We provide a myriad of services and know getting the right support is overwhelming. Sourcing our frequently asked questions, we want to help and provide you with the service that is right for you.
Total Hour: 55
1. Monitoring and managing Linux processes
2. Virtualization’s usage and security.
3. Controlling and troubleshooting the Linux Boot process.
4. Accessing network storage with SMB
Total Hour: 55
The Red Hat Security Response
Red Hat Severity Scoring
What are CVEs and Red Hat Errata?
Discuss Package Maintenance Through Backporting
Engaging the Red Hat Security Response Team
Develop an Update Process
Applying Security Updates
Validate Package Integrity and Scripts
Allocating Filesystems for Secure Containment
Implementing Filesystem Encryption
Secure Filesystems Using Security-Related Mount Options
Secure Individual Files with Filesystem Attributes
Special Permissions Concepts
Manipulating Special Permissions
Auditing Files with Special Permissions
Setting Default File Permissions
Managing Access Control Lists
Using Intrusion Detection Software to Monitor Changes
Managing Password Aging
Auditing User Accounts
PAM Syntax And Configuration
PAM Documentation
Configure Password Requirements through PAM
Supplementary PAM Configuration
Lock Accounts With Multiple Failed Logins
Securing GRUB Bootloader
Modifying Text Console Settings
Modifying Graphical Console Settings
Installing an Identity Management (IdM) Server
Adding User and Group Entries to Identity Management (IdM)
Registering a Client System with Identity Management (IdM)
Controlling IdM User Access to Systems
Managing sudo on IdM Client Systems
Configuring rsyslog Log File Management
Managing Log File Rotation
Configuring System Auditing
Audit Reporting
Writing Custom Audit Rules
Using Predefined Audit Sets
Review of iptables Basics
Advanced iptables
Configure advance rules to detect unwanted attack
Protect unwanted attack
Install Anti-virus in linux
Configure schedule scan
Use nmap to scan ports
Use nmap NSE script to scan vulnerability of applications
Use tcpdump and wireshark to capture traffic
Analyze traffic