Duration: 1 Day
A Red Hat Certified Engineer (RHCE®) who has earned the Red Hat Certificate of Expertise in Server Hardening has demonstrated the knowledge, skills, and abilities needed to understand and apply standards-based best practices to secure Red Hat Enterprise Linux® systems against unauthorized access.
This version of the exam is an Individual Exam Session (IES). IESs are available through remotely proctored personal testing stations at select training locations, providing a convenient, secure option for taking the same Red Hat exam available in a classroom setting, with the same hands-on experience required. The testing stations are simple to use, so you'll be able to relax and concentrate on your exam.
Certification: Red Hat Certificate of Expertise in Server Hardening
What You Will Learn
Audience
- System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems
- System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations
- RHCEs who wish to earn Red Hat Certified Security Specialist (RHCSS®) or Red Hat Certified Architect (RHCA®) certification
Prerequistes
RHCE certification, Red Hat Certified Systems Administrator (RHCSA®) certification, or equivalent experience required
Course Outline
The exam tests your knowledge of and ability to perform the following tasks:
- Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs), and selectively update systems based on this information.
- Verify package security and validity.
- Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes.
- Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files.
- Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files.
- Manage user account security and user password security.
- Manage system login security using pluggable authentication modules (PAM).
- Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords.
- Configure system-wide acceptable use notifications.
- Install, configure, and manage identity management services and configure identity management clients.
- Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression.
- Configure system auditing services and review audit reports.
- Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling.
Course Labs