An IT professional who is earned the Red Hat Certificate of Server Hardening possesses the in depth knowledge, skills and practical abilities to understand the need and implementing them to secure the Red Hat Enterprise Linux systems against unwanted and unauthorized access.


  1. System Administrators who are working over and are responsible for standards and compliant security of Red Hat Enterprise Linux systems.
  2. System administrators who are responsible for security of Red Hat Enterprise Linux systems or who wishes to learn the skills for protecting servers from unwanted threats.
  3. RHCE’s who are willing to earn Red Hat Certified Architecture ( RHCA ).


Candidates should must have the underlying knowledge from Red Hat System Administration – I and Red Hat System Administrator -II with Red Hat Certified Engineer course. 


25 Hours 00 Minutes

16 Lessons


  • Track security updates

          Learning YUM for keeping system up to date.

  • Manage security updates

          Managing and installing security updates using yum.

  • Create a file system

          Allocate an advanced file system and use file system encryption

  • Managing the file system.

          Understand tuning of the filesystem.

  • Manage additional file access controls.

          Modify default permissions and work with ACLs

  • Monitor for file system changes

          Configure software to monitor the files on your machine for changes.

  • Manage user accounts.

         Set password-aging properties for users; audit user accounts.

  • Manage pluggable authentication modules (PAMs)

          Apply changes to PAMs to enforce different types of rules on users.

  • Secure console access

          Adjust properties for various console services to enable or disable settings based on security.

  • Install central authentication

          Install and configure a Red Hat Identity Management server and client.

  • Manage central authentication

          Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted             to users on those systems.

  • Configure system logging.

          Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems.

  • Configure system auditing

          Enable and configure system auditing.

  • Control access to network services

          Enable and configure system auditing.

  • Control access to network services

          Manage firewall rules to limit connectivity to network services.

  • Comprehensive review

          Comprehensive review of RH413.

WhatsApp chat