Overview

A Red Hat Certified Specialist in Security: Linux has demonstrated the knowledge, skills, and abilities needed to secure Red Hat® Enterprise Linux® systems and to enforce compliance with security policies.

Prove your skills and knowledge

A Red Hat Certified Specialist in Security: Linux is able to:

  • Configure intrusion detection.
  • Configure encrypted storage.
  • Restrict USB devices.
  • Manage PAM authentication.
  • Configure system auditing.
  • Configure SELinux.
  • Use OpenSCAP and other tools to audit security policy compliance.

Is this certification right for you?

If you’re a system administrator responsible for managing large enterprise environments or securing your organization’s infrastructure, or if you’re a Red Hat Certified Engineer intent on pursuing the Red Hat Certified Architect (RHCA) credential, you may be interested in becoming a Red Hat Certified Specialist in Security: Linux.

Certification details

To help you prepare to earn a Red Hat Certified Specialist in Security: Linux credential, we recommend the following:

Step 2 - Pass the associated exam:

Hide detail

Let's talk

By submitting this form, you agree to QA processing your data in accordance with our Privacy Policy and Terms & Conditions. You can unsubscribe at any time by clicking the link in our emails or contacting us directly.