Table of contents
Course Introduction
0mins
Lock icon
An Important Note About A Cloud Guru and Linux Academy Courses | 0m
Lock icon
About the Author | 0m
Lock icon
About the Course | 0m
Lock icon
Course Features | 0m
System Auditing
180mins
Lock icon
Introduction to System Auditing | 0m
Lock icon
Defining Audit Rules and Creating Audit Reports | 0m
Lock icon
Configuring Audit Settings on Red HatConfiguring Audit Settings on Red Hat | 1h 0m
Lock icon
Configuring Audit Settings for STIG Compliance on Red HatConfiguring Audit Settings for STIG Compliance on Red Hat | 1h 0m
Lock icon
Security Auditing and AutomationSecurity Auditing and Automation | 1h 0m
OpenSCAP
180mins
Lock icon
All About OpenSCAP | 0m
Lock icon
OSCAP with Red Hat Satellite and Insights | 0m
Lock icon
Connecting to a Linux Lab Server with VNC | 0m
Lock icon
Run an OpenSCAP Compliance Scan on a HostRun an OpenSCAP Compliance Scan on a Host | 1h 0m
Lock icon
Create a Custom Scan Policy with OpenSCAPCreate a Custom Scan Policy with OpenSCAP | 1h 0m
Lock icon
Performing a Compliance Scan and Active Remediation Using OSCAPPerforming a Compliance Scan and Active Remediation Using OSCAP | 1h 0m
Ansible
150mins
Lock icon
Introduction to Ansible and Its Parts | 0m
Lock icon
Installing Ansible and Managing SSH Keys | 0m
Lock icon
Getting Started with AnsibleGetting Started with Ansible | 1h 0m
Lock icon
Ansible Playbooks: The BasicsAnsible Playbooks: The Basics | 1h 30m
AIDE (Advanced Intrusion Detection Environment)
90mins
Lock icon
Installing and Configuring AIDE | 0m
Lock icon
Tuning AIDE Functionality | 0m
Lock icon
Installing and Configuring AIDEInstalling and Configuring AIDE | 1h 0m
Lock icon
Intrusion DetectionIntrusion Detection | 30m
AIDE Scenarios
0mins
Lock icon
AIDE Scenarios | 0m
Securing SSH
60mins
Lock icon
Managing SSH Access | 0m
Lock icon
Working with SSH Keys and Settings | 0m
Lock icon
Managing SSH AccessManaging SSH Access | 1h 0m
USB Device Restrictions
120mins
Lock icon
Installing and Configuring USBGuard | 0m
Lock icon
USBGuard Policies and Settings | 0m
Lock icon
Installing and Configuring USBGuardInstalling and Configuring USBGuard | 1h 0m
Lock icon
Creating USBGuard RulesCreating USBGuard Rules | 1h 0m
Pluggable Authentication Module (PAM) Policies
120mins
Lock icon
Introduction to PAM | 0m
Lock icon
Creating Account Lockout Policies | 0m
Lock icon
Creating Password Policies | 0m
Lock icon
Configure an Account Lockout PolicyConfigure an Account Lockout Policy | 1h 0m
Lock icon
Configure a Password Complexity PolicyConfigure a Password Complexity Policy | 1h 0m
Managing sudo
60mins
Lock icon
Controlling sudo Access | 0m
Lock icon
Locking Down sudo | 0m
Lock icon
Managing sudo AccessManaging sudo Access | 1h 0m
Linux Unified Key Setup (LUKS)
180mins
Lock icon
Linux Storage Review | 0m
Lock icon
Introduction to LUKS | 0m
Lock icon
The LUKS Encryption Process | 0m
Lock icon
Mounting LUKS Volumes at Boot | 0m
Lock icon
LUKS Volume Management | 0m
Lock icon
LUKS Scenarios and Review | 0m
Lock icon
Creating a New Encrypted Volume Using LUKSCreating a New Encrypted Volume Using LUKS | 1h 0m
Lock icon
Changing a LUKS PassphraseChanging a LUKS Passphrase | 1h 0m
Lock icon
Creating a Secondary LUKS Passphrase and LUKS Header BackupCreating a Secondary LUKS Passphrase and LUKS Header Backup | 1h 0m
Network-Bound Disk Encryption (NBDE)
60mins
Lock icon
Introduction to NBDE | 0m
Lock icon
Configuring NBDE Servers | 0m
Lock icon
Configuring NBDE Clients | 0m
Lock icon
NBDE Key Management | 0m
Lock icon
Encrypting a Volume with NBDEEncrypting a Volume with NBDE | 1h 0m
Security-Enhanced Linux
240mins
Lock icon
Introduction to SELinux | 0m
Lock icon
Policies and Labels | 0m
Lock icon
Type Enforcement and Managing Labels | 0m
Lock icon
Booleans | 0m
Lock icon
Troubleshooting SELinux | 0m
Lock icon
Confined Users, Booleans, and sudo | 0m
Lock icon
Confined Users Review | 0m
Lock icon
SELinux Scenario | 0m
Lock icon
Configuring SELinuxConfiguring SELinux | 1h 0m
Lock icon
Creating Confined Users in SELinuxCreating Confined Users in SELinux | 1h 0m
Lock icon
Troubleshooting SELinuxTroubleshooting SELinux | 1h 0m
Lock icon
Granting `sudo` Privileges to Confined UsersGranting `sudo` Privileges to Confined Users | 1h 0m
Next Steps
150mins
Lock icon
How to Prepare for the Exam | 0m
Lock icon
What's Next After Certification | 0m
Lock icon
Red Hat Certified Specialist in Security (EX415) Practice ExamRed Hat Certified Specialist in Security (EX415) Practice Exam | 2h 30m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon