Red Hat Enterprise Linux 8 Security Hardening

$5.00

Harden the security of Red Hat Enterprise Linux 8 with expert strategies. Learn best practices for Linux security.

99 in stock

GOLD Membership – Just $49 for 31 Days
Get unlimited downloads. To purchase a subscription, click here. Gold Membership

Additional information

Additional information

Authors

Unknown

Publisher

Red Hat

Published On

0101

Language

English

ISBN

978-0996032807

Format

pdf

Size (MB)

0.95 MB

Description

Red Hat Enterprise Linux 8 Security Hardening

  Red Hat Enterprise Linux 8 Security Hardening. Master the practical techniques and industry best practices required to secure Red Hat Enterprise Linux (RHEL) 8 systems — from kernel and service hardening to SELinux, auditing, and compliance configuration. This hands-on course prepares sysadmins, security engineers, and DevOps professionals to reduce attack surface, meet compliance, and maintain secure, resilient RHEL 8 environments.

Course Overview

This course provides a step-by-step, practical approach to hardening RHEL 8 servers. Students will learn how to apply secure baseline configurations, enforce mandatory access control with SELinux, implement secure network services, manage user and privilege controls, configure auditing and logging, apply kernel and boot security measures, and validate systems against common benchmarks (CIS, STIG). Real-world labs use virtual machines and command-line tools so you can immediately apply techniques in production-like environments.

Who Should Attend

  • System administrators managing RHEL 8 servers
  • Security engineers responsible for Linux host hardening
  • DevOps and SRE professionals implementing secure infrastructure
  • IT auditors and compliance teams seeking practical RHEL 8 controls

Prerequisites

Familiarity with Linux command line, basic networking, and system administration concepts. Prior experience with RHEL or CentOS is recommended but not strictly required — the labs include refresher content.

Learning Outcomes

  1. Apply secure baseline configurations and automated hardening.
  2. Configure and enforce SELinux policies and troubleshoot common SELinux denial scenarios.
  3. Harden SSH, systemd services, and network-facing daemons.
  4. Implement user lifecycle and privilege management with sudo, PAM, and proper file permissions.
  5. Enable auditing, centralized logging, and retention to support forensic analysis.
  6. Harden bootloader, kernel parameters, and enable secure boot features where applicable.
  7. Validate systems against CIS benchmarks and prepare systems for regulatory compliance.

Detailed Syllabus / Modules

Module 1 — Security Fundamentals & Baselines

Threat model for Linux hosts, attack surface reduction, automated baseline tooling (Ansible & OpenSCAP), and package management hardening.

Module 2 — Identity, Accounts & Privilege Management

User lifecycle, secure password policies, sudo rules, PAM configuration, and locking down service accounts.

Module 3 — SELinux Deep Dive

SELinux modes, contexts, booleans, policy types, crafting custom policies, and troubleshooting with audit2allow and ausearch.

Module 4 — Network & Service Hardening

SSH hardening, service isolation with systemd, firewall (nftables) rules, and secure configuration of common services (HTTPD, DNS, SMTP).

Module 5 — Kernel, Boot, and Storage Security

Kernel parameter tuning, secure boot concepts, LUKS disk encryption best practices, and protecting /boot.

Module 6 — Auditing, Logging, and Forensics

Auditd rules, rsyslog/journald configuration, central logging strategies, and evidence collection for incident response.

Module 7 — Compliance & Benchmarking

Applying CIS benchmarks, automated compliance scanning, remediations, and preparing evidence for auditors.

Module 8 — Capstone Lab

Complete a full hardening workflow: baseline a fresh RHEL 8 install, remediate issues, enforce SELinux, enable auditing, and pass a compliance scan.

Course Features

  • Duration: ~24 hours (self-paced labs + instructor walkthroughs)
  • Format: Video lessons, CLI-focused labs, downloadable playbooks and cheat sheets
  • Tools provided: Ansible playbooks, OpenSCAP profiles, sample auditd rules, SELinux policy snippets
  • Certificate of completion and lab evidence package

Assessment & Certification

Practical lab assessments and a final capstone where you must demonstrate a hardened RHEL 8 host that meets specified CIS controls. A downloadable certificate is issued upon successful completion.

Frequently Asked Questions

Do I need Red Hat subscription?
Not strictly — labs can use CentOS Stream or RHEL trial images, but some modules reference Red Hat documentation and repositories where an active subscription is beneficial.
Will this course prepare me for RHCSA/RHCE?
This course focuses on security hardening; it complements RHCSA/RHCE system administration topics but is not a direct replacement for certification track training.

Explore These Valuable Resources.

Ready to Harden Your RHEL 8 Systems?

Enroll today to get immediate access to labs, playbooks, and a certificate of completion. Perfect for admins and security teams who must secure production Linux hosts and meet compliance requirements.

 

Additional information

Authors

Unknown

Publisher

Red Hat

Published On

0101

Language

English

ISBN

978-0996032807

Format

pdf

Size (MB)

0.95 MB

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.