Table of contents
Course Introduction
10m 45s
Lock icon
An Important Note About A Cloud Guru and Linux Academy Courses | 1m 19s
Lock icon
About the Author | 1m 11s
Lock icon
About the Course | 3m 46s
Lock icon
Course Features | 4m 29s
System Auditing
2h 13m 58s
Lock icon
Introduction to System Auditing | 11m 36s
Lock icon
Defining Audit Rules and Creating Audit Reports | 17m 22s
Lock icon
Configuring Audit Settings on Red HatConfiguring Audit Settings on Red Hat | 30m
Lock icon
Configuring Audit Settings for STIG Compliance on Red HatConfiguring Audit Settings for STIG Compliance on Red Hat | 30m
Lock icon
Security Auditing and AutomationSecurity Auditing and Automation | 45m
OpenSCAP
1h 51m 27s
Lock icon
All About OpenSCAP | 12m 38s
Lock icon
OSCAP with Red Hat Satellite and Insights | 7m 58s
Lock icon
Connecting to a Linux Lab Server with VNC | 51s
Lock icon
Run an OpenSCAP Compliance Scan on a HostRun an OpenSCAP Compliance Scan on a Host | 30m
Lock icon
Create a Custom Scan Policy with OpenSCAPCreate a Custom Scan Policy with OpenSCAP | 30m
Lock icon
Performing a Compliance Scan and Active Remediation Using OSCAPPerforming a Compliance Scan and Active Remediation Using OSCAP | 30m
Ansible
1h 57m 53s
Lock icon
Introduction to Ansible and Its Parts | 13m 9s
Lock icon
Installing Ansible and Managing SSH Keys | 14m 44s
Lock icon
Getting Started with AnsibleGetting Started with Ansible | 30m
Lock icon
Ansible Playbooks: The BasicsAnsible Playbooks: The Basics | 1h 0m
AIDE (Advanced Intrusion Detection Environment)
1h 5m 43s
Lock icon
Installing and Configuring AIDE | 12m 36s
Lock icon
Tuning AIDE Functionality | 8m 7s
Lock icon
Installing and Configuring AIDEInstalling and Configuring AIDE | 30m
Lock icon
Intrusion DetectionIntrusion Detection | 15m
AIDE Scenarios
5m 9s
Lock icon
AIDE Scenarios | 5m 9s
Securing SSH
43m 13s
Lock icon
Managing SSH Access | 6m 23s
Lock icon
Working with SSH Keys and Settings | 6m 50s
Lock icon
Managing SSH AccessManaging SSH Access | 30m
USB Device Restrictions
1h 19m 20s
Lock icon
Installing and Configuring USBGuard | 9m 47s
Lock icon
USBGuard Policies and Settings | 9m 33s
Lock icon
Installing and Configuring USBGuardInstalling and Configuring USBGuard | 30m
Lock icon
Creating USBGuard RulesCreating USBGuard Rules | 30m
Pluggable Authentication Module (PAM) Policies
1h 25m 20s
Lock icon
Introduction to PAM | 4m 59s
Lock icon
Creating Account Lockout Policies | 11m 1s
Lock icon
Creating Password Policies | 9m 20s
Lock icon
Configure an Account Lockout PolicyConfigure an Account Lockout Policy | 30m
Lock icon
Configure a Password Complexity PolicyConfigure a Password Complexity Policy | 30m
Managing sudo
39m 9s
Lock icon
Controlling sudo Access | 4m 39s
Lock icon
Locking Down sudo | 4m 30s
Lock icon
Managing sudo AccessManaging sudo Access | 30m
Linux Unified Key Setup (LUKS)
2h 16m 46s
Lock icon
Linux Storage Review | 4m 47s
Lock icon
Introduction to LUKS | 5m 20s
Lock icon
The LUKS Encryption Process | 13m 20s
Lock icon
Mounting LUKS Volumes at Boot | 4m 26s
Lock icon
LUKS Volume Management | 13m 15s
Lock icon
LUKS Scenarios and Review | 5m 38s
Lock icon
Creating a New Encrypted Volume Using LUKSCreating a New Encrypted Volume Using LUKS | 30m
Lock icon
Changing a LUKS PassphraseChanging a LUKS Passphrase | 30m
Lock icon
Creating a Secondary LUKS Passphrase and LUKS Header BackupCreating a Secondary LUKS Passphrase and LUKS Header Backup | 30m
Network-Bound Disk Encryption (NBDE)
45m 55s
Lock icon
Introduction to NBDE | 3m 43s
Lock icon
Configuring NBDE Servers | 4m 14s
Lock icon
Configuring NBDE Clients | 5m 8s
Lock icon
NBDE Key Management | 2m 50s
Lock icon
Encrypting a Volume with NBDEEncrypting a Volume with NBDE | 30m
Security-Enhanced Linux
3h 10m 15s
Lock icon
Introduction to SELinux | 8m 50s
Lock icon
Policies and Labels | 10m 55s
Lock icon
Type Enforcement and Managing Labels | 6m 56s
Lock icon
Booleans | 9m 27s
Lock icon
Troubleshooting SELinux | 6m 41s
Lock icon
Confined Users, Booleans, and sudo | 17m 9s
Lock icon
Confined Users Review | 4m 10s
Lock icon
SELinux Scenario | 6m 7s
Lock icon
Configuring SELinuxConfiguring SELinux | 30m
Lock icon
Creating Confined Users in SELinuxCreating Confined Users in SELinux | 30m
Lock icon
Troubleshooting SELinuxTroubleshooting SELinux | 30m
Lock icon
Granting `sudo` Privileges to Confined UsersGranting `sudo` Privileges to Confined Users | 30m
Next Steps
2h 7m 34s
Lock icon
How to Prepare for the Exam | 5m 9s
Lock icon
What's Next After Certification | 2m 25s
Lock icon
Red Hat Certified Specialist in Security (EX415) Practice ExamRed Hat Certified Specialist in Security (EX415) Practice Exam | 2h 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon