Overview
A Red Hat Certified Specialist in Security: Linux has demonstrated the knowledge, skills, and abilities needed to secure Red Hat® Enterprise Linux® systems and to enforce compliance with security policies.
Prove your skills and knowledge
A Red Hat Certified Specialist in Security: Linux is able to:
- Configure intrusion detection.
- Configure encrypted storage.
- Restrict USB devices.
- Manage PAM authentication.
- Configure system auditing.
- Configure SELinux.
- Use OpenSCAP and other tools to audit security policy compliance.
Is this certification right for you?
If you’re a system administrator responsible for managing large enterprise environments or securing your organization’s infrastructure, or if you’re a Red Hat Certified Engineer intent on pursuing the Red Hat Certified Architect (RHCA) credential, you may be interested in becoming a Red Hat Certified Specialist in Security: Linux.
Certification details
To help you prepare to earn a Red Hat Certified Specialist in Security: Linux credential, we recommend the following: