RHS333 Red Hat Enterprise Security

June 10, 2016 | Author: IT2000 | Category: Types, Articles & News Stories
Share Embed Donate


Short Description

d...

Description

RHS333 Red Hat Enterprise Security: Network Services Course Outline RHS333 goes beyond the essential security coverage offered in the RHCE curriculum and delves deeper into the security features, capabilities, and risks associated with the most commonly deployed services. Among the topics covered in this four-day, hands-on course are the following: 1. The Threat Model and Protection Methods o Internet threat model and the attacker's plan o System security and service availability o An overview of protection mechanisms 2. Basic Service Security o SELinux o Host-based access control o Firewalls using Netfilter and iptables o TCP wrappers o xinetd and service limits 3. Cryptography o Overview of cryptographic techniques o Management of SSL certificates o Using GnuPG 4. Logging and NTP o Time synchronization with NTP o Logging: syslog and its weaknesses o Protecting log servers 5. BIND and DNS Security o BIND vulnerabilities o DNS Security: attacks on DNS o Access control lists o Transaction signatures o Restricting zone transfers and recursive queries o DNS Topologies o Bogus servers and blackholes o Views o Monitoring and logging o Dynamic DNS security 6. Network Authentication: RPC, NIS, and Kerberos o Vulnerabilities o Network-managed users and account management o RPC and NIS security issues o Improving NIS security o Using Kerberos authentication o Debugging Kerberized Services o Kerberos Cross-Realm Trust o Kerberos Encryption 7. Network File System

Overview of NFS versions 2, 3, and 4 Security in NFS versions 2 and 3 Improvements in security in NFS4 Troubleshooting NFS4 Client-side mount options 8. OpenSSH o Vulnerabilities o Server configuration and the SSH protocols o Authentication and access control o Client-side security o Protecting private keys o Port-forwarding and X11-forwarding issues 9. Electronic Mail with Sendmail o Vulnerabilities o Server topologies o Email encryption o Access control and STARTTLS o Anti-spam mechanisms 10. Postfix o Vulnerabilities o Security and Postfix design o Configuring SASL/TLS 11. FTP o Vulnerabilities o The FTP protocol and FTP servers o Logging o Anonymous FTP o Access control 12. Apache security o Vulnerabilities o Access control o Authentication: files, passwords, Kerberos o Security implications of common configuration options o CGI security o Server side includes o suEXEC 13. Intrusion Detection and Recovery o Intrusion risks o Security policy o Detecting possible intrusions o Monitoring network traffic and open ports o Detecting modified files o Investigating and verifying detected intrusions o Recovering from, reporting, and documenting intrusions o o o o o

RH423 Red Hat Enterprise Directory Services and Authentication Course Outline 1. Introduction to Directory Services o What is a directory? o LDAP: models, schema, and attributes o Object classes o LDIF 2. The LDAP Naming Model o Directory information trees and Distingued Names o X.500 and "Internet" naming suffixes o Planning the directory hierarchy 3. Red Hat Directory Server: Basic Configuration o Installation and setup of Red Hat Directory Server o Using the Red Hat Console o Using logging to monitor Red Hat Directory Server activity o Backing up and restoring the directory o Basic performance tuning with indexes 4. Searching and Modifying the LDAP Directory o Using command line utilities to search the directory o Search filter syntax o Updating the directory 5. Red Hat Directory Server: Authentication and Security o Configuring TLS security o Using access control instructions (ACI's) o ACI's and the Red Hat Console 6. Linux User Authentication with NSS and PAM o Understanding authentication and authorization o Name service switch (NSS) o Advanced pluggable authentication modules (PAM) configuration 7. Centralized User Authentication with LDAP o Central account management with LDAP o Using migration scripts to migrate existing data into an LDAP server o LDAP user authentication 8. Kerberos and LDAP o Introduction to Kerberos o Configuring the Kerberos key distribution center (KDC) and clients o Configuring LDAP to support Kerberos 9. Directory Referrals and Replication o Referrals and replication o Single master configuration o Multiple master configuration o Planning for directory server availability 10. Cross-Platform Centralized Identity Management

Synchronizing Red Hat Directory Server with Active Directory Managing users with Winbind and LDAP Mapping attributes between Linux and Windows 11. Red Hat Enterprise IPA o Understanding IPA o IPA requirements o Configuring IPA server o Configuring IPA clients o o o

RHS429 Red Hat Enterprise SELinux Policy Administration Course Outline Unit 1 - Introduction to SELinux • • •

• • • • •

Discretionary Access Control vs. Mandatory Access Control SELinux History and Architecture Overview Elements of the SELinux security model: o user identity and role o domain and type o sensitivity and categories o security context SELinux Policy and Red Hat's Targeted Policy Configuring Policy with Booleans Archiving Setting and Displaying Extended Attributes Hands-on Lab: Understanding SELinux

Unit 2 - Using SELinux • • • • •

Controlling SELinux File Contexts Relabeling Files and Filesystems Mount options Hand-on Lab: Working with SELinux

Unit 3 - The Red Hat Targeted Policy • • • • • •

Identifying and Toggling Protected Services Apache Security Contexts and Configuration Booleans Name Service Contexts and Configuration Booleans NIS Client Contexts Other Services File Context for Special Directory Trees

• • •

Troubleshooting and avc Denial Messages setroubleshootd and Logging Hands-on Lab: Understanding and Troubleshooting the Red Hat Targeted Policy

Unit 4 - Introduction to Policies • • • • • •

Policy Overview and Organization Compiling and Loading the Monolithic Policy and Policy Modules Policy Type Enforcement Module Syntax Object Classes Domain Transition Hands-on Lab: Understanding policies

Unit 5 - Policy Utilities •



Tools available for manipulating and analyzing policies o apol o seaudit and seaudit_report o checkpolicy o sepcut o sesearch o sestatus o audit2allow and audit2why o sealert o avcstat o seinfo o semanage and semodule o Man pages Hands-on Lab: Exploring Utilities

Unit 6 - User and Role Security • • • • • • • • • •

Role-based Access Control Multi Category Security Defining a Security Administrator Multi-Level Security The strict Policy User Identification and Declaration Role Identification and Declaration Roles in Use in Transitions Role Dominance Hands-on Lab: Implementing User and Role Based Policy Restrictions

Unit 7 - Anatomy of a Policy • • • •

Policy Macros Type Attributes and Aliases Type Transitions When and How do Files Get Labeled

• • •

restorecond Customizable Types Hands-on Lab: Building Policies

Unit 8 - Manipulating Policies • • • • • • • • • • • •

Installing and Compiling Policies The Policy Language Access Vector SELinux logs Security Identifiers - SIDs Filesystem Labeling Behavior Context on Network Objects Creating and Using New Booleans Manipulating Policy by Example Macros Enableaudit Hands-on Lab: Compiling Policies

Unit 9 - Project • • • • •

Best practices Create File Contexts, Types and Typealiases Edit and Create Network Contexts Edit and Create Domains Hands-on Lab: Editing and Writing Policy

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF