Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.Course content summaryManage compliance with OpenSCAPEnable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniquesProactively identify and resolve issues with Red Hat InsightsMonitor activity and changes on a server with Linux Audit and AIDEProtect data from compromise with USBGuard and storage encryptionManage authentication controls with PAMManually apply provided Ansible Playbooks to automate mitigation of security and compliance issuesScale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible TowerTarget AudienceSystem administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization's security policies.