Course Offering
- Fast Lane Courses»
- Enabling Digital Business
- Training by Technology
- Big Data & Analytics
- Business Analysis
- Cloud Computing
- Collaboration
- Cyber Security
- Data Center
- DevOps Software Deployment
- Enterprise Mobility
- FlexPod
- Internet of Things (IoT)
- IPv6
- VersaStack
- Virtualization
- Wireshark / Packet Analysis
- Training by Vendor
-
Cisco»
- Cisco Digital Network Architecture (DNA)
- Cisco Guaranteed Dates
- GDPR with Cisco
- Cisco Learning Credits
- Public Schedule
- Certification
- Internet of Things (IoT) Training
- Cisco Sales
- Cisco Customer Loyalty Program
- Cisco Service Provider
- Cisco Learning Services
- Cisco End User Training
- Cisco CCIE Offerings
- Wireless & Mobility for Healthcare
- E-Learning
- Cisco Digital Learning Library
- NetApp»
- Palo Alto Networks»
- VMware»
- Microsoft»
- Red Hat»
- Amazon Web Services»
- Apple»
- Arista Training
- AudioCodes»
- Avaya»
- Azeti
- Barracuda»
- Blue Coat»
- Brocade
- Check Point»
- Citrix»
- Cloudera»
- CompTIA»
- CWNP
- Cybersec First Responder
- Database
- Data Centre Training
- Davra
- E-learning
- F5 Networks»
- Forcepoint»
- Gigamon»
- Google Cloud
- HP»
- IBM»
- ITIL»
- Juniper Networks»
- Kaspersky»
- NCTA Cloud
- OpenStack»
- Oracle»
- Pivotal/Spring
- Project/Programme Management»
- Relayr
- Salesforce»
- Sonus»
- Symantec»
- The SIP school
- ThingWorx Training
- UNIX / Linux Training»
- Veeam»
- Veritas»
- Voss»
RH-RH413
Classroom Training
Modality: G
Duration 4 days
Price (excl. VAT)
- United Kingdom: £ 2,540.-
Currently no training dates Enquire a date
Online Training
Modality: U
Duration 5 days
Price (excl. VAT)
- United Kingdom: £ 2,540.-
Currently no online training dates

Red Hat Server Hardening (RH413)
Course Description | Schedule | Course Outline |
![]() |
Detailed Course Outline
Module 1: Track security updates
- Understand how Red Hat Enterprise Linux produces updates and how to use yum to perform queries to identify what errata are available.
Module 2: Manage software updates
- Develop a process for applying updates to systems including verifying properties of the update.
Module 3: Create file systems
- Allocate an advanced file system layout and use file system encryption.
Module 4: Manage file systems
- Adjust file system properties through security related options and file system attributes.
Module 5: Manage special permissions
- Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions and locate files with these permissions enabled.
Module 6: Manage additional file access controls
- Modify default permissions applied to files and directories; work with file access control lists.
Module 7: Monitor for file system changes
- Configure software to monitor the files on your machine for changes.
Module 8: Manage user accounts
- Set password-aging properties for users; audit user accounts.
Module 9: Manage pluggable authentication modules (PAMs)
- Apply changes to PAMs to enforce different types of rules on users.
Module 10: Secure console access
- Adjust properties for various console services to enable or disable settings based on security.
Module 11: Install central authentication
- Install and configure a Red Hat Identity Management server and client.
Module 12: Manage central authentication
- Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted to users on those systems.
Module 13: Configure system logging
- Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems.
Module 14: Configure system auditing
- Enable and configure system auditing.
Module 15: Control access to network services
- Manage firewall rules to limit connectivity to network services.