Red Hat Certified Specialist in Security: Linux (RHCS-SL)

A Red Hat Certified Specialist in Security: Linux has demonstrated the knowledge, skills, and abilities needed to secure Red Hat® Enterprise Linux® systems and to enforce compliance with security policies.

A Red Hat Certified Specialist in Security: Linux is able to:

  • Configure intrusion detection.
  • Configure encrypted storage.
  • Restrict USB devices.
  • Manage PAM authentication.
  • Configure system auditing.
  • Configure SELinux.
  • Use OpenSCAP and other tools to audit security policy compliance.

If you’re a system administrator responsible for managing large enterprise environments or securing your organization’s infrastructure, or if you’re a Red Hat Certified Engineer intent on pursuing the Red Hat Certified Architect (RHCA) credential, you may be interested in becoming a Red Hat Certified Specialist in Security: Linux.

Recommended training for this certification

We recommend this course to help you prepare to earn a Red Hat Certified Specialist in Security: Linux credential:

Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415)

Exams

Red Hat Certified Specialist in Security: Linux Exam (EX415)

An IT professional who passes this exam will earn a Red Hat Certified Specialist endorsement that also counts toward earning the RHCA credential.