Description
Size: 1.14 GB
$7.00
Linux runs the majority of infrastructure today, and Red Hat is one of the most popular distributions. With the daily news of attacks, breaches and vulnerabilities, securing Red Hat infrastructure is a vital task essential to know for every system administrator.
As you transition through the course, you will learn technologies that are key to securing any infrastructure. These technologies include but are not limited to intrusion detection, encryption of storage, security policies and auditing. You will learn to think of security as a requirement that should come by nature and not an afterthought. Even though the course utilizes Red Hat, the concept’s scale to all other Linux distributions.
This course takes a hands-on approach to give the best and most modern practices to protect your machines regardless of where they are running. At the end of this course, the security professional will be able to confidently secure, audit and automate Linux systems to avoid security flaws that can cost companies a lot.
Size: 1.14 GB