Red Hat Enterprise Security Network Services

Course Details

Centralized authentication security
Configure an NIS server to provide directory services
Configure Kerberos to provide user authentication
Configure NFSv4 server
Configure a network client to use NIS for directory information
Configure a network client to use Kerberos for authentication
Configure a network client to mount an NFSv4 export
Configure r-clients (rlogin, rcp, etc.) and telnet to use Kerberos
Network Services Security
Use xinetd and TCP wrappers to restrict access to network services
Configure Postfix and Sendmail to:
      Filter mail based on message characteristics
      Use TLS for secure communication
      Use the Real-time Blackhole List (RBL) via DNS
      Configure POP/IMAP to use SSL/TLS for secure communication
      Configure the following aspects of DNS:
            – Master domain
            – Slave domain
            – Views
            – Forwarders
            – Blackhole lists (RBL)
            TSIG
      Use GPG tools to:
            Generate key pairs
            Sign documents
            Encrypt documents
            Decrypt documents
            Verify document signatures
      Configure a certificate authority (CA) and sign certificate requests
      Configure httpd to use an SSL certificate signed by a certifying authority
      Configure httpd to use passwords and/or network location to restrict access to content
      Configure FTP security to:
            Support FTP only users
            Implement host-based access restrictions