RHEL 8: Managing Security
Security in Linux has never been so important. This course will teach you the skills needed to implement Mandatory Access Control Lists (SELinux) and key-based authentication.
Keeping your data secure and your systems protected in now a legal requirement in most nations. In this course, RHEL 8: Managing Security, you’ll learn to develop a mindset to keep your systems secure. First, you’ll explore implementing key-based authentication to disable password access via SSH. Next, you’ll discover the reasons why SELinux is required and should never be disabled. Finally, you’ll learn how to implement SELinux policies to secure your system making adjustments for custom locations. When you’re finished with this course, you’ll have the skills and knowledge of securing Red Hat Enterprise Linux 8 needed to deploy systems in a public facing environment.
Author Name: Andrew Mallett
Author Description:
Andrew is an all around Linux professional with in depth knowledge of the OS and this is supported with scripting in bash, perl, python and ruby and application development in C, C++ and Java. Having worked for many years in training, Andrew has developed automated course build systems after endless time wasted on Friday nights. The first build system he built was aptly named “Friday nights.” This has inspired his interest in all things deployment related. He has authored training courses on M… more
Table of Contents
- Course Overview
1min - Implementing SSH Key-based Authentication
25mins - Implementing POSIX Access Control Lists
35mins - Understanding SELinux Modes
29mins - Understanding File and Process Contexts
24mins - Implementing Custom Service Configurations
27mins
There are no reviews yet.