A Red Hat Certified Specialist in Security: Linux has demonstrated the knowledge, skills, and abilities needed to secure Red Hat® Enterprise Linux® systems and to enforce compliance with security policies.
A Red Hat Certified Specialist in Security: Linux is able to:
- Configure intrusion detection.
- Configure encrypted storage.
- Restrict USB devices.
- Manage PAM authentication.
- Configure system auditing.
- Configure SELinux.
- Use OpenSCAP and other tools to audit security policy compliance.
If you’re a system administrator responsible for managing large enterprise environments or securing your organization’s infrastructure, or if you’re a Red Hat Certified Engineer intent on pursuing the Red Hat Certified Architect (RHCA) credential, you may be interested in becoming a Red Hat Certified Specialist in Security: Linux.
Recommended training for this certification
We recommend this course to help you prepare to earn a Red Hat Certified Specialist in Security: Linux credential:
!Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415)
Exams
!Red Hat Certified Specialist in Security: Linux Exam (EX415)
An IT professional who passes this exam will earn a Red Hat Certified Specialist endorsement that also counts toward earning the RHCA credential.