HOME
 

Red Hat System Security

StayAhead Training
Course summary
4 days
2,100 GBP excl. VAT
Professional Training
Next available date: 09/11/2021 09:30 - Online courses
Course Dates
Online courses
2,100 GBP
09/11/2021

Online courses
2,100 GBP
04/01/2022

London
2,100 GBP
09/11/2021

London
2,100 GBP
04/01/2022

Course description

This highly practical instructor led Red Hat System Security course is aimed at Linux System Administrators who wish to enhance their knowledge of Red Hat Linux security and increase the security of their Red Hat Linux systems.

The course covers detecting and restricting users and applications for Red Hat Enterprise Linux (RHEL) and RHEL-based Linux systems. Security compliance, logging and auditing are also covered along with hardening related tasks. The topics taught are relevant for all Linux distributions. The command line is demonstrated and used extensively throughout the course.

Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.

Skills Gained

The delegate will learn and acquire skills as follows:

  • Linux security precautions and common attack methods
  • Security standards, compliance and implementation guides
  • Securing Linux users and restricting accounts
  • Detecting successful and unsuccessful logins
  • Viewing and configuring the key Linux log files and journal
  • Querying and configuring the Linux Audit Framework
  • Knowledge and execution of key SELinux commands
  • Modifying SELinux policy and creating policy modules
  • Configuring the Red Hat firewall for ports and services
  • Configuring firewall zones and Rich Rules
  • Installing and configuring Fail2ban
  • Configuring SSH and restricting authentication methods
  • Securing Linux applications with certificates
  • Securing applications with TCP wrappers
  • Configuring and securing a network time server
  • Installing and configuring a Host Intrusion Detection System (HIDS)
  • Detecting root kits, viruses and other malware
  • Identifying Common Vulnerabilities and Exposures (CVE's) and security updates
  • Creating and signing RPM packages
  • Increasing password complexity and security hardening with PAM
  • Installing and configuring a password cracking utility
  • Basic and advanced Sudo configuration
  • Sudo logging and replay
  • Enhancing filesystem security and encrypting files
  • Data sanitisation methods
  • Configuring extended permissions and Access Control Lists
Who will the Course Benefit?

This Red Hat System Security course is aimed at Linux System Administrators who wish to expand their knowledge of the many Red Hat Linux security features and increase the security level of their Red Hat Linux systems.

Administrators who wish to increase the logging and auditing functionality of Red Hat Linux systems will also find the techniques and subjects covered in this course useful.

Course Objectives

This course aims to provide the delegate with the knowledge to be able to query their Red Hat Linux system for most security related events and harden many aspects of their system.

The course explains and demonstrates subjects such as the; Linux logging and auditing framework, SELinux, the firewall, certificate authorities, network time, Secure Shell, Pluggable Authentication Modules, Host Intrusion and Detection Systems (HIDS), detecting and removing malware, password cracking, administering Sudo and encrypting files.

Requirements

Delegates attending this course should have experience of administering Linux in an Enterprise environment to the level covered in the pre-requisite courses.

The requirements for this course can be met by one of the pre-requisite courses listed.

Where Red Hat 8 courses are listed in the Pre-Requisite Courses section equivalent Red Hat 7 courses would also suffice.

Pre-Requisite Courses
  • Red Hat 8 System Administration - Part 1
Follow-On Courses
  • Red Hat 8 System Administration - Part 2
  • Red Hat Networking
  • Linux Shell Programming
  • Linux Advanced Shell Programming Tools
  • Apache Web Server
Notes:
  • Course technical content is subject to change without notice.
  • Course content is structured as sessions, this does not strictly map to course timings. Concepts, content and practicals often span sessions.
Red Hat System Security Training Course

Course Contents - DAY 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: INTRODUCTION TO LINUX SECURITY

  • Linux Native Security
  • Areas of Security
  • Common Attack Methods
  • Basic Security Precautions
  • Standards and Compliance
  • Security Technical Implementation Guides (STIGs)
  • Exercise

Session 2: SECURING THE USER ENVIRONMENT

  • Managing User Accounts and Security Options
  • Configuring Account Defaults
  • Default File and Directory Permissions
  • Configuring History Variables
  • Querying and Confining Command Line History
  • Exercise

Session 3: LINUX LOGGING AND AUDITING

  • Security Related Log Files
  • Querying Login Activity
  • Viewing and Configuring the Journal
  • Viewing and Understanding Audit Records
  • Generating Audit Queries
  • Defining Auditing Rules
  • Audit Performance
  • Exercise

Session 4: SELINUX

  • DAC vs MAC
  • SELinux Policy
  • SELinux Contexts
  • SELinux Key Commands
  • Viewing SELinux Decisions
  • SELinux Booleans
  • Permissive and Unconfined Domains
  • Exporting SELinux Configuration
  • Exercise
Red Hat System Security Training Course

Course Contents - DAY 2

Session 5: SELINUX MODULES

  • SELinux Entities
  • Listing and Administering SELinux Modules
  • Creating Modules With audit2allow
  • Writing and Editing SELinux Modules
  • Type Enforcement and File Context Files
  • Exercise

Session 6: RED HAT FIREWALL

  • Firewalld Overview
  • Firewalld vs IPTables
  • Configuring Firewall ports
  • Creating a Firewall Service
  • Creating and Configuring Firewall Zones
  • Viewing and Creating Rich Rules
  • Fail2ban Installation and Configuration
  • Exercise

Session 7: SECURING SSH

  • SSH Key Algorithms
  • SSH Agents and Server Options
  • Restricting Authentication Methods
  • Viewing and Encrypting the known_hosts File
  • Certificate Based Authentication
  • Verifying Signed Certificates
  • Exercise

Session 8: SECURING APPLICATIONS

  • TCP Wrapper Access Checking
  • TCP Wrapper Extended Syntax
  • Configuring an NTP Server
  • Securing chrony and Authenticating Clients
  • Exercise
Red Hat System Security Training Course

Course Contents - DAY 3

Session 9: INTRUSION DETECTION AND PREVENTION

  • Detecting Host Intrusions
  • Limitations of AIDE
  • Installing and Configuring AIDE
  • Detecting Filesystem Changes
  • Detecting and Removing Rootkits
  • Rootkit Best Practices
  • Installing and Configuring ClamAV
  • Exercise

Session 10: SECURING PACKAGES

  • Common Vulnerabilities and Exposures (CVE's)
  • Red Hat Package Management
  • Obtaining Detailed Update Information
  • Post Update Considerations and Rolling Back Packages
  • Details on Security Packages
  • Package Management History
  • Creating and Signing an RMP Package
  • Creating a Package Repository
  • Exercise

Session 11: PLUGGABLE AUTHENTICATION MODULES

  • PAM File Format
  • Restricting Services with PAM
  • Restricting Access to SSH
  • Increasing Password Complexity
  • Delaying Failed Logins
  • Controlling Access by Time
  • Limiting user Resources
  • Exercise

Session 12: LINUX PASSWORDS

  • Password Hashing Methods
  • Verifying Password Strength
  • Password Attacks Types
  • Password Cracking
  • Installing a Password Cracking Utility
  • Installing a Word List
  • Exercise
Red Hat System Security Training Course

Course Contents - DAY 4

Session 13: SUDO AND RESTRICTING LOGINS

  • Basic Examples and Command Line Options
  • Sudo Aliases, Tags and Groups
  • Sudo Password Administration
  • Running Sudo On Remote Systems
  • Sudoedit
  • Sudo Logging and Replay
  • Include Statements
  • Restricting root Access
  • Configuring Timeouts
  • Exercise

Session 14: SECURING THE LINUX FILESYSTEM

  • Partitioning Considerations
  • Protecting the Boot Menu
  • Securely Erasing Data
  • Data Sanitisation Methods
  • Extended Permissions and File Attributes
  • Creating and Modifying File Access Control Lists (ACLs)
  • LUKS Encrypted Partitions
  • Exercise

APPENDIX A: RED HAT IDENTITY MANAGEMENT

  • IRed Hat Identity Management
  • Identity Management Domain
  • IDM Server and Client Installation and Configuration

APPENDIX B: CERTIFICATE BASED AUTHENTICATION

  • Creating a Certificate Authority
  • Configuring Logging with TLS
  • Securing VSFTPD for SSL/TLS

APPENDIX C: AUDIT RECORDS

APPENDIX D: RESETTING A LOST ROOT PASSWORD

Expenses

£2,100.00

Continuing Studies

Follow on courses: Red Hat 8 System Administration - Part 2, Red Hat Networking, Linux Shell Programming, Linux Advanced Shell Programming Tools, Apache Web Server

Customer Outreach Award

customer-outreach-badge-2019

We believe that it should be easy for you to find and compare training courses. 

Our Customer Outreach Award is presented to trusted providers who are excellent at responding to enquiries, making your search quicker, more efficient and easier, too.

About provider

Live Virtual Training with our live Course Instructor is offered for all our courses.  Take the course from the comfort of your office, home or any location of your choice, nationally and internationally.  Public schedule and Closed Company courses.  Flexibility...


Read more and show all courses with this provider

Request info

Fill out your details to find out more about Red Hat System Security.

  Contact the provider

  Get more information

  Register your interest

Country *

Contact info

StayAhead Training

6 Long Lane, Barbican
EC1A 9HF London

 Show phone number
www.stayahead.com


Request information

Find out more about this Red Hat System Security course - simply fill out your details:

Find a course for you!

  Read the course
 summary on this page

 Fill in your details and Request information

 Receive all the info you need

Find more courses here