Red Hat Training

A Red Hat training course is available for Red Hat Enterprise Linux

8.5. Checksums

Red Hat Enterprise Linux now uses the SHA-256 digest algorithm for data verification and authentication in more places than before, upgrading from the cryptographically weaker SHA-1 and MD5 algorithms.