Formularz kontaktowy



    Osoba zgłaszająca

    EX415 Red Hat Certified Specialist in Security: Linux exam



    The Red Hat Certified Specialist in Security: Linux exam validates your knowledge and abilities in securing Red Hat® Enterprise Linux®.


    By passing this exam, you become a Red Hat Certified Specialist in Security: Linux, which also counts toward becoming a Red Hat Certified Architect (RHCA®).

    Grupa docelowa

    These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux:

    • System administrators responsible for managing large enterprise environments
    • System administrators responsible for securing their organization’s infrastructure
    • Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential



    To help you study, review the following exam objectives that highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance.


    Study points for the exam

    1. Configure Ansible Core
      • Install Red Hat Ansible Core on a control node
      • Configure managed nodes
      • Configure simple inventories
      • Perform basic management of systems
      • Run a provided playbook against specified nodes
    2. Implement access controls for automation controller
      • Create and restrict an inventory to an automation controller user
      • Restrict a credential and/or a project to an automation controller user
      • Be able to create and launch a template as an automation controller user
    3. Configure intrusion detection
      • Install AIDE
      • Configure AIDE to monitor critical system files
    4. Configure encrypted storage
      • Encrypt and decrypt block devices, either physical or logical, using LUKS
      • Configure encrypted storage persistence using NBDE
      • Change encrypted storage passphrases
    5. Restrict USB devices
      • Install USBGuard
      • Write device policy rules with specific criteria to manage devices
      • Manage administrative policy and daemon configuration
    6. Manage system login security using pluggable authentication modules (PAM)
      • Configure password quality requirements
      • Configure failed login policy
      • Modify PAM configuration files and parameters
    7. Configure system auditing
      • Write rules to log auditable events
      • Enable prepackaged rules
      • Produce audit reports
    8. Configure SELinux
      • Enable SELinux on a host running a simple application
      • Interpret SELinux violations and determine remedial action
      • Restrict user activity with SELinux user mappings
      • Analyze and correct existing SELinux configurations
    9. Enforce security compliance using OpenSCAP
      • Install OpenSCAP and OpenSCAP Workbench
      • Scan hosts for security compliance
      • Tailor security policy
      • Scan individual hosts for security compliance
      • Generate and apply a playbook from customized XML for remediation of inventory hosts

    As with all Red Hat performance-based exams, configurations must persist after reboot without intervention.


    Duration: 4 hours



    Red Hat encourages all candidates for the Red Hat Certified Specialist in Security: Linux credential to consider taking Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) to help prepare.

    Attendance in these classes is not required; students can choose to take just the exam. While attending Red Hat classes can be an important part of your preparation, attending class does not guarantee success on the exam. Previous experience, practice, and native aptitude are also important determinants of success.

    Many books and other resources on system administration for Red Hat products are available. Red Hat does not endorse any of these materials as preparation guides for exams. Nevertheless, you may find additional reading helpful to deepen your understanding.


    Exam format

    This exam is a performance-based evaluation of skills and knowledge required to secure Red Hat Enterprise Linux systems. Candidates work with multiple systems to analyze and implement security measures and are evaluated on whether they have met specific objective criteria. Performance-based testing means that candidates must perform tasks similar to what they perform on the job.


    Scores and reporting

    Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days.

    Exam results are reported as total scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request.

    For more details, please contact us at

    Note: The course outline is subject to change as technology advances and the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact us at
    Cena netto:1934 PLN(450 EUR)Cena brutto:2378.82 PLNOpis

    Kurs przyjęty do powyższej kalkulacji 1 EUR = 4.2983 PLN – tabela nr. 135/C/NBP/2024, z dnia 2024-07-11. Obowiązująca od: 2024-07-14. Cena w PLN jest orientacyjna (wyliczana z EUR/USD wg kursu sprzedaży NBP z dnia wystawienia faktury). Przyjmujemy wpłaty w PLN lub EURO.


    Oferujemy szkolenia wirtualne, self-paced oraz stacjonarne (w Warszawie i w lokalizacjach wskazanych przez klienta).
    W celu ustalenia szczegółów prosimy o kontakt na




      – Termin gwarantowany (GTR)