Linux Academy Red Hat Certificate of Expertise in Server Hardening Prep Course
Meet your Course Author
Introduction to Linux Academy
Why server hardening?
The CIA Model
Quiz: Identify Red Hat Common Vulnerabilities and Exposures
Verifying Packages - Yum
Installing and Verifying Packages with RPM
Quiz: Verify package security and validity
Common Standards - Examples
Create and Use Encrypted File Systems
File System Features
File System Features - Hands On
Quiz: Identify and employ standards based practises
File System Properties for EXT4
File System Properties for XFS
Files - suid
Files - gid
Files - Sticky Bit
Files - FACL
Quiz: Configure defaults for filesystems
Security Tools - aide
Security Tools - ossec
Quiz: Install and use intrusion detection
Setting User Account Defaults
Group Accounts and Group Administrators
Quiz: Manage User account and password security
What is PAM
A Further Look at PAM
Quiz: PAM - Pluggable authentication modules
Console Security - Hands On.
Quiz: Configure console security
Changing the SSH Banner
Changing the Message of the Day
Use a Shell Script to Customize a Message When You Log In
Quiz: Configure system wide acceptible use notifications
What is IdM - Identity Management?
Install IdM - Identity Management Server
Install IdM on a Client Server
Quiz: Install and configure Identity Management Service
System logging via rsyslog
Managing system log files.
Configure remote logging services
Quiz: Configure remote system logging services
Configure and Install System Auditing Services
Review Audit Data
Getting Reports Out of the Audit Data
Quiz: Configure system auditing services
Install and Use nmap
Install and Use nessus
IPTables - Part 2
Quiz: Network scanning tools and iptables
Quiz: Practice Exam
The performance-based Red Hat Certificate of Expertise in Server Hardening exam (EX413) tests your ability to perform a number of systems administration tasks focused on securing servers against unauthorized access.
This book assists users and administrators in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation and malicious activity. Focused on Red Hat Enterprise Linux but detailing concepts and techniques valid for all Linux systems, this guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods. Original download site for this document. https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/index.html
This guide assists users and administrators in managing and using Security-Enhanced Linux. This document can be downloaded from Red Hat at the following url. https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security-Enhanced_Linux/index.html
Deploying and configuring single-node storage in Red Hat Enterprise Linux 6. This guide provides instructions on how to effectively manage storage devices and file systems on Red Hat Enterprise Linux 6. It is intended for use by system administrators with basic to intermediate knowledge of Red Hat Enterprise Linux or Fedora. The link to this file on Red Hat can be found below. https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Storage_Administration_Guide/index.html
A Guide to Securing Red Hat Enterprise Linux 7. This book assists users and administrators in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Red Hat Enterprise Linux but detailing concepts and techniques valid for all Linux systems, this guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods. This document can be downloaded from Red Hat at the following url. https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/
Basic and advanced configuration of Security-Enhanced Linux (SELinux). Note: This document is under development, is subject to substantial change, and is provided only as a preview. The included information and instructions should not be considered complete, and should be used with caution. This book consists of two parts: SELinux and Managing Confined Services. The former describes the basics and principles upon which SELinux functio ns , the latter is m o re fo cus ed on practical tas ks to s et up and co nfigure vario us s ervices . This document can be found on the Red Hat site at the following url. https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/SELinux_Users_and_Administrators_Guide/
The Deployment Guide documents relevant information regarding the deployment, configuration and administration of Red Hat Enterprise Linux 6. It is oriented towards system administrators with a basic understanding of the system.
Identity and policy management — for both users and machines — is a core function for almost any enterprise environment. IPA provides a way to create an identity domain that allows machines to enroll to a domain and immediately access identity information required for single sign-on and authentication services, as well as policy settings that govern authorization and access. This manual covers all aspects of installing, configuring, and managing IPA domains, including both servers and clients. This guide is intended for IT and systems administrators.
PDF copy of the powerpoint slides used during this course.
This is the Study Guide for this course.
This test program is a c program thats been compiled. It will show you what user the program is being run as. Here is the code if you wanted to compile it yourself. Or you have problems running it on your system.