July Release Confetti
150+ New Courses, Hands‑On Labs, And
Interactive Learning Activities
Learn More

Red Hat Certified Specialist in Server Hardening Prep Course

Training Architect
course instructor image
Terrence Cox
A veteran of twenty years in Information Technology in a variety of roles. He has worked in development, security and infrastructure well before they merged into what we now call DevOps. He provides training in Linux, VMWare, DevOps (Ansible, Jenkins, etc) as well as containers and AWS topics.

Introduction

Identify Common Red Hat Vulnerabilities and Exposures

Quiz: Identify Red Hat Common Vulnerabilities and Exposures

Verify Package Security and Validity

Quiz: Verify package security and validity

Identify and Employ Standards-based Practices

Quiz: Identify and employ standards based practises

Configure Defaults for File Systems

Quiz: Configure defaults for filesystems

Install and Use Intrusion Detection

Quiz: Install and use intrusion detection

Manage User Account and Password Security

Quiz: Manage User account and password security

PAM - Pluggable Authentication Modules

Quiz: PAM - Pluggable authentication modules

Configure Console Security

Quiz: Configure console security

Configure System-wide Acceptable Use Notifications

Quiz: Configure system wide acceptible use notifications

Install and Configure Identity Management Service

Quiz: Install and configure Identity Management Service

Configure Remote System Logging Services

Quiz: Configure remote system logging services

Configure System Auditing Services

Quiz: Configure system auditing services

Network Scanning Tools and IPTables

Quiz: Network scanning tools and iptables

Conclusion

Quiz: Practice Exam

Details

The performance-based Red Hat Certificate of Expertise in Server Hardening exam (EX413) tests your ability to perform a number of systems administration tasks focused on securing servers against unauthorized access.

Study Guides

Red Hat Enterprise 6 Security Guide

This book assists users and administrators in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Red Hat Enterprise Linux but detailing concepts and techniques valid for all Linux systems, this guide details the planning and tools involved in creating a secure computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods. Original download site for this document. https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/index.html

Red Hat Enterprise Linux 6 SE Linux

This guide assists users and administrators in managing and using Security-Enhanced Linux. This document can be downloaded from Red Hat at the following URL: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security-Enhanced_Linux/index.html

Red Hat Enterprise Linux 6 Storage Administration Guide

This guide provides instructions on how to effectively manage storage devices and file systems on Red Hat Enterprise Linux 6. It is intended for use by system administrators with basic to intermediate knowledge of Red Hat Enterprise Linux or Fedora. The link to this file on Red Hat can be found below: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Storage_Administration_Guide/index.html

Red Hat Enterprise Linux 7 Security Guide

This book assists users and administrators in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Red Hat Enterprise Linux but detailing concepts and techniques valid for all Linux systems, this guide details the planning and the tools involved in creating a secure computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods. This document can be downloaded from Red Hat at the following URL: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/

Red Hat Enterprise Linux 7 - SELinux

Note: This document is under development, subject to substantial change, and provided only as a preview. The included information and instructions should not be considered complete and should be used with caution. This book consists of two parts: SELinux and Managing Confined Services. The former describes the basics and principles upon which SELinux functions , the latter is more focused on practical tasks to set up and configure various services. This document can be found on the Red Hat site at the following URL: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/SELinux_Users_and_Administrators_Guide/

Red Hat Enterprise Linux 6 Deployment Guide

The Deployment Guide documents relevant information regarding the deployment, configuration, and administration of Red Hat Enterprise Linux 6. It is oriented towards system administrators with a basic understanding of the system.

Red Hat Enterprise Linux 6 Identity Management Guide

Identity and policy management — for both users and machines — is a core function for almost any enterprise environment. IPA provides a way to create an identity domain that allows machines to enroll to a domain and immediately access identity information required for single sign-on and authentication services, as well as policy settings that govern authorization and access. This manual covers all aspects of installing, configuring, and managing IPA domains, including both servers and clients. This guide is intended for IT and systems administrators.

Course Slides

A downloadable copy of the slides used in this course.

Study Guide

The course study guide, detailing all information we need to know to pass the exam.

setuid Test Program

This test program in written in C and will show you what user the program is being run as. Here is the code if you wanted to compile it yourself: #include #include int main(int argc, char** argv) { printf("%d", geteuid()); printf("\n"); return 0; } Save the code into a file called setuid-test.c Then, if you have gcc installed, you can use the following command to compile it: gcc -o setuid-test setuid-test.c

Instructor Deck

Community

Looking For Team Training?

Learn More