Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Red Hat Server Hardening (RH413)

Vendor# RH413

GK# 6904

Course Overview

Build on your Red Hat Certified Engineer (RHCE®) certification or equivalent experience by learning how to secure a Red Hat Enterprise Linux® system to comply with security policy requirements. Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns.

Delivery Format Options

  • Classroom Live

    Classroom Live

    Receive face-to-face instruction at one of our training center locations.

    From

    $4730 CAD

    4 day

  • Virtual Classroom Live

    Virtual Classroom Live

    Experience expert-led online training from the convenience of your home, office or anywhere with an Internet connection.

    From

    $4730 CAD

    5 day

  • Self-Paced

    Self-Paced

    Recordings, hands-on labs and expert instructors empower you to train on your own schedule.

    From

    $4025 CAD

    90 day

  • Private Group Training

    Private Group Training

    Train your entire team in a private, coordinated professional development session at the location of your choice.

    Receive private training for teams online and in-person.

Request a date or location for this course.

What You'll Learn

  • Review errata and apply them to Red Hat Enterprise Linux
  • Use special permissions and file system access control lists
  • Manage users and password-aging policy requirements
  • Install and configure Red Hat Identity Management tools
  • System auditing

Follow-On Courses

Who Needs To Attend

  • Those who need technical guidance on how to enhance the security of Red Hat Enterprise Linux systems
  • Anyone who is responsible for implementing security policy requirements on Red Hat Enterprise Linux systems consistently and in a reproducible, scalable way
  • Those who must be able to demonstrate that systems meet security policy requirements
  • Anyone how maintains continued adherence to security requirements, including management of security-critical operating system/software updates

Course Outline

Download Course Outline