Red Hat Certification
Red Hat Certified Specialist in Security: Linux
A Red Hat Certified Specialist in Security: Linux has demonstrated the knowledge, skills, and abilities needed to secure Red Hat® Enterprise Linux® systems and to enforce compliance with security policies.
Certification details
Skills
Prove your skills and knowledge
A Red Hat Certified Specialist in Security: Linux is able to:
- Configure intrusion detection.
- Configure encrypted storage.
- Restrict USB devices.
- Manage PAM authentication.
- Configure system auditing.
- Configure SELinux.
- Use OpenSCAP and other tools to audit security policy compliance.
Audience
Is this certification right for you?
If you’re a system administrator responsible for managing large enterprise environments or securing your organization’s infrastructure, or if you’re a Red Hat Certified Engineer intent on pursuing the Red Hat Certified Architect (RHCA) credential, you may be interested in becoming a Red Hat Certified Specialist in Security: Linux.
Exams
Test your skills and knowledge
Red Hat Certified Specialist in Security: Linux (EX415)
An IT professional who passes this exam will earn a Red Hat Certified Specialist endorsement that also counts toward earning the RHCA credential.
Training
The best way to learn is to do
We recommend this course to help you prepare to earn a Red Hat Certified Specialist in Security: Linux credential: