Red Hat Certified Specialist in Server Hardening Prep Course
December 31st, 2017
Senior Vice President of Content
The performance-based Red Hat Certificate of Expertise in Server Hardening exam (EX413) tests your ability to perform a number of systems administration tasks focused on securing servers against unauthorized access.
Meet Your Course Author
Hi. My name is Kevin James and I am your course author for this course. Find out a bit more about me and my qualifications in this video!
Introduction to Linux Academy
Welcome to Linux Academy! Find out what this course offers you, as a Linux Academy student.
Find out what you need to know before taking this course.
Why Server Hardening?
Find out the benefits of server hardening and why you should care.
Found out how to get your efforts recognized on the Linux Academy community!
Identify Common Red Hat Vulnerabilities and Exposures
The CIA Model
Found out about the CIA Model and what it means for securing your servers.
Let's discuss keeping your servers up-to-date.
Identify Red Hat Common Vulnerabilities and Exposures
Verify Package Security and Validity
Verifying Packages - Yum
We discuss how to verify packages from yum.
Installing and Verifying Packages with RPM
We discuss using package verification with RPM.
Verify Package Security and Validity
Verify Package Security and Validity - Part 2
Verify package security and validity
Identify and Employ Standards-based Practices
What are some practices we can do to help secure our servers?
Common Standards - Examples
In this lesson, we review some examples from the previous video on common security standards.
Create and Use Encrypted File Systems
In this lesson, we encrypt the disk when we install Linux. We then encrypt a partition that has already been created and mounted.
File System Features
In this lesson, we discuss the different file systems available to us.
File System Features - Hands On
Let's get hands-on and see how we add a drive to our cloud servers.
Identify and employ standards based practises
Configure Defaults for File Systems
File System Properties for ext4
This lesson covers some defaults for use with ext4 file systems.
File System Properties for XFS
This lesson discusses the options available for mounting an XFS file system.
Files - SUID
This lesson talks about SUID and the setuid attribute. It also shows you how to find programs that use SUID.
Files - GID
This lesson covers the use of group identifiers, or GIDs.
Files - Sticky Bit
This lesson covers the use of the sticky bit to protect directories.
Files - FACL
In this lesson, we learn about File Access Control Lists.
Use setuid for an Executable
Use File Access Control Lists
Configure defaults for filesystems
Install and Use Intrusion Detection
Security Tools - AIDE
This lesson explores AIDE, its uses, and installation and setup.
Security Tools - OSSEC
This lesson discusses the OSSEC intrusion detection tool.
Install and Configure AIDE
Install and use intrusion detection
Manage User Account and Password Security
In this lesson, we discuss user account security.
Setting User Account Defaults
In this lesson, we talk about setting default parameters for users.
Group Accounts and Group Administrators
In this lesson, we learn how to set an admin for a group.
Update the Default Password Aging Parameters
Add a User as a Group Administrator
Manage User account and password security
PAM - Pluggable Authentication Modules
What is PAM
Learn the basics of PAM in this lesson.
A Further Look at PAM
In this lesson, we examine some PAM configuration files and discuss their contents.
PAM - Pluggable authentication modules
Configure Console Security
This lesson talks about BIOS passwords and GRUB security, as well as controlling the CTRL+ALT+DELETE process.
Console Security - Hands On
In this lesson, we practice the concepts learned earlier by getting hands-on with console security.
Configure console security
Configure System-wide Acceptable Use Notifications
Changing the SSH Banner
This lesson is a repeat of a portion of a previous section and discusses adding a banner message to the SSH login process.
Changing the Message of the Day
In this lesson, we show how to change the message of the day for our system.
Use a Shell Script to Customize a Message Viewed Upon Login
In this lesson, we learn how to customize a message that appears upon login.
System Notifications - Lab 1
System Notifications - Lab 2
System Notifications - Lab 3
Configure system wide acceptible use notifications
Install and Configure Identity Management Service
What is IdM? - Identity Management
Learn the basics of identity management with IdM.
Install IdM - Identity Management Server
In this lesson, we install the IdM and test if the install worked.
Install IdM on a Client Server
In this lesson, we set up a server to use as a client for IdM.
Install and Configure Red Hat Identity Management Server
Install and Configure Both Master and Client Servers
Install and configure Identity Management Service
Configure Remote System Logging Services
System Logging via rsyslog
A brief overview of system logging in Red Hat 6 and CentOS 6.
Managing System Log Files
In this lesson, we manage system log files using mechanisms such as log rotation and compression.
Configure Remote Logging Services
In this lesson, we use rsyslog to set up remote server logging.
Configure Remote Logging
Manage Log File Rotation
Configure remote system logging services
Configure System Auditing Services
Configure and Install System Auditing Services
This lesson describes what auditd does and how to install and use it.
Review Audit Data
In this lesson, we review some of the generated data.
Getting Reports Out of Audit Data
In this lesson, we use the aureport command to get some information out of the audit system.
Configure system auditing services
Network Scanning Tools and IPTables
Install and Use nmap
In this lesson, we discuss some tools to use for checking open ports on your servers.
Install and Use nessus
In this lesson, we install Nessus, which is a vulnerability scanner. Note: While useful, Nessus is not covered in the exam.
In this lesson, we discuss IPTables, what it is, and how it works.
IPTables - Part 2
In this lesson, we cover editing the IPTables file and using both the graphical and command line tools for managing firewalls through IPTables.
Scan the Network Ports of a Server
Network scanning tools and iptables
Let's take a final review of topics we're expected to know to pass the exam.
So, what's next? Find out the next steps after taking this course and where to go to continue your studies.
Learn how to get recognized by the Linux Academy community.