification, Red Hat Certified Systems Administrator
(RHCSA) certification, or equivalent experience required
• For candidates who have not earned their RHCSA or RHCE certifications, confirmation of
the required knowledge can be obtained by passing the online skills assessment
Intended Audience
• Needs technical guidance on how to enhance the security of Red Hat Enterprise Linux
systems
• Responsible for implementing security policy requirements on Red Hat Enterprise Linux
systems consistently and in a reproducible, scalable way
• Must be able to demonstrate that systems meet security policy requirements
• Maintains continued adherence to security requirements, including management of
security-critical operating system/software updates
• RHCE-level skills highly recommended
Overview
Many security policies and standards require systems administrators to address specific user
authentication concerns, application of updates, system auditing and logging, file system
integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy
and configuration concerns. This course can also help you prepare for the Red Hat Certificate of
Expertise in Server Hardening exam (EX413).
Objectives
• Review errata and apply them to Red Hat Enterprise Linux
• Use special permissions and file system access control lists
• Manage users and password-aging policy requirements
• Install and configure Red Hat Identity Management tools
• Understand system auditing
Course Outline
1. Track security updates
• Understand how Red Hat Enterprise Linux produces updates and how to use
yum to perform queries to identify what errata are available.
2. Manage software updates
• Develop a process for applying updates to systems including verifying properties
of the update.
www.itstraining.in
3. Create file systems
• Allocate an advanced file system layout and use file system encryption.
4. Manage file systems
• Adjust file system properties through security related options and file system
attributes.
5. Manage special permissions
• Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions
and locate files with these permissions enabled.
6. Manage additional file access controls
• Modify default permissions applied to files and directories; work with file access
control lists.
7. Monitor for file system changes
• Configure software to monitor the files on your machine for changes.
8. Manage user accounts
• Set password-aging properties for users; audit user accounts.
9. Manage pluggable authentication modules (PAMs)
• Apply changes to PAMs to enforce different types of rules on users.
10. Secure console access
• Adjust properties for various console services to enable or disable settings based
on security.
11. Install central authentication
• Install and configure a Red Hat Identity Management server and client.
12. Manage central authentication
• Configure Red Hat Identity Management rules to control both user access to
client systems and additional privileges granted to users on those systems.
13. Configure system logging
• Configure remote logging to use transport layer encryption and manage
additional logs generated by remote systems.
14. Configure system auditing
• Enable and configure system auditing.
15. Control access to network services
• Manage firewall rules to limit connectivity to network services.

More Related Content

Similar to Rh413

Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
gameaxt
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers
bestip
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-Linux
Giuseppe Paterno'
 
Ex200 objectives
Ex200   objectivesEx200   objectives
Ex200 objectives
jorg_marq
 
CV-Kumar_TAM
CV-Kumar_TAMCV-Kumar_TAM
CV-Kumar_TAM
Kumar R
 

Similar to Rh413 (20)

MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
 
Rh299
Rh299Rh299
Rh299
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data AccessGeek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data Access
 
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov1712.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
 
Cache Security- The Basics
Cache Security- The BasicsCache Security- The Basics
Cache Security- The Basics
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers
 
Centrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxCentrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptx
 
Anujit CV
Anujit CV Anujit CV
Anujit CV
 
Anujit CV
Anujit CV Anujit CV
Anujit CV
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-Linux
 
Give a Boost to Your Exam Preparation with Red Hat RHCSA (EX200) Certification
Give a Boost to Your Exam Preparation with Red Hat RHCSA (EX200) CertificationGive a Boost to Your Exam Preparation with Red Hat RHCSA (EX200) Certification
Give a Boost to Your Exam Preparation with Red Hat RHCSA (EX200) Certification
 
sanjay R
sanjay Rsanjay R
sanjay R
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Ex200 objectives
Ex200   objectivesEx200   objectives
Ex200 objectives
 
KUMAR_RESUME_1_
KUMAR_RESUME_1_KUMAR_RESUME_1_
KUMAR_RESUME_1_
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
CV-Kumar_TAM
CV-Kumar_TAMCV-Kumar_TAM
CV-Kumar_TAM
 

Recently uploaded

plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
YibeltalNibretu
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 

Rh413

  • 1. www.itstraining.in RH413: Red Hat Server Hardening Duration: 04 Days Prerequisite Courses • Red Hat Certified Engineer (RHCE) certification, Red Hat Certified Systems Administrator (RHCSA) certification, or equivalent experience required • For candidates who have not earned their RHCSA or RHCE certifications, confirmation of the required knowledge can be obtained by passing the online skills assessment Intended Audience • Needs technical guidance on how to enhance the security of Red Hat Enterprise Linux systems • Responsible for implementing security policy requirements on Red Hat Enterprise Linux systems consistently and in a reproducible, scalable way • Must be able to demonstrate that systems meet security policy requirements • Maintains continued adherence to security requirements, including management of security-critical operating system/software updates • RHCE-level skills highly recommended Overview Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns. This course can also help you prepare for the Red Hat Certificate of Expertise in Server Hardening exam (EX413). Objectives • Review errata and apply them to Red Hat Enterprise Linux • Use special permissions and file system access control lists • Manage users and password-aging policy requirements • Install and configure Red Hat Identity Management tools • Understand system auditing Course Outline 1. Track security updates • Understand how Red Hat Enterprise Linux produces updates and how to use yum to perform queries to identify what errata are available. 2. Manage software updates • Develop a process for applying updates to systems including verifying properties of the update.
  • 2. www.itstraining.in 3. Create file systems • Allocate an advanced file system layout and use file system encryption. 4. Manage file systems • Adjust file system properties through security related options and file system attributes. 5. Manage special permissions • Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions and locate files with these permissions enabled. 6. Manage additional file access controls • Modify default permissions applied to files and directories; work with file access control lists. 7. Monitor for file system changes • Configure software to monitor the files on your machine for changes. 8. Manage user accounts • Set password-aging properties for users; audit user accounts. 9. Manage pluggable authentication modules (PAMs) • Apply changes to PAMs to enforce different types of rules on users. 10. Secure console access • Adjust properties for various console services to enable or disable settings based on security. 11. Install central authentication • Install and configure a Red Hat Identity Management server and client. 12. Manage central authentication • Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted to users on those systems. 13. Configure system logging • Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems. 14. Configure system auditing • Enable and configure system auditing. 15. Control access to network services • Manage firewall rules to limit connectivity to network services.