Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415)

Description

Duration: 4 days

RH415: Red Hat Security: Linux in Physical, Virtual, and Cloud is an advanced course covering enterprise security practices for Red Hat Enterprise Linux in hybrid environments. Students work through hands-on labs using tools such as SELinux, OpenSCAP, Red Hat Insights, Red Hat Satellite, and Ansible Automation Platform to identify and address vulnerabilities. The course emphasizes security as an ongoing, automated discipline rather than a periodic task, with a focus on managing risk across physical, virtual, and cloud systems. The Red Hat Learning Subscription version includes a 365-day subscription, 100 hours of lab time, one certification exam with a free retake, and one virtual instructor-led class.

Target Audience

  • Security administrators responsible for securing Red Hat Enterprise Linux environments
  • System administrators who manage Red Hat Enterprise Linux deployments across physical, virtual, and cloud infrastructure
  • Administrators tasked with maintaining compliance with security policies and proactively reducing risk

Prerequisites

  • Red Hat Certified Engineer (RHCE) certification or equivalent knowledge and hands-on experience with Red Hat Enterprise Linux

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing – (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Code Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Code Academy for an engaging and effective learning experience.

Methods

  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
5/25/20265/28/2026
6/15/20266/18/2026
7/6/20267/9/2026
7/27/20267/30/2026
8/17/20268/20/2026
9/7/20269/10/2026
9/28/202610/1/2026
10/19/202610/22/2026
11/9/202611/12/2026
11/30/202612/3/2026
12/21/202612/24/2026
1/11/20271/14/2027
2/1/20272/4/2027
2/22/20272/25/2027
3/15/20273/18/2027
4/5/20274/8/2027
4/26/20274/29/2027
Learning Objectives
  • Configure and enable SELinux and apply advanced methods to restrict system access
  • Identify and remediate vulnerabilities using Red Hat Insights
  • Assess security compliance using OpenSCAP and SCAP Workbench
  • Protect data on storage devices using LUKS and NBDE encryption
  • Capture and review system activity through the Linux Audit system
  • Control authentication behavior using PAM
  • Automate compliance tasks at scale with Red Hat Ansible and Red Hat Satellite
Course Outline
Module Module 1: Risk and Security Management

Examine the risk management process, define and apply security policies, and review the security technologies and tools available in the Red Hat ecosystem.

Module Module 2: Automation with Red Hat Ansible

Apply Red Hat Ansible to automate secure configurations, deploy remediation steps, and work with provided Ansible Playbooks.

Module Module 3: Storage Device Encryption

Encrypt storage using LUKS, configure automatic decryption at boot with NBDE, and protect data at rest.

Module Module 4: Controlling USB Device Access

Deploy USBGuard to block unauthorized USB devices and configure policies that govern USB access on systems.

Module Module 5: PAM-Based Authentication Management

Set up PAM to control authentication and session behavior, and define password and access policies.

Module Module 6: System Event Auditing

Capture and review security-relevant system events using the Linux Audit system and its associated utilities.

Module Module 7: File Integrity Monitoring

Use AIDE to detect unauthorized changes and monitor file system integrity over time.

Module Module 8: Advanced SELinux Configuration

Enable SELinux, examine and adjust policies, and apply advanced techniques to tighten access controls and improve process confinement.

Module Module 9: Compliance Assessment with OpenSCAP

Run compliance evaluations using OpenSCAP and SCAP Workbench, and remediate identified gaps using Red Hat tools.

Module Module 10: Issue Detection with Red Hat Insights

Use Red Hat Insights to identify system risks before they become problems and apply recommended fixes.

Module Module 11: Large-Scale Compliance with Red Hat Satellite

Use Red Hat Satellite to automate compliance workflows and manage Red Hat Enterprise Linux systems across large deployments.

Module Module 12: Comprehensive Review and Capstone

Demonstrate and consolidate knowledge from all course modules by completing simulated real-world security scenarios.