Preface A: Introduction
Section A.1: Red Hat Security: Linux in Physical, Virtual, and Cloud
Section A.2: Orientation to the Classroom Environment
Section A.3: Internationalization
Chapter 1: Managing Security and Risk
Section 1.1: Managing Security and Risk
Section 1.2: Quiz: Managing Security and Risk
Section 1.3: Reviewing Recommended Security Practices
Section 1.4: Guided Exercise: Reviewing Recommended Security Practices
Section 1.5: Lab: Managing Security and Risk
Section 1.6: Summary
Chapter 2: Automating Configuration and Remediation with Ansible
Section 2.1: Configuring Ansible for Security Automation
Section 2.2: Guided Exercise: Configuring Ansible for Security Automation
Section 2.3: Remediating Issues with Ansible Playbooks
Section 2.4: Guided Exercise: Remediating Issues with Ansible Playbooks
Section 2.5: Managing Playbooks with Red Hat Ansible Tower
Section 2.6: Guided Exercise: Managing Playbooks with Red Hat Ansible Tower
Section 2.7: Lab: Automating Configuration and Remediation with Ansible
Section 2.8: Summary
Chapter 3: Protecting Data with LUKS and NBDE
Section 3.1: Managing File System Encryption with LUKS
Section 3.2: Guided Exercise: Managing File System Encryption with LUKS
Section 3.3: Controlling File System Decryption with NBDE
Section 3.4: Guided Exercise: Controlling File System Decryption with NBDE
Section 3.5: Lab: Protecting Data with LUKS and NBDE
Section 3.6: Summary
Chapter 4: Restricting USB Device Access
Section 4.1: Controlling USB Access with USBGuard
Section 4.2: Guided Exercise: Controlling USB access with USBGuard
Section 4.3: Lab: Restricting USB Device Access
Section 4.4: Summary
Chapter 5: Controlling Authentication with PAM
Section 5.1: Auditing the PAM Configuration
Section 5.2: Guided Exercise: Auditing the PAM Configuration
Section 5.3: Modifying the PAM Configuration
Section 5.4: Guided Exercise: Modifying the PAM Configuration
Section 5.5: Configuring Password Quality Requirements
Section 5.6: Guided Exercise: Configuring Password Quality Requirements
Section 5.7: Limiting Access After Failed Logins
Section 5.8: Guided Exercise: Limiting Access After Failed Logins
Section 5.9: Lab: Controlling Authentication with PAM
Section 5.10: Summary
Chapter 6: Recording System Events with Audit
Section 6.1: Configuring Audit to Record System Events
Section 6.2: Guided Exercise: Configuring Audit to Record System Events
Section 6.3: Inspecting Audit Logs
Section 6.4: Guided Exercise: Inspecting Audit Logs
Section 6.5: Writing Custom Audit Rules
Section 6.6: Guided Exercise: Writing Custom Audit Rules
Section 6.7: Enabling Prepackaged Audit Rule Sets
Section 6.8: Guided Exercise: Enabling Prepackaged Audit Rule Sets
Section 6.9: Lab: Recording System Events with Audit
Section 6.10: Summary
Chapter 7: Monitoring File System Changes
Section 7.1: Detecting File System Changes with AIDE
Section 7.2: Guided Exercise: Detecting File System Changes with AIDE
Section 7.3: Investigating File System Changes with AIDE
Section 7.4: Guided Exercise: Investigating File System Changes with AIDE
Section 7.5: Lab: Monitoring File System Changes
Section 7.6: Summary
Chapter 8: Mitigating Risk with SELinux
Section 8.1: Enabling SELinux from the Disabled State
Section 8.2: Guided Exercise: Enabling SELinux from the Disabled State
Section 8.3: Controlling Access with Confined Users
Section 8.4: Guided Exercise: Controlling Access with Confined Users
Section 8.5: Auditing the SELinux Policy
Section 8.6: Guided Exercise: Auditing the SELinux Policy
Section 8.7: Lab: Mitigating Risk with SELinux
Section 8.8: Summary
Chapter 9: Managing Compliance with OpenSCAP
Section 9.1: Installing OpenSCAP
Section 9.2: Guided Exercise: Installing OpenSCAP
Section 9.3: Scanning and Analyzing Compliance
Section 9.4: Guided Exercise: Scanning and Analyzing Compliance
Section 9.5: Customizing OpenSCAP Policy
Section 9.6: Guided Exercise: Customizing OpenSCAP Policy
Section 9.7: Remediating OpenSCAP Issues with Ansible
Section 9.8: Guided Exercise: Remediating OpenSCAP Issues with Ansible
Section 9.9: Lab: Managing Compliance with OpenSCAP
Section 9.10: Summary
Chapter 10: Automating Compliance with Red Hat Satellite
Section 10.1: Configuring Red Hat Satellite for OpenSCAP
Section 10.2: Guided Exercise: Configuring Red Hat Satellite for OpenSCAP
Section 10.3: Scan OpenSCAP Compliance with Red Hat Satellite
Section 10.4: Guided Exercise: Scan OpenSCAP Compliance with Red Hat Satellite
Section 10.5: Customize the OpenSCAP Policy in Red Hat Satellite
Section 10.6: Guided Exercise: Customize OpenSCAP Policy in Red Hat Satellite
Section 10.7: Lab: Automating Compliance with Red Hat Satellite
Section 10.8: Summary
SectionChapter 11: Analyzing and Remediating Issues with Red Hat Insights
SectionSection 11.1: Registering Systems with Red Hat Insights
Section 11.2: Quiz: Registering Systems with Red Hat Insights
Section 11.3: Reviewing Red Hat Insights Reports
Section 11.4: Quiz: Reviewing Red Hat Insights Reports
Section 11.5: Automating Issue Remediation
Section 11.6: Quiz: Automating Issue Remediation
Section 11.7: Summary
Chapter 12: Comprehensive Review
Section 12.1: Comprehensive Review
Section 12.2: Lab: Automating Configuration and Remediation with Ansible
Section 12.3: Lab: Protecting Data with LUKS and NBDE
Section 12.4: Lab: Restricting USB Device Access and Mitigating Risk with SELinux
Section 12.5: Lab: Recording Events, Monitoring File System Changes and Managing Compliance with OpenSCAP