Red Hat Training
A Red Hat training course is available for Red Hat Enterprise Linux
8.5. Checksums
Red Hat Enterprise Linux now uses the SHA-256 digest algorithm for data verification and authentication in more places than before, upgrading from the cryptographically weaker SHA-1 and MD5 algorithms.