We may earn an affiliate commission when you visit our partners.
Pluralsight logo

RHEL 8

Managing Security

Andrew Mallett

Security in Linux has never been so important. This course will teach you the skills needed to implement Mandatory Access Control Lists (SELinux) and key-based authentication.

Read more

Security in Linux has never been so important. This course will teach you the skills needed to implement Mandatory Access Control Lists (SELinux) and key-based authentication.

Keeping your data secure and your systems protected in now a legal requirement in most nations. In this course, RHEL 8: Managing Security, you’ll learn to develop a mindset to keep your systems secure. First, you’ll explore implementing key-based authentication to disable password access via SSH. Next, you’ll discover the reasons why SELinux is required and should never be disabled. Finally, you’ll learn how to implement SELinux policies to secure your system making adjustments for custom locations. When you’re finished with this course, you’ll have the skills and knowledge of securing Red Hat Enterprise Linux 8 needed to deploy systems in a public facing environment.

Enroll now

What's inside

Syllabus

Course Overview
Implementing SSH Key-based Authentication
Implementing POSIX Access Control Lists
Understanding SELinux Modes
Read more
Understanding File and Process Contexts
Implementing Custom Service Configurations

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops essential system security skills needed in RHEL 8 environments
Taught by industry professionals who are experienced in security technologies
Builds a strong foundation in SELinux and key-based authentication for Linux system security
Relevant for IT professionals responsible for securing Linux systems, especially in public-facing environments
May require prior knowledge or experience in Linux system administration
Does not cover advanced security concepts or tools

Save this course

Save RHEL 8: Managing Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for RHEL 8: Managing Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete RHEL 8: Managing Security will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
Network Security Engineers design, implement and maintain network security systems, such as firewalls and intrusion detection systems. Knowledge of SELinux is nearly universal in this role, as it is recognized as an essential tool for preventing and responding to network security threats.
Security Architect
Security Architects design and implement security systems for organizations. They must be familiar with a wide range of security tools and technologies, including SELinux. This course will introduce you to the basics of SELinux and key-based authentication, and can be a stepping stone to a career in security architecture.
Senior Security Engineer
Senior Security Engineers are responsible for designing and implementing security systems for large organizations. They must be familiar with a wide range of security tools and technologies, including SELinux. This course will introduce you to the basics of SELinux and key-based authentication, and can be a stepping stone to a career as a Senior Security Engineer.
Penetration Tester
Penetration Testers evaluate the security of computer systems and networks by attempting to exploit vulnerabilities. They must be familiar with a range of security tools and technologies, including SELinux. This course will introduce you to the basics of SELinux and key-based authentication, and can be a stepping stone to a career in penetration testing.
IT Security Manager
IT Security Managers are responsible for planning and implementing security measures for an organization's IT systems. They must be familiar with a range of security tools and technologies, including SELinux. This course will introduce you to the basics of SELinux and key-based authentication, and can be a stepping stone to a career in IT security management.
Cybersecurity Manager
Cybersecurity Managers are responsible for planning and implementing security measures for an organization. They must be familiar with a range of security tools and technologies, including SELinux. This course will introduce you to the basics of SELinux and key-based authentication, and can be a stepping stone to a career in cybersecurity management.
Cloud Security Engineer
Cloud Security Engineers are responsible for the security of data stored in cloud computing environments. They must be familiar with many of the same tools and technologies that Network Security Engineers are familiar with, including SELinux. This course will introduce you to the basics of SELinux, as well as the basics of key-based authentication, which can be valuable stepping stones to a career in cloud security.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer systems and networks. They must be familiar with a range of security tools and technologies, including SELinux and key-based authentication. This course can help build knowledge of these technologies which may be useful for getting into or succeeding in the field of information security.
System Administrator
System Administrators must handle a wide array of responsibilities. Security is one of the most important. This course will teach you some of the concepts of Linux security that you will need to know to be successful in the role of a System Administrator.
Chief Information Security Officer (CISO)
CISOs are responsible for the overall security of an organization's information systems. They must be familiar with a wide range of security tools and technologies, including SELinux. This course can be helpful in building knowledge of SELinux, which may be useful for getting into or succeeding in the CISO career.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They must be familiar with a wide range of security tools and technologies, including SELinux. This course will introduce you to the basics of SELinux and key-based authentication, and can be a stepping stone to a career in security consulting.
Security Analyst
Organizations that handle sensitive data will need employees trained in security best practices, who can help them maintain compliance with regulations and defend against threats. In this course, you will learn how to implement key-based authentication and SELinux, which are foundational skills for Security Analysts. This course may also provide value to you if you are preparing to pursue the OSCP certification.
Security Engineer
Security Engineers design and implement security systems, and respond to security incidents. Along with cryptography, knowledge of SELinux is valued in this role. The same is true for knowledge of key-based authentication. This course will teach you the basics of these concepts.
IT Auditor
IT Auditors evaluate the security and compliance of computer systems, and make recommendations for improvement. They are in high-demand in today's highly regulated business environment. This course can help build a foundation for a career as an IT Auditor by teaching you some basic concepts of security.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in RHEL 8: Managing Security.
Provides a comprehensive overview of security engineering principles and practices. It covers a wide range of topics, including cryptography, access control, and intrusion detection. It valuable resource for anyone interested in learning more about security.
This cookbook provides a collection of recipes for securing Linux systems. It covers a wide range of topics, including hardening the kernel, securing network services, and implementing intrusion detection systems.
Provides a comprehensive overview of security issues and solutions for UNIX and Linux systems. It covers a wide range of topics, including network security, cryptography, and system administration.
Provides a comprehensive overview of software security assessment. It covers a wide range of topics, including threat modeling, vulnerability analysis, and penetration testing.
Provides a comprehensive overview of computer security. It covers a wide range of topics, including security principles, attacks, and defenses.
Provides a comprehensive overview of security in computing. It covers a wide range of topics, including security principles, attacks, and defenses.
Provides a comprehensive overview of the Linux programming interface. It covers a wide range of topics, including system calls, file I/O, and process management.
Is an engaging and informative account of the author's experiences tracking down a computer hacker. It provides a fascinating glimpse into the world of computer security.
Is an autobiography of one of the world's most famous hackers. It provides a unique perspective on the world of computer security.
Provides insights into the human element of security. It explains how attackers can exploit human weaknesses to gain access to systems and data.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser