• Online, Self-Paced
Course Description

Security is of paramount concern to any System Administrator and must always be considered when deploying, altering, or maintaining any system, including Linux. This course will introduce you to SELinux and how to use it to secure a running Linux system. In this course you will also cover some common troubleshooting skills that every System Administrator should know in order to maintain a well working Linux system. This course is one of a series in the Skillsoft learning path that covers the objectives for the Red Hat Enterprise Linux 7 RHCSA exam (EX200).

Learning Objectives

SELinux

  • start the course
  • identify and recognize the components and purpose of SELinux
  • configure and choose the applicable SELinux Mode
  • configure SELinux settings
  • identify and recognize the components and purpose of SELinux User contexts
  • use and apply a SELinux Process context
  • use restorecon to restore file security contexts
  • identify role-based access controls (RBAC) in SELinux

Advanced SELinux

  • identify and choose SELinux Policies
  • configure and control SELinux Policies
  • add a new policy rule to be enforced
  • identify and troubleshoot a reported policy violation
  • use SELinux to secure a Network Service

Memory/Process and Permission Troubleshooting

  • troubleshoot common memory issues
  • troubleshoot CPU or Memory intensive processes
  • identify and diagnose file permission issues
  • troubleshoot common file permission security issues

Troubleshooting I/O and Filesystem Issues

  • troubleshoot common network issues
  • identify locked files or files used by a process
  • troubleshoot and repair the XFS file system
  • describe the basic tools for repairing a variety of file systems
  • debug the XFS file system
  • troubleshoot a drive that has failed in either a hot-swap or raid configuration
  • troubleshoot using the Red Hat Rescue Environment

Practice: Troubleshooting and Securing RHEL 7

  • use SELinux to protect a network service and find the processes using the most memory or CPU resources

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.