A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Red Hat Enterprise Linux Security Technologies Lab - Lucy Kerner and Roy Williams SecureWV/Hack3rcon 2018 (Hacking Illustrated Series InfoSec Tutorial Videos)

Red Hat Enterprise Linux Security Technologies Lab
Lucy Kerner and Roy Williams
SecureWV/Hack3rcon 2018

In this lab, you'll learn about the built-in security technologies in Red Hat Enterprise Linux. Specifically, you will use OpenSCAP to scan and remediate against vulnerabilities and configuration security baselines. You will then block possible attacks from vulnerabilities using Security Enhanced Linux (SELinux) and use Network Bound Disk Encryption to securely decrypt your encrypted boot volumes unattended. You will also use USBGuard to implement basic whitelisting and blacklisting to define which USB devices are and are not authorized and how a USB device may interact with your system. You will also learn how to deploy opportunistic IPsec to encrypt all host to host communication within an enterprise network. Throughout your investigation of the security issues in your systems, you will utilize the improved audit logs and learn how to use the Audit Intrusion Detection Environment (AIDE). You will also learn how to create a single sign-on environment for all your linux servers using Red Hat Identity Management and learn about GNU Privacy Guard (GPG) which can be used to identify yourself and encrypt your communications. You will also have a chance to learn how to use firewalld to dynamically manage firewall rules. Finally, you will make multiple configuration changes to your systems across different versions of Red Hat Enterprise Linux running in your environment, in an automated fashion using Red Hat Ansible Automation, using the Systems Roles feature. If you want to participate in the hands on lab, please be sure to bring a laptop to the event with a SSH client and web browser (Firefox with plugins disabled recommended).

Lucy Kerner is currently the Security Global Technical Evangelist and Strategist at Red Hat and helps drive security thought leadership and the global go-to-market strategy for security across the entire Red Hat portfolio. Lucy creates and delivers security related technical content to the field, customers, and partners and has spoken at numerous internal and external events and is a 2018, 2017, and 2016 Red Hat Summit Top Presenter. Prior to her current role, she was a Senior Cloud Solutions Architect for the North America Public Sector team at Red Hat. Lucy has over 15 years of professional experience as both a software and hardware development engineer and a pre-sales solutions architect. Prior to joining Red Hat, she worked at IBM as both a Mainframe microprocessor design engineer and a pre-sales solutions architect for IBM x86 servers. She has also interned at Apple, Cadence, Lockheed Martin, and MITRE, where she worked on both software and hardware development. Lucy graduated from Carnegie Mellon University with an M.S. and B.S. in Electrical and Computer Engineering and a minor in Spanish. Roy Williams is a Senior Consultant and Red Hat Certified Professional that has been with Red Hat since March of 2016. His main focus on client engagements has been around our Platform technologies, such as Satellite and Red Hat Enterprise Linux (RHEL). Roy is also known for his knowledge of, and passion for RHEL Identity Management (IdM). Additionally, Roy is a contributor to the Red Hat Services Speak blog. Outside of Red Hat, Roy is a Husband, a Father, an open source contributor (chopskxw), a Firefighter/EMT, a Fire Service Instructor, and an amateur radio operator (KD8VYO).

Back to SecureWV 2017 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast