Description
Duration: 4 days
RH415: Red Hat Security: Linux in Physical, Virtual, and Cloud is an advanced course covering enterprise security practices for Red Hat Enterprise Linux in hybrid environments. Students work through hands-on labs using tools such as SELinux, OpenSCAP, Red Hat Insights, Red Hat Satellite, and Ansible Automation Platform to identify and address vulnerabilities. The course emphasizes security as an ongoing, automated discipline rather than a periodic task, with a focus on managing risk across physical, virtual, and cloud systems. The Red Hat Learning Subscription version includes a 365-day subscription, 100 hours of lab time, one certification exam with a free retake, and one virtual instructor-led class.
Target Audience
- Security administrators responsible for securing Red Hat Enterprise Linux environments
- System administrators who manage Red Hat Enterprise Linux deployments across physical, virtual, and cloud infrastructure
- Administrators tasked with maintaining compliance with security policies and proactively reducing risk
Prerequisites
- Red Hat Certified Engineer (RHCE) certification or equivalent knowledge and hands-on experience with Red Hat Enterprise Linux
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing – (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Code Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Code Academy for an engaging and effective learning experience.
Methods
- Instructor Led (the best training format we offer)
- Live Online Classroom – Online Instructor Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
| Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
|---|---|---|---|---|---|
| 5/25/2026 | 5/28/2026 | ||||
| 6/15/2026 | 6/18/2026 | ||||
| 7/6/2026 | 7/9/2026 | ||||
| 7/27/2026 | 7/30/2026 | ||||
| 8/17/2026 | 8/20/2026 | ||||
| 9/7/2026 | 9/10/2026 | ||||
| 9/28/2026 | 10/1/2026 | ||||
| 10/19/2026 | 10/22/2026 | ||||
| 11/9/2026 | 11/12/2026 | ||||
| 11/30/2026 | 12/3/2026 | ||||
| 12/21/2026 | 12/24/2026 | ||||
| 1/11/2027 | 1/14/2027 | ||||
| 2/1/2027 | 2/4/2027 | ||||
| 2/22/2027 | 2/25/2027 | ||||
| 3/15/2027 | 3/18/2027 | ||||
| 4/5/2027 | 4/8/2027 | ||||
| 4/26/2027 | 4/29/2027 |
Learning Objectives
- Configure and enable SELinux and apply advanced methods to restrict system access
- Identify and remediate vulnerabilities using Red Hat Insights
- Assess security compliance using OpenSCAP and SCAP Workbench
- Protect data on storage devices using LUKS and NBDE encryption
- Capture and review system activity through the Linux Audit system
- Control authentication behavior using PAM
- Automate compliance tasks at scale with Red Hat Ansible and Red Hat Satellite
Course Outline
Module Module 1: Risk and Security Management
Examine the risk management process, define and apply security policies, and review the security technologies and tools available in the Red Hat ecosystem.
Module Module 2: Automation with Red Hat Ansible
Apply Red Hat Ansible to automate secure configurations, deploy remediation steps, and work with provided Ansible Playbooks.
Module Module 3: Storage Device Encryption
Encrypt storage using LUKS, configure automatic decryption at boot with NBDE, and protect data at rest.
Module Module 4: Controlling USB Device Access
Deploy USBGuard to block unauthorized USB devices and configure policies that govern USB access on systems.
Module Module 5: PAM-Based Authentication Management
Set up PAM to control authentication and session behavior, and define password and access policies.
Module Module 6: System Event Auditing
Capture and review security-relevant system events using the Linux Audit system and its associated utilities.
Module Module 7: File Integrity Monitoring
Use AIDE to detect unauthorized changes and monitor file system integrity over time.
Module Module 8: Advanced SELinux Configuration
Enable SELinux, examine and adjust policies, and apply advanced techniques to tighten access controls and improve process confinement.
Module Module 9: Compliance Assessment with OpenSCAP
Run compliance evaluations using OpenSCAP and SCAP Workbench, and remediate identified gaps using Red Hat tools.
Module Module 10: Issue Detection with Red Hat Insights
Use Red Hat Insights to identify system risks before they become problems and apply recommended fixes.
Module Module 11: Large-Scale Compliance with Red Hat Satellite
Use Red Hat Satellite to automate compliance workflows and manage Red Hat Enterprise Linux systems across large deployments.
Module Module 12: Comprehensive Review and Capstone
Demonstrate and consolidate knowledge from all course modules by completing simulated real-world security scenarios.