Preface A: Introduction
Section A.1: Red Hat Security: Linux in Physical, Virtual, and Cloud
Section A.2: Orientation to the Classroom Environment
Section A.3: Performing Lab Exercises
Chapter 1: Managing Security and Risk
Section 1.1: Managing Security and Risk
Section 1.2: Quiz: Managing Security and Risk
Section 1.3: Managing RHEL Security with Red Hat Errata
Section 1.4: Guided Exercise: Managing RHEL Security with Red Hat Errata
Section 1.5: Reviewing Recommended Security Practices
Section 1.6: Guided Exercise: Implementing Recommended Security Practices
Section 1.7: Lab: Managing Security and Risk
Section 1.8: Summary
Chapter 2: Automating Configuration and Remediation with Ansible
Section 2.1: Configuring Ansible for Security Automation
Section 2.2: Guided Exercise: Configuring Ansible for Security Automation
Section 2.3: Managing Playbooks with Automation Controller
Section 2.4: Guided Exercise: Managing Playbooks with Automation Controller
Section 2.5: Lab: Automating Configuration and Remediation with Ansible
Section 2.6: Summary
Chapter 3: Protecting Data with LUKS and NBDE
Section 3.1: Managing Storage Device Encryption with LUKS
Section 3.2: Guided Exercise: Managing Storage Device Encryption with LUKS
Section 3.3: Automating Storage Device Decryption with NBDE
Section 3.4: Guided Exercise: Automating Storage Device Decryption with NBDE
Section 3.5: Lab: Protecting Data with LUKS and NBDE
Section 3.6: Summary
Chapter 4: Restricting USB Device Access
Section 4.1: Controlling USB Access with USBGuard
Section 4.2: Guided Exercise: Controlling USB access with USBGuard
Section 4.3: Lab: Restricting USB Device Access
Section 4.4: Summary
Chapter 5: Controlling Authentication with PAM
Section 5.1: Selecting the PAM Configuration
Section 5.2: Guided Exercise: Selecting the PAM Configuration
Section 5.3: Configuring Password Quality Requirements
Section 5.4: Guided Exercise: Configuring Password Quality Requirements
Section 5.5: Limiting Access after Failed Logins
Section 5.6: Guided Exercise: Limiting Access after Failed Logins
Section 5.7: Lab: Controlling Authentication with PAM
SectionSection 5.8: Summary
Chapter 6: Recording System Events with Audit
Section 6.1: Configuring Audit to Record System Events
Section 6.2: Guided Exercise: Configuring Audit to Record System Events
Section 6.3: Inspecting Audit Logs
Section 6.4: Guided Exercise: Inspecting Audit Logs
Section 6.5: Writing Custom Audit Rules
Section 6.6: Guided Exercise: Writing Custom Audit Rules
Section 6.7: Enabling Prepackaged Audit Rule Sets
Section 6.8: Guided Exercise: Enabling Prepackaged Audit Rule Sets
Section 6.9: Lab: Recording System Events with Audit
Section 6.10: Summary
Chapter 7: Monitoring File-system Changes
Section 7.1: Detecting File-system Changes with AIDE
Section 7.2: Guided Exercise: Detecting File-system Changes with AIDE
Section 7.3: Investigating File-system Changes with AIDE
Section 7.4: Guided Exercise: Investigating File-system Changes with AIDE
Section 7.5: Lab: Monitoring File-system Changes
Section 7.6: Summary
Chapter 8: Mitigating Risk with SELinux
Section 8.1: Enabling SELinux from the Disabled State
Section 8.2: Guided Exercise: Enabling SELinux from the Disabled State
Section 8.3: Controlling Access with Confined Users
Section 8.4: Guided Exercise: Controlling Access with Confined Users
Section 8.5: Auditing the SELinux Policy
Section 8.6: Guided Exercise: Auditing the SELinux Policy
Section 8.7: Lab: Mitigating Risk with SELinux
Section 8.8: Summary
Chapter 9: Managing Compliance with OpenSCAP
Section 9.1: Installing OpenSCAP
Section 9.2: Guided Exercise: Installing OpenSCAP
Section 9.3: Scanning and Analyzing Compliance
Section 9.4: Guided Exercise: Scanning and Analyzing Compliance
Section 9.5: Customizing OpenSCAP Policy
Section 9.6: Guided Exercise: Customizing OpenSCAP Policy
Section 9.7: Remediating OpenSCAP Issues with Ansible
Section 9.8: Guided Exercise: Remediating OpenSCAP Issues with Ansible
Section 9.9: Lab: Managing Compliance with OpenSCAP
Section 9.10: Summary
Chapter 10: Analyzing and Remediating Issues with Red Hat Insights
Section 10.1: Red Hat Insights and Security
Section 10.2: Guided Exercise: Registering Systems with Red Hat Insights
Section 10.3: Creating and Reviewing Red Hat Insights Reports
Section 10.4: Guided Exercise: Creating and Reviewing Red Hat Insights Reports
Section 10.5: Running OpenSCAP Reports from Red Hat Insights
Section 10.6: Guided Exercise: Running OpenSCAP Reports from Red Hat Insights
Section 10.7: Integrating Red Hat Insights and Automation Controller
Section 10.8: Guided Exercise: Integrating Red Hat Insights and Automation Controller
Section 10.9: Summary
Chapter 11: Automating Compliance with Red Hat Satellite
Section 11.1: Configuring Red Hat Satellite for OpenSCAP
Section 11.2: Guided Exercise: Configuring Red Hat Satellite for OpenSCAP
Section 11.3: Scan OpenSCAP Compliance with Red Hat Satellite
Section 11.4: Guided Exercise: Scan OpenSCAP Compliance with Red Hat Satellite
Section 11.5: Customize the OpenSCAP Policy in Red Hat Satellite
Section 11.6: Guided Exercise: Customize OpenSCAP Policy in Red Hat Satellite
Section 11.7: Lab: Automating Compliance with Red Hat Satellite
Section 11.8: Summary
Chapter 12: Comprehensive Review
Section 12.1: Comprehensive Review
Section 12.2: Lab: Protecting Data with LUKS and NBDE
Section 12.3: Lab: Restricting USB Device Access
Section 12.4: Lab: Recording Events and Monitoring File-system Changes with PAM, Audit, and AIDE
Section 12.5: Lab: Mitigating Risk with SELinux
Section 12.6: Lab: Managing Compliance with OpenSCAP and Ansible