Overview
A Red Hat Certified Specialist in Security: Linux has demonstrated the knowledge, skills, and abilities needed to secure Red Hat® Enterprise Linux® systems and to enforce compliance with security policies.
Prove your skills and knowledge
A Red Hat Certified Specialist in Security: Linux is able to:
- Configure intrusion detection.
 - Configure encrypted storage.
 - Restrict USB devices.
 - Manage PAM authentication.
 - Configure system auditing.
 - Configure SELinux.
 - Use OpenSCAP and other tools to audit security policy compliance.
 
Is this certification right for you?
If you’re a system administrator responsible for managing large enterprise environments or securing your organization’s infrastructure, or if you’re a Red Hat Certified Engineer intent on pursuing the Red Hat Certified Architect (RHCA) credential, you may be interested in becoming a Red Hat Certified Specialist in Security: Linux.
Certification details
To help you prepare to earn a Red Hat Certified Specialist in Security: Linux credential, we recommend the following: