Course Outline

Unit 1 - Track security updates
Understand how Red Hat Enterprise Linux produces updates and how to use yum to perform queries to identify what errata are available.

Unit 2 - Manage software updates 
Develop a process for applying updates to systems including verifying properties of the update.

Unit 3 - Create file systems
Allocate an advanced file system layout and use file system encryption. 

Unit 4 - Manage file systems 
Adjust file system properties through security related options and file system attributes. 

Unit 5 - Manage special permissions 
Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions and locate files with these permissions enabled. 

Unit 6 - Manage additional file access controls
Modify default permissions applied to files and directories; work with file access control lists. 

Unit 7 - Monitor for file system changes 
Configure software to monitor the files on your machine for changes. 

Unit 8 - Manage user accounts 
Set password-aging properties for users; audit user accounts. 

Unit 9 - Manage pluggable authentication modules (PAMs) 
Apply changes to PAMs to enforce different types of rules on users.

Unit 10 -Secure console access 
Adjust properties for various console services to enable or disable settings based on security.

Unit 11 - Install central authentication
Install and configure a Red Hat Identity Management server and client.

Unit 12 - Manage central authentication 
Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted to users on those systems.

Unit 13 - Configure system logging
Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems. 

Unit 14 - Configure system auditing
Enable and configure system auditing.

Unit 15 - Control access to network services
Manage firewall rules to limit connectivity to network services.