Class Details

Price: $3,500

Training Options - RH413, RH413VT, RH414

The training options include:

  • Red Hat Server Hardening (RH413)
  • Red Hat Server Hardening - Virtual (RH413VT)

OR

You can call and enroll in the RH414 course which includes the exam voucher:
  • Red Hat Server Hardening with Expertise Exam (RH414)
    • This is a five day course priced at $3,895

For group training options contact us at (240) 667-7757 or email promo@phoenixts.com. 

Course Outline

Tracking Security Updates

  • Understanding the process in which Red Hat Enterprise Linux creates updates and uses yum for queries and identifying errata availability

Managing Software Updates

  • Developing processes for updating systems entailing verifying properties of updates

Creating File Systems

  • Advanced file system layout and file system encryption

Managing File Systems

  • Changing file system properties with security options and attributes

Managing Special Permissions

  • Using set user ID (SUID), group IP (SGID), and sticky (SVTX) permissions
  • Locating files with permissions enabled

Managing File Access Controls

  • Customizing default permissions for files and directories
  • Working with file access control lists

Monitoring File System Changes

  • Configuring software for monitoring file changes on systems

Managing User Accounts

  • Establishing password-aging properties for users
  • Auditing user accounts

Managing Pluggable Authentication Modules (PAMs)

  • Making changes to PAMs for user rules

Securing Console Access

  • Changing properties for console services for enabling or disabling settings for system security

Installing Central Authentication

  • Installing and configuring Red Hat Identity Management Server and Client

Configuring System Logging

  • Configuring remote logging for transport layer encryption 
  • Managing extra logs created by remote systems

Configuring System Auditing

  • Enabling and Configuring System Auditing

Controlling Access for Network Services

  • Managing firewall rules for limiting connectivity for network services

Objectives

  • Revewing Errata and Applying it to Red Hat Enterprise Linux
  • Utilizing Special Permissions and File System Access Control Lists
  • Managing Users and Password-Aging Policy Requirements
  • Installing and Configuring Red Hat Identity Management Tools
  • Comprehending System Auditing

 

Class Exam

Red Hat Certificate of Expertise in Server Hardening exam (EX413)

This exam measures a person's skills and knowledge in being capable of applying standards-based security for securing Red Hat Enterprise Linux (RHEL) systems.

Details

  • Length - 4 hours
  • Format - This is a performance-based exam that tests a person's skills and ability to execute successfully tasks covered in the Red Hat Server Hardening (RH413) course.

Objectives

Students looking to take the exam should be capapble of:

  • Identifying Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and Updating Systems
  • Verifying package security and validity
  • Identifying and using standards-based practices to configure file system security by creating and employing encrypted file systems, tuning filesystem features, and exploring mount point options for access restrictions 
  • Configuring default permissions for users and applying special file permissions, attributes and access control lists (ACLs) for file access control
  • Installing and employing intrusion detection in RHEL for monitoring system files
  • Managing user account security and passwords
  • Managing system login security with pluggable authentication modules (PAMs)
  • Configuring console security when you disable features that enable systems for reboot or shutdown with bootloader passwords
  • Configuring system-wide notifications
  • Installing, configuring and managing identity management servces and configuring identity managment clients
  • Configuring remote system logging services, system logging, and managing log files with log rotation and compression
  • Configuring system auditing services and reviewing reports
  • Utilizing network scanning tools for identifying open network service ports, configuring, and troubleshooting system firewalls