Red Hat System Security Course Overview
This highly practical instructor led Red Hat System Security course is aimed at Linux System Administrators who wish to enhance their knowledge of Red Hat Linux security and increase the security of their Red Hat Linux systems.
The course covers detecting and restricting users and applications for Red Hat Enterprise Linux (RHEL) and RHEL-based Linux systems. Security compliance, logging and auditing are also covered along with hardening related tasks. The topics taught are relevant for all Linux distributions. The command line is demonstrated and used extensively throughout the course.
Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
Download Overview