This is an intensive course of instruction & labs on cross-platform integration of directory services to provide authentication
...RH423 Red Hat Enterprise Directory Services & Authentication is an intensive course that provides four days of instruction & labs
...For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they
...Red Hat Enterprise Linux has gained considerable momentum as the Operating System of choice for deploying network services such
...Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such
...RHS429 introduces advanced system administrators, security administrators, & applications programmers to SELinux policy writing.
...RH442 is designed to teach the methodology of performance tuning & capacity planning for Red Hat Enterprise Linux. This class
...Red Hat Enterprise System Monitoring & Performance Tuning is an advanced 4-day hands-on lab course covering system architecture,
...The Advanced JBoss Administration (JB346) class is designed for experienced system administrators responsible for deploying
...In this course you will learn how to configure common Red Hat Linux network services. Network & local security tasks are also
...RHS429 introduces advanced system administrators, security administrators, and applications programmers to SELinux policy writing. Participants in this course will learn how SELinux works; how to manage SELinux; and how to write an SELinux policy.
RHS429 introduces advanced system administrators, security administrators, & applications programmers to SELinux policy writing. Participants in this course will learn how SELinux works; how to manage SELinux; & how to write an SELinux policy. This class culiminates in a major project to scope out & then write policies for previously unprotected services.
RHS429 provides a four day tutorial on SELinux & SELinux policy writing. The first day of the course provides a introduction to SELinux, how it operates within the Red Hat targeted policy, & the tools used to manipulate it. The class then will spend the remaining days learning how policies are written, compiled, & debugged.
This culminates in a project in which participants will create a set of policies from scratch for a previously unprotected service. The class will analyze the service, determining its security needs; design & implement a set of policies; test & fix the policies; document the service's new policies so that others can effectively administer the service.
This training may be available onsite; please contact us if you are interested.