ccna ccnp linux ethical hacking cyber-security Tutorials and Training both classroom and Online Training.Linux,Networking,Ethical Hacking Projects for Final year Engineering Graduates. cisco packet tracer Labs and Projects guide with training and Tutorial.

Home Top Ad

RHCSS(RedHat Certified Security Specialist) Complete Tutorial RHCSS FREE TRAINING ON SLASHROOTDOTIN                By SATISH TIW...

RHCSS FREE TRAINING ON SLASHROOTDOTIN By SATISH TIWARY

RHCSS(RedHat Certified Security Specialist) Complete Tutorial



RHCSS FREE TRAINING ON SLASHROOTDOTIN                By SATISH TIWARY


This will improve your skills and knowledge To achieve RHCSS all certification:





  • Red Hat Enterprise Security: Network Services Expertise exam (EX333)
  • Red Hat Enterprise Directory Services and Authentication Expertise exam (EX423)
  • Red Hat Enterprise SELinux Policy Administration Expertise exam (EX429)



RHCSS Certifications Syllabus:

RHS333 (Security Modules Focused on linux machines Security Including Servers)


Security for the most commonly deployed services


The threat model and protection methods Training

  Internet threat model
  the attacker's plan
  System security and service availability
  Information Leakage
  Package Filters
  Network proxies
  Input validation Attack
   Local security
   Packet Filters
   Authentication and Trust

  An overview of protection mechanisms

 service security on A Redhat Linux Machine

  SELinux(Security Enhance Linux)
  Host-based system security
  Firewalls using  iptables
  TCP wrappers (Plug in Play Security)
   xinetd and service limits

Cryptography(Encryption Decryption technology on a REDHAT ENTERPRISE LINUX MACHINE)

   Overview of cryptographic techniques
   Management of SSL certificates
   Using GnuPG


Log Files and Network time synchronization using Logging and NTP:


   Time synchronization with NTP
   Logging: syslog and its weaknesses
   Protecting log servers


DOMAIN NAME SERVICE (BIND and DNS security )

    BIND vulnerabilities
    DNS security: attacks on DNS
    Access control lists
   Transaction signatures
   Restricting zone transfers and recursive queries
   DNS topologies
   Bogus servers and black holes
   Views
   Monitoring and logging
   Dynamic DNS security

 

AAA Model:Network authentication: RPC, NIS, and Kerberos

    Vulnerabilities
    Network-managed users and account management
    RPC and NIS security issues
    Improving NIS security
    Using Kerberos authentication
    Debugging Kerberized services
    Kerberos cross-realm trust
    Kerberos encryption


Network File System


    Overview of NFS versions 2, 3, and 4
    Security in NFS versions 2 and 3
    Improvements in security in NFS4
    Troubleshooting NFS4
    Client-side mount options

Secure Shell for Remote connections Securely (OpenSSH)


    Vulnerabilities
    Server configuration and the SSH protocols
    Authentication and access control
    Client-side security
    Protecting private keys
    Port-forwarding and X11-forwarding issues

 

Electronic mail with Sendmail

    Vulnerabilities
    Server topologies
    Email encryption
    Access control and STARTTLS
    Anti-spam mechanisms


Postfix
    Vulnerabilities
    Security and Postfix design
    Configuring SASL/TLS



FTP SERVER SECURITY

    Vulnerabilities
    The FTP protocol and FTP servers
    Logging
    Anonymous FTP
    Access control

Apache  Server security

    Vulnerabilities
    Access control
    Authentication: files, passwords, Kerberos
    Security implications of common configuration options
    CGI security
    Server-side includes
    suEXEC


Intrusion detection and recovery

    Intrusion risks
    Security policy
    Detecting possible intrusions
    Monitoring network traffic and open ports
    Detecting modified files
    Investigating and verifying detected intrusions
    Recovering from, reporting, and documenting intrusions


RH423


Manage and deploy directory services for Red Hat Enterprise Linux systems




What is a directory?
   LDAP: models, schema, and attributes
   Object classes
   LDIF



 The LDAP naming model

   Directory information trees and Distinguished Names
   X.500 and "Internet" naming suffixes
   Planning the directory hierarchy


Red Hat Directory Server: basic configuration


   Installation and setup of Red Hat® Directory Server
   Using the Red Hat console
   Using logging to monitor Red Hat Directory Server activity
   Backing up and restoring the directory
   Basic performance tuning with indexes


Searching and modifying the LDAP directory


   Using command-line utilities to search the directory
   Search filter syntax
   Updating the directory


Red Hat Directory Server: authentication and security


Configuring TLS security
Using access control instructions (ACIs)
ACIs and the Red Hat console


Linux user authentication with NSS and PAM

Understanding authentication and authorization
Name service switch (NSS)
Advanced pluggable authentication modules (PAM) configuration


Centralized user authentication with LDAP

Central account management with LDAP
Using migration scripts to migrate existing data into an LDAP server
LDAP user authentication


Kerberos and LDAP

Introduction to Kerberos
Configuring the Kerberos key distribution center (KDC) and clients
Configuring LDAP to support Kerberos


Directory referrals and replication

Referrals and replication
Single master configuration
Multiple master configuration
Planning for directory server availability


Cross-platform centralized identity management

Synchronizing Red Hat Directory Server with Active Directory
Managing users with Winbind and LDAP
Mapping attributes between Linux® and Microsoft Windows


RH429


Skills required for SELinux policy writing


Introduction to SELinux
Using SELinux
The Red Hat-targeted policy
Introduction to policies
Policy utilities
User and role security
Anatomy of a policy
Manipulating policies

2 comments:

  1. Replies
    1. I am uploading complete RHCSS Training videos on my Youtube Channel SLASHROOTDOTIN you can learn everything from there for free.

      Delete

How to connect a host PC to Your Devices in GNS3

Learn How to connect a host PC to Your Devices in GNS3. At the same time also learn Creating PC LoopBack Network Adapter. Actually her...