Red Hat Server Hardening Training from ICC Teleservices
Duration 25(Hrs)
Buy Now
COURSE OUTLINE
1 - TRACK SECURITY UPDATES
- Understand how Red Hat Enterprise Linux produces updates and how to use yum to perform queries to identify what errata are available.
2 - MANAGE SOFTWARE UPDATES
- Develop a process for applying updates to systems including verifying properties of the update.
3 - CREATE FILE SYSTEMS
- Allocate an advanced file system layout and use file system encryption.
4 - MANAGE FILE SYSTEMS
- Adjust file system properties through security related options and file system attributes.
5 - MANAGE SPECIAL PERMISSIONS
- Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions and locate files with these permissions enabled.
6 - MANAGE ADDITIONAL FILE ACCESS CONTROLS
- Modify default permissions applied to files and directories; work with file access control lists.
7 - MONITOR FOR FILE SYSTEM CHANGES
- Configure software to monitor the files on your machine for changes.
8 - MANAGE USER ACCOUNTS
- Set password-aging properties for users; audit user accounts.
9 - MANAGE PLUGGABLE AUTHENTICATION MODULES (PAMS)
- Apply changes to PAMs to enforce different types of rules on users.
10 - SECURE CONSOLE ACCESS
- Adjust properties for various console services to enable or disable settings based on security.
11 - INSTALL CENTRAL AUTHENTICATION
- Install and configure a Red Hat Identity Management server and client.
12 - MANAGE CENTRAL AUTHENTICATION
- Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted to users on those systems.
13 - CONFIGURE SYSTEM LOGGING
- Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems.
14 - CONFIGURE SYSTEM AUDITING
- Enable and configure system auditing.
15 - CONTROL ACCESS TO NETWORK SERVICES
- Manage firewall rules to limit connectivity to network services.