Red Hat Server Hardening course takes the RHCE certification or equivalent experience forward to teach professionals how they can secure an enterprise Red Hat Linux system so that it complies with security policy requirements. This training program covers many aspects of security standards and policies which system administrators need to address. These include user authentication concerns, system logging and auditing, file system integrity, and updates among other things.
Duration: 30 Hrs
Outcome: It shows to your future employers that you’ve quite a grip in Server Hardening and Security. System Hardening takes security and diligence to another level.
That means it:
- Able to applying more restrictive Security/User Security.
- Restrict access to each computer and device.
- Disable the guest account and features.
- Limit idle time and sleep settings.
- Establish data encryption for all incoming and outgoing communications.
- Remove unnecessary software on the server.
- Perform regular security audits and patches.
- Remove undesirable binaries.
- Establish a comprehensive backup and recovery system.
- Install anti-virus software and updates, and firewalls.
- Remove unnecessary file shares.
- Rename system administrator to something not easily detected by a criminal.
- Restrict permissions to files, services, registry entries and end-points.
- Seek help from an IT professional.
Audience: Those who are looking for the future in the field of System Security.
Prerequisite: Should be certified with RHCSA,RHCE.
Contents:
RH413(Server Hardening)
- Tracking security updates- CVE and Redhat Errata
- Managing software updates
- Creating file systems
- Implementing Filesystem Encryption
- Managing Special Permissions
- Managing additional File Access Cotrols
- Monitoring for file system changes
- Managing user accounts
- Managing Pluggable Authentication Modues (PAM)
- Securing GRUB Bootloader
- Controlling Identity Management-IDM
- Securing Console Access
- Installing central Authentication
- Managing central Authentication
- Configuring rsyslog log file management
- Configuring Access to Network Service
- Configuring System Auditing
- iptables Basics
Copyright ©2018 ITE . All right reserved . Developed by Hackerkernel