| Select Package | Comprehensive Assured Pacakge, Training with Examination, Training with LMS |
|---|

Red Hat Certified Specialist in Security (EX415)
The Red Hat Certified Specialist in Security: Linux test verifies your proficiency with Red Hat® Enterprise Linux® security.
System administrators, IT security administrators, IT security engineers, and other professionals in charge of developing, implementing, maintaining, and overseeing Red Hat Enterprise Linux systems’ security and making sure they adhere to the company’s security policies are the target audience for this course.
Overview
The knowledge, skills, and abilities required to secure Red Hat Enterprise Linux® systems, enforce adherence to security rules, and deploy and manage applications on that platform have been shown by a Red Hat Certified Specialist in Security: Linux. After passing the Red Hat Certified Specialist in Security: Linux (EX415) exam, one can obtain the certificate.
What you will Learn in this Red Hat Certified Specialist in Security (EX415) course?
- Using Red Hat Ansible Engine
- Implementing access controls for automation controller
- Configuring intrusion detection
- Configuring encrypted storage
- Restricting USB devices
- Managing system login security with PAM
- Configuring System auditing
- Configuring SELinux
- Enforcing security compliance
Who should go for Red Hat Certified Specialist in Security (EX415) course?
- Experienced Linux system administrators
- Security professionals working in Linux environments
- RHCSAs and RHCEs pursuing RHCA certification
- IT security managers responsible for infrastructure security
Our Package
- Install Red Hat Ansible Engine on a control node.
- Configure managed nodes.
- Configure simple inventories.
- Perform basic management of systems.
- Run a provided playbook against specified nodes.
- Install AIDE.
- Configure AIDE to monitor critical system files.
- Encrypt and decrypt block devices using LUKS.
- Configure encrypted storage persistence using NBDE.
- Change encrypted storage passphrases.
- Install USBGuard.
- Write device policy rules with specific criteria to manage devices.
- Manage administrative policy and daemon configuration.
- Configure password quality requirements.
- Configure failed login policy.
- Modify PAM configuration files and parameters.
- Write rules to log auditable events.
- Enable prepackaged rules.
- Produce audit reports.
- Enable SELinux on a host running a simple application.
- Interpret SELinux violations and determine remedial action.
- Restrict user activity with SELinux user mappings.
- Analyze and correct existing SELinux configurations.
- Install OpenSCAP and Workbench.
- Use OpenSCAP and Red Hat Insights to scan hosts for security compliance.
- Use OpenSCAP Workbench to tailor policy.
- Use OpenSCAP Workbench to scan an individual host for security compliance.
- Use Red Hat Satellite server to implement an OpenSCAP policy.
- Apply OpenSCAP remediation scripts to hosts.
Upcoming Batch
April 20th (Weekends)
FRI & SAT (4 Weeks)
08:30 PM to 01:00 AM (CDT)
April 18th (Weekdays)
MON – FRI (18 Days)
10:00 AM to 12:00 PM (CDT)
Enter the Title




Reviews
There are no reviews yet.