SELinux

Red Hat Enterprise Linux    |    Intermediate
  • 12 videos | 1h 11m 19s
  • Earns a Badge
Rating 4.6 of 118 users Rating 4.6 of 118 users (118)
Security is always a concern when deploying, altering, or maintaining any system, including Linux. Explore Security-Enhanced Linux (SELinux) and how to use it to secure a running Linux system.

WHAT YOU WILL LEARN

  • Identify and recognize the components and purpose of selinux
    Configure and choose the applicable selinux mode
    Configure selinux settings
    Identify and recognize the components and purpose of selinux user contexts
    Use and apply a selinux process context
    Use restorecon to restore file security contexts
  • Identify role-based access controls (rbac) in selinux
    Identify and choose selinux policies
    Configure and control selinux policies
    Add a new policy rule to be enforced
    Identify and troubleshoot a reported policy violation
    Use selinux to secure a network service

IN THIS COURSE

  • 7m 29s
    During this video, you will learn how to identify and recognize the components and purpose of SELinux. FREE ACCESS
  • 5m 42s
    In this video, you will configure and choose the applicable SELinux mode. FREE ACCESS
  • Locked
    3.  Configuring SELinux Settings
    4m 3s
    In this video, you will learn how to configure SELinux settings. FREE ACCESS
  • Locked
    4.  Using SELinux User Contexts
    8m 1s
    During this video, you will learn how to identify and recognize the components and purpose of SELinux user contexts. FREE ACCESS
  • Locked
    5.  Using SELinux Process Contexts
    7m 59s
    In this video, you will learn how to use and apply a SELinux process context. FREE ACCESS
  • Locked
    6.  Restoring SELinux Contexts
    7m 14s
    To restore file security contexts, use the restorecon command. FREE ACCESS
  • Locked
    7.  Using SELinux Roles
    5m 35s
    In this video, you will learn about role-based access controls (RBAC) in SELinux. FREE ACCESS
  • Locked
    8.  Recognizing and Identifying SELinux Policies
    5m 13s
    In this video, you will learn how to identify and choose SELinux policies. FREE ACCESS
  • Locked
    9.  Configuring an SELinux Policy
    5m 12s
    Learn how to configure and control SELinux policies. FREE ACCESS
  • Locked
    10.  Adding a Rule to a Policy
    5m 28s
    Find out how to add a new policy rule to be enforced. FREE ACCESS
  • Locked
    11.  Dealing with a SELinux Policy Violation
    4m 32s
    In this video, you will learn how to identify and troubleshoot a policy violation that has been reported. FREE ACCESS
  • Locked
    12.  Using SELinux to Secure a Network Service
    4m 50s
    During this video, you will learn how to use SELinux to secure a network service. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 168 users Rating 4.6 of 168 users (168)
Journey OS Exploits
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.2 of 19 users Rating 4.2 of 19 users (19)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 354 users Rating 4.5 of 354 users (354)
Rating 4.4 of 110 users Rating 4.4 of 110 users (110)
Rating 4.2 of 19 users Rating 4.2 of 19 users (19)