Securing computing systems requires managing risk through processes, standards, and tools. This training teaches you how to use the built-in security technologies of Red Hat Enterprise Linux to protect data, manage compliance, and reduce risks.
Students will gain practical experience with OpenSCAP, SELinux, Red Hat Insights, Linux Audit, AIDE, PAM, USBGuard, storage encryption, Ansible Playbooks, and Red Hat Satellite to ensure secure and compliant environments across physical, virtual, and cloud deployments.