YoVDO

RHEL 8: Managing Security

Offered By: Pluralsight

Tags

Linux Courses System Security Courses SSH Courses SELinux Courses

Course Description

Overview

Security in Linux has never been so important. This course will teach you the skills needed to implement Mandatory Access Control Lists (SELinux) and key-based authentication.

Keeping your data secure and your systems protected in now a legal requirement in most nations. In this course, RHEL 8: Managing Security, you’ll learn to develop a mindset to keep your systems secure. First, you’ll explore implementing key-based authentication to disable password access via SSH. Next, you’ll discover the reasons why SELinux is required and should never be disabled. Finally, you’ll learn how to implement SELinux policies to secure your system making adjustments for custom locations. When you’re finished with this course, you’ll have the skills and knowledge of securing Red Hat Enterprise Linux 8 needed to deploy systems in a public facing environment.

Syllabus

  • Course Overview 1min
  • Implementing SSH Key-based Authentication 25mins
  • Implementing POSIX Access Control Lists 35mins
  • Understanding SELinux Modes 29mins
  • Understanding File and Process Contexts 24mins
  • Implementing Custom Service Configurations 27mins

Taught by

Andrew Mallett

Related Courses

Introduction to Networks and Cisco Devices
Coursera Project Network via Coursera
Créer un Groupe Auto Scaling Amazon EC2 avec Load Balancer
Coursera Project Network via Coursera
Créer un site web Wordpress avec Amazon Lightsail
Coursera Project Network via Coursera
Linux Essentials for Ethical Hackers - Full InfoSec Course
freeCodeCamp
Introduction to Amazon Elastic Compute Cloud (EC2)
Amazon Web Services via AWS Skill Builder