Red Hat Training
A Red Hat training course is available for Red Hat Enterprise Linux
Security Guide
Red Hat Enterprise Linux 7
Concepts and techniques to secure RHEL servers and workstations
Stephen Wadeley
Red Hat Customer Content Services
Robert Krátký
Red Hat Customer Content Services
Martin Prpič
Red Hat Customer Content Services
Ioanna Gkioka
Red Hat Customer Content Services
Tomáš Čapek
Red Hat Customer Content Services
Yoana Ruseva
Red Hat Customer Content Services
Miroslav Svoboda
Red Hat Customer Content Services
Abstract
This book assists users and administrators in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity.
Focused on Red Hat Enterprise Linux but detailing concepts and techniques valid for all Linux systems, this guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home.
With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods.