Linux Security - SELinux and auditd (English)
placeNieuwegein 9 mrt. 2026Toon rooster event 9 maart 2026, 08:45-16:00, Nieuwegein, Day 1 |
placeNieuwegein 11 jun. 2026Toon rooster event 11 juni 2026, 08:45-16:00, Nieuwegein, Day 1 |
Lesmethode :
Klassikaal
Algemeen :
SELinux, Security Enhanced Linux, is an additional security layer for Linux and is standard on Enterprise Linux variants such as Red Hat Enterprise Linux, AlmaLinux, RockyLinux, and OracleLinux. For many administrators, SELinux can be a challenging security measure to implement and is often wrongly disabled. With increased cyber threats, actively using SELinux is recommended and is often required by organizational security policies.
In this course, the basic concepts of SELinux are explained, and it is discussed how SELinux can be correctly configured and used in the standard, daily practice. To be able to solve SELinux-related problems, the course also de…
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Lesmethode :
Klassikaal
Algemeen :
SELinux, Security Enhanced Linux, is an additional security
layer for Linux and is standard on Enterprise Linux variants such
as Red Hat Enterprise Linux, AlmaLinux, RockyLinux, and
OracleLinux. For many administrators, SELinux can be a challenging
security measure to implement and is often wrongly disabled. With
increased cyber threats, actively using SELinux is recommended and
is often required by organizational security policies.
In this course, the basic concepts of SELinux are explained, and it
is discussed how SELinux can be correctly configured and used in
the standard, daily practice. To be able to solve SELinux-related
problems, the course also delves into investigating SELinux log
information and teaches, through practical exercises, how to
resolve issues.
In addition to active measures such as using SELinux, the detection
of potentially malicious changes is becoming increasingly
important. Changes to Linux and application configurations can be
monitored using the Linux Audit Daemon auditd. The course focuses
on how these changes can be recorded in Linux Audit Daemon log
files through practical exercises and explains how this complex log
information can be read and interpreted. Since SELinux also uses
the Linux Audit Daemon, this course will help in better
understanding detailed SELinux log information.
Doel :
After this course you will have basic knowledge about SELinux
and the Linux auditing system Auditd.
Doelgroep :
Linux sysadmins, Linux Support Specialists, Developers.
Voorkennis :
The following prior knowledge is required:
- Linux/UNIX Fundamentals
- Basic knowledge and hands-on experience with using the text-based
Command Line Interface.
Onderwerpen :
- SELinux ¿ introduction.
- SELinux - alternatives.
- Use of the SELinux modes. (Enforcing, Permissive, Disabled) and
SELinux types (Targeted, Mimimum and MLS/MCS)
- Daily use and management of SELinux.
- Updating the standard SELinux policy.
- SELinux troubleshooting.
- Usage of SELinux confined users.
- Linux Auditd - introduction.
- Use and interpretation of Auditd logfiles.
- Introduction Auditd rules creation
- Introduction Auditd logging.
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
