RHEL 8: Managing Security
Offered By: Pluralsight
Course Description
Overview
Security in Linux has never been so important. This course will teach you the skills needed to implement Mandatory Access Control Lists (SELinux) and key-based authentication.
Keeping your data secure and your systems protected in now a legal requirement in most nations. In this course, RHEL 8: Managing Security, you’ll learn to develop a mindset to keep your systems secure. First, you’ll explore implementing key-based authentication to disable password access via SSH. Next, you’ll discover the reasons why SELinux is required and should never be disabled. Finally, you’ll learn how to implement SELinux policies to secure your system making adjustments for custom locations. When you’re finished with this course, you’ll have the skills and knowledge of securing Red Hat Enterprise Linux 8 needed to deploy systems in a public facing environment.
Keeping your data secure and your systems protected in now a legal requirement in most nations. In this course, RHEL 8: Managing Security, you’ll learn to develop a mindset to keep your systems secure. First, you’ll explore implementing key-based authentication to disable password access via SSH. Next, you’ll discover the reasons why SELinux is required and should never be disabled. Finally, you’ll learn how to implement SELinux policies to secure your system making adjustments for custom locations. When you’re finished with this course, you’ll have the skills and knowledge of securing Red Hat Enterprise Linux 8 needed to deploy systems in a public facing environment.
Syllabus
- Course Overview 1min
- Implementing SSH Key-based Authentication 25mins
- Implementing POSIX Access Control Lists 35mins
- Understanding SELinux Modes 29mins
- Understanding File and Process Contexts 24mins
- Implementing Custom Service Configurations 27mins
Taught by
Andrew Mallett
Related Courses
Introduction to LinuxLinux Foundation via edX 操作系统原理(Operating Systems)
Peking University via Coursera Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera Information Security-3
Indian Institute of Technology Madras via Swayam Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera