RH415 – Red Hat Security: Linux in Physical, Virtual, and Clou[...]

The „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) course is designed for security and system administration personnel who manage the secure operation of computer systems running Red Hat Enterprise Linux on physical hardware, as virtual machines, or as cloud instances both in private data centers and on public cloud platforms.

Course description

  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, as virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements, including the kernel’s Audit subsystem, AIDE, SELinux, OpenSCAP and SCAP Workbench, USBGuard, PAM authentication, and Network-Based Device Encryption. You will learn to monitor compliance and to proactively identify, prioritize, and resolve issues by using OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Automation Platform. You will have a basic introduction to how Red Hat Ansible Automation Platform automates the deployment of remediation to systems, by using Ansible Playbooks from OpenSCAP or Red Hat Insights.
  • This course is based on RHEL 9.2, Ansible Core 2.14, Red Hat Ansible Automation Platform 2.4, Satellite 6.14, and OpenSCAP 1.3.7.
  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
  • Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.
  • Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course summary

  • Manage compliance with OpenSCAP.
  • Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniques.
  • Proactively identify and resolve issues with Red Hat Insights.
  • Monitor activity and changes on a server with Linux Audit and AIDE.
  • Protect data from compromise with USBGuard and storage encryption.
  • Manage authentication controls with PAM.
  • Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues.
  • Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Automation Platform.

Target Audience

  • System Administrator – responsible for supporting the company’s physical and virtual infrastructure, systems, and servers
  • IT Security Practitioner / Compliance & Auditor – responsible for ensuring the technology environment is protected from attacks and is in compliance with security/privacy rules and regulations.
  • Automation Architect – Engineer or architect responsible for the company’s automation development and optimizing cloud tools and infrastructure to achieve automation goals.

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • Red Hat Certified Engineer (EX294 / RHCE) certification or equivalent Red Hat Enterprise Linux knowledge and experience.

Technology considerations

  • If the instructor intends to demonstrate Red Hat Insights, internet access and appropriate entitlements are required.

RH436 – Red Hat High Availability Clustering

Overview

Course description

Design and deploy a high availability cluster

Red Hat® High Availability Clustering (RH436) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

This course is based on Red Hat Enterprise Linux 7.1.

Created for senior Linux® system administrators, this 4-day course strongly emphasizes lab-based activities. You’ll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment.

This course also helps you prepare for the Red Hat Certified Specialist in High Availability Clustering exam (EX436).

Course content summary

  • Install and configure a Pacemaker-based high availability cluster
  • Create and manage highly available services
  • Troubleshoot common cluster issues
  • Work with shared storage (iSCSI) and configure multipathing
  • Configure GFS2 file systems

Audience for this course

  • Senior Linux system administrators responsible for maximizing resiliency through high-availability clustering services and using fault-tolerant shared storage technologies

Prerequisites for this course

  • If you want to take this course without the exam (RH436) and have not earned your RHCE® certification, you can confirm that you have the necessary knowledge by passing the online skills assessment.

RH362 – Red Hat Security: Identity Management and Active Direc[...]

Overview

Course description

Configure and manage Red Hat Identity Management (IdM)

Red Hat Security: Identity Management and Active Directory Integration (RH362) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.This course is based on Red Hat Identity Manager 4.5 (bundled with RHEL), Red Hat Enterprise Linux 7.4, Microsoft Windows Server 2016, Red Hat Satellite 6.3, Red Hat Ansible Tower 3.2.2, and Red Hat Ansible 2.5.

This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

Course summary

  • Install Red Hat Identity Management servers, replicas, and clients.
  • Configure and manage Kerberos authentication and secure services.
  • Create and manage a trust relationship with Microsoft Active Directory.
  • Configure highly secure user authentication—local and remote—including two-factor authentication.
  • Manage secrets, vaults, certificates, and keys.
  • Troubleshoot identity management processes.
  • Integrate Satellite 6 with IdM.
  • Integrate Tower with IdM.
  • Configure IdM backup and recovery.

Audience for this course

  • Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications
  • Identity management specialist or engineer
  • Access management specialist or engineer
  • Web application developer
  • DevOps specialist

Prerequisites for this course

RH318 – Red Hat Virtualization

Overview

Course description

Deploy, configure, manage, and migrate virtual environments

Red Hat Virtualization (RH318) teaches you the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat® Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.

This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux® 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.

Course content summary

  • Configure Red Hat Virtualization
  • Configure networking and storage for use with Red Hat Virtualization
  • Manage user accounts and access to the Red Hat Virtualization environment
  • Install and manage virtual machines in Red Hat Virtualization
  • Use templates for rapid virtual machine deployment
  • Manage virtual machine snapshots and images
  • Migrate virtual machines and explore high-availability options

Audience for this course

Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform.

Recommendations for this course

RH342 – Red Hat Enterprise Linux Diagnostics and Troubleshooti[...]

Overview

Course description

Diagnose problems, gather information, and fix common issues with Red Hat Enterprise Linux

The Red Hat Enterprise Linux Diagnostics and Troubleshooting course (RH342) provides system administrators with the tools and techniques they need to successfully diagnose, and fix, a variety of potential issues. Students will work through hands-on problems in various subsystems to diagnose and fix common issues.

Students will learn how to apply the scientific method to a structured form of troubleshooting. This approach is then used troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course students can complete various comprehensive review labs to test their skills.

Course content summary

  • Use the scientific method to approach troubleshooting
  • Troubleshoot boot issues
  • Troubleshoot security issues
  • Troubleshoot storage issues
  • Troubleshoot network issues

Audience for this course

The Red Hat Enterprise Linux Diagnostics and Troubleshooting course is aimed at senior system administrators who wish to learn more about troubleshooting.

Prerequisites for this course

Red Hat recommends these prerequisites:

DO380VT – Red Hat OpenShift Administration III: Scaling Deploy[...]

Overview

Course description

Design, build, and test OpenShift HA cluster

Red Hat OpenShift Administration II teaches you how to build robust clusters that provide high availability and the ability to run large numbers of applications. You will learn about OpenShift integration with datacenter infrastructure such as load balancers, identity management, monitoring, proxies, and storage. You will also develop more troubleshooting and Day 2 operations skills in this course.

This course is based on Red Hat® OpenShift Container Platform 3.6.

You will design an OpenShift HA cluster, then build and test it. You will use this cluster to examine more advanced topics in the administration and operation of a robust OpenShift cluster in the remainder of the course.

Course content summary

  • Understand container and OpenShift architecture.
  • Create containerized services.
  • Manage containers and container images.
  • Create custom container images.
  • Deploy containerized applications on Red Hat OpenShift.
  • Deploy multi-container applications.

Audience for this course

This course is designed for Linux® system administrators who want to deploy and manage a large-scale Red Hat® OpenShift Container Platform environment in their datacenters.

Prerequisites for this course

DO425VT – Red Hat Security: Securing Containers and OpenShift


Overview

COURSE DESCRIPTION

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

COURSE CONTENT SUMMARY

  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

AUDIENCE FOR THIS COURSE

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

PREREQUISITES FOR THIS COURSE

RH442 – Red Hat Performance Tuning: Linux in Physical, Virtual[...]

Overview

Course description

Performance tuning and capacity planning for Red Hat Enterprise Linux

Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH422) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

This course is based on Red Hat® Enterprise Linux 8.

Course content summary

  • Analyze and tune for resource-specific scenarios
  • Applying tuning profiles with the tuned tool
  • Tune in virtual environments (hosts and guests)
  • Trace and profile system events and activities
  • Tune resource limits and utilization using systemd-integrated cgroups
  • Gather performance metrics and benchmarking data

Audience for this course

  • Senior Linux system administrators responsible for maximizing resource utilization through performance tuning

Prerequisites for this course

DO425 – Red Hat Security: Securing Containers and OpenShift

Overview

Course description

Learn to mitigate and manage threats to OpenShift container-based infrastructure

Red Hat Security: Securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals learn to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

You will learn about using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropriate security constraints and service role–based access control. You will also find out how existing core Linux technologies—such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

Course content summary

  • Learn Linux multitenancy isolation and least-privilege technologies.
  • Investigate trusted repositories, as well as signing and scanning images.
  • Implement security in a continuous integration and continuous development (CI/CD) pipeline.
  • Integrate web application single sign-on.
  • Automate policy-based deployments.
  • Configure security context constraints (SCC).
  • Manage API access control.
  • Provide secure network I/O.
  • Deliver secure storage I/O.

Audience for this course

This course is designed for professionals responsible for designing, implementing, maintaining, and managing the security of containerized applications on Red Hat Enterprise Linux systems and in Red Hat OpenShift Container Platform installations, including these roles:

  • System administrators
  • IT security administrators
  • IT security engineers
  • DevOps engineers
  • Cloud developers
  • Cloud architects

Prerequisites for this course

DO180 – Red Hat OpenShift Administration I: Operating a Produc[...]

Overview

Course description

Deploy, manage, and troubleshoot containerized applications running as Kubernetes workloads in OpenShift clusters.

  • Red Hat OpenShift Administration I: Managing Containers and Kubernetes (DO180) prepares OpenShift Cluster Administrators to perform day-to-day management of Kubernetes workloads and collaborate with Developers, DevOps Engineers, System Administrators, and SREs to ensure the availability of application workloads. This course focuses on managing typical end-user applications that are often accessible from a web or mobile UI and represent the majority of cloud native and containerized workloads. Management of applications also includes deployment and updating of their dependencies such as databases, messaging, and authentication systems.

    The skills you learn in this course can be applied using all versions of OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and OpenShift Container Platform.

    This course is based on Red Hat® OpenShift® 4.14.
  • Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.

Course content summary

  • Managing OpenShift clusters from the command-line interface and from the web console.
  • Troubleshooting network connectivity between applications inside and outside of an OpenShift cluster.
  • Connecting Kubernetes workloads to storage for application data.
  • Configuring Kubernetes workloads for high availability and reliability.
  • Managing updates to container images, settings, and Kubernetes manifests of an application.

Audience for this course

  • System Administrators and Platform Operators interested in the ongoing management of OpenShift clusters and containerized applications.
  • Site Reliability Engineers interested in the ongoing maintenance and troubleshooting of containerized applications on Kubernetes.
  • System and Software Architects interested in understanding the features and functionality of an OpenShift cluster.

Prerequisites for this course