Red Hat Enterprise SELinux Policy Administration

Level:
Costs:
Total time:
Provider rating: 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)
Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course Red Hat Enterprise SELinux Policy Administration at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
4 Days
Location type:
Open

vat information, completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

RHS429 requires RHCE-level skills. Prerequisite skills can be shown by passing the RHCE Exam in either RH302 or RH300, or by taking RH253 or by possessing comparable skills and knowledge.

Course Description:

RHS429 introduces advanced system administrators, security administrators, and applications programmers to SELinux policy writing. Participants in this course will learn how SELinux works; how to manage SELinux; and how to write an SELinux policy. This class culiminates in a major project to scope out and then write policies for previously unprotected services.

This course includes the following modules:

Introduction to SELinux

  • Discretionary Access Control vs. Mandatory Access …

Read the complete description

Description

Prerequisites:

RHS429 requires RHCE-level skills. Prerequisite skills can be shown by passing the RHCE Exam in either RH302 or RH300, or by taking RH253 or by possessing comparable skills and knowledge.

Course Description:

RHS429 introduces advanced system administrators, security administrators, and applications programmers to SELinux policy writing. Participants in this course will learn how SELinux works; how to manage SELinux; and how to write an SELinux policy. This class culiminates in a major project to scope out and then write policies for previously unprotected services.

This course includes the following modules:

Introduction to SELinux

  • Discretionary Access Control vs. Mandatory Access Control
  • SELinux History and Architecture Overview
  • Elements of the SELinux security model (user identity and role, domain and type, sensitivity and categories, security context)
  • SELinux Policy and Red Hat?ᨕs Targeted Policy
  • Configuring Policy with Booleans
  • Archiving
  • Setting and Displaying Extended Attributes
  • Hands-on Lab: Understanding SELinux

Using SELinux

  • Controlling SELinux
  • File Contexts
  • Relabeling Files and Filesystems
  • Mount options
  • Hand-on Lab: Working with SELinux

The Red Hat Targeted Policy

  • Identifying and Toggling Protected Services
  • Apache Security Contexts and Configuration Booleans
  • Name Service Contexts and Configuration Booleans
  • NIS Client Contexts
  • Other Services
  • File Context for Special Directory Trees
  • Troubleshooting and avc Denial Messages
  • setroubleshootd and Logging
  • Hands-on Lab: Understanding and Troubleshooting the Red Hat Targeted Policy

Introduction to Policies

  • Policy Overview and Organization
  • Compiling and Loading the Monolithic Policy and Policy Modules
  • Policy Type Enforcement Module Syntax
  • Object Classes
  • Domain Transition
  • Hands-on Lab: Understanding policies

Policy Utilities

  • Tools available for manipulating and analyzing policies
  • Hands-on Lab: Exploring Utilities

User and Role Security

  • Role-based Access Control
  • Multi Category Security
  • Defining a Security Administrator
  • Multi-Level Security
  • The strict Policy
  • User Identification and Declaration
  • Role Identification and Declaration
  • Roles in Use in Transitions
  • Role Dominance
  • Hands-on Lab: Implementing User and Role Based Policy Restrictions

Anatomy of a Policy

  • Policy Macros
  • Type Attributes and Aliases
  • Type Transitions
  • When and How do Files Get Labeled
  • restorecond
  • Customizable Types
  • Hands-on Lab: Building Policies

Manipulating Policies

  • Installing and Compiling Policies
  • The Policy Language
  • Access Vector
  • SELinux logs
  • Security Identifiers - SIDs
  • Filesystem Labeling Behavior
  • Context on Network Objects
  • Creating and Using New Booleans
  • Manipulating Policy by Example
  • Macros
  • Enableaudit
  • Hands-on Lab: Compiling Policies

Project

  • Best practices
  • Create File Contexts, Types and Typealiases
  • Edit and Create Network Contexts
  • Edit and Create Domains
  • Hands-on Lab: Editing and Writing Policy

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

More courses within this subject:

Compare 36,062 training courses in subjects like Red Hat Enterprise

Subscribe to our newsletter?

Receive news, tips, articles, interviews and education on personal development each month.

Sign up to create your own Learning Lists.

Not for humans