RHCSS(RedHat Certified Security Specialist) Complete Tutorial
RHCSS FREE TRAINING ON SLASHROOTDOTIN By SATISH TIWARY
This will improve your skills and knowledge To achieve RHCSS all certification:
- Red Hat Enterprise Security: Network Services Expertise exam (EX333)
- Red Hat Enterprise Directory Services and Authentication Expertise exam (EX423)
- Red Hat Enterprise SELinux Policy Administration Expertise exam (EX429)
RHCSS Certifications Syllabus:
RHS333 (Security Modules Focused on linux machines Security Including Servers)
Security for the most commonly deployed services
The threat model and protection methods Training
Internet threat model
the attacker's plan
the attacker's plan
System security and service availability
Information Leakage
Package Filters
Network proxies
Input validation Attack
Local security
Packet Filters
Authentication and Trust
Information Leakage
Package Filters
Network proxies
Input validation Attack
Local security
Packet Filters
Authentication and Trust
An overview of protection mechanisms
service security on A Redhat Linux Machine
SELinux(Security Enhance Linux)
Host-based system security
Firewalls using iptables
TCP wrappers (Plug in Play Security)
xinetd and service limits
Cryptography(Encryption Decryption technology on a REDHAT ENTERPRISE LINUX MACHINE)
Overview of cryptographic techniques
Management of SSL certificates
Using GnuPG
Log Files and Network time synchronization using Logging and NTP:
Time synchronization with NTP
Logging: syslog and its weaknesses
Protecting log servers
DOMAIN NAME SERVICE (BIND and DNS security )
BIND vulnerabilities
DNS security: attacks on DNS
Access control lists
Transaction signatures
Restricting zone transfers and recursive queries
DNS topologies
Bogus servers and black holes
Views
Monitoring and logging
Dynamic DNS security
AAA Model:Network authentication: RPC, NIS, and Kerberos
Vulnerabilities
Network-managed users and account management
RPC and NIS security issues
Improving NIS security
Using Kerberos authentication
Debugging Kerberized services
Kerberos cross-realm trust
Kerberos encryption
Network File System
Overview of NFS versions 2, 3, and 4
Security in NFS versions 2 and 3
Improvements in security in NFS4
Troubleshooting NFS4
Client-side mount options
Secure Shell for Remote connections Securely (OpenSSH)
Vulnerabilities
Server configuration and the SSH protocols
Authentication and access control
Client-side security
Protecting private keys
Port-forwarding and X11-forwarding issues
Electronic mail with Sendmail
Vulnerabilities
Server topologies
Email encryption
Access control and STARTTLS
Anti-spam mechanisms
Postfix
Vulnerabilities
Security and Postfix design
Configuring SASL/TLS
FTP SERVER SECURITY
Vulnerabilities
The FTP protocol and FTP servers
Logging
Anonymous FTP
Access control
Apache Server security
Vulnerabilities
Access control
Authentication: files, passwords, Kerberos
Security implications of common configuration options
CGI security
Server-side includes
suEXEC
Intrusion detection and recovery
Intrusion risks
Security policy
Detecting possible intrusions
Monitoring network traffic and open ports
Detecting modified files
Investigating and verifying detected intrusions
Recovering from, reporting, and documenting intrusions
RH423
Manage and deploy directory services for Red Hat Enterprise Linux systems
What is a directory?
LDAP: models, schema, and attributes
Object classes
LDIF
The LDAP naming model
Directory information trees and Distinguished Names
X.500 and "Internet" naming suffixes
Planning the directory hierarchy
Red Hat Directory Server: basic configuration
Installation and setup of Red Hat® Directory Server
Using the Red Hat console
Using logging to monitor Red Hat Directory Server activity
Backing up and restoring the directory
Basic performance tuning with indexes
Searching and modifying the LDAP directory
Using command-line utilities to search the directory
Search filter syntax
Updating the directory
Red Hat Directory Server: authentication and security
Configuring TLS security
Using access control instructions (ACIs)
ACIs and the Red Hat console
Linux user authentication with NSS and PAM
Understanding authentication and authorization
Name service switch (NSS)
Advanced pluggable authentication modules (PAM) configuration
Centralized user authentication with LDAP
Central account management with LDAP
Using migration scripts to migrate existing data into an LDAP server
LDAP user authentication
Kerberos and LDAP
Introduction to Kerberos
Configuring the Kerberos key distribution center (KDC) and clients
Configuring LDAP to support Kerberos
Directory referrals and replication
Referrals and replication
Single master configuration
Multiple master configuration
Planning for directory server availability
Cross-platform centralized identity management
Synchronizing Red Hat Directory Server with Active Directory
Managing users with Winbind and LDAP
Mapping attributes between Linux® and Microsoft Windows
RH429
Skills required for SELinux policy writing
Introduction to SELinux
Using SELinux
The Red Hat-targeted policy
Introduction to policies
Policy utilities
User and role security
Anatomy of a policy
Manipulating policies
how to take this lesson.
ReplyDeleteI am uploading complete RHCSS Training videos on my Youtube Channel SLASHROOTDOTIN you can learn everything from there for free.
Delete