lt;pgt; Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.lt;/pgt;lt;pgt; Course content summarylt;/pgt;lt;ulgt; lt;ligt; Manage compliance with OpenSCAPlt;/ligt; lt;ligt; Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniqueslt;/ligt; lt;ligt; Proactively identify and resolve issues with Red Hat Insightslt;/ligt; lt;ligt; Monitor activity and changes on a server with Linux Audit and AIDElt;/ligt; lt;ligt; Protect data from compromise with USBGuard and storage encryptionlt;/ligt; lt;ligt; Manage authentication controls with PAMlt;/ligt; lt;ligt; Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issueslt;/ligt; lt;ligt; Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Towerlt;/ligt;lt;/ulgt;lt;h3gt; Target Audiencelt;/h3gt;lt;pgt; System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organizationamp;#39;s security policies.lt;/pgt;