Ansible 2: Advancements with Security Automation
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Safeguard your system with advanced features of Ansible 2Nowadays, security plays an important part in securing your system or data. With over 750 automation modules, Ansible makes it easy for you to secure any part of your system, including setting firewalls, providing authentication to users and groups, and setting custom security policies. Ansible allows you to write automation procedures once and use them across your entire infrastructure.The course starts with basic Ansible concepts and later progresses to the advanced features of Ansible 2. You'll start with the usage of Ansible with non-Linux targets, before then moving on to discuss some advanced uses of Ansible Tower. Ansible Tower makes it easy to control the way your infrastructure is configured via configuration definitions and continuous remediationNext, we will look at secure user management with Ansible managing multiple user and different permissions. We will be closely looking at more complex hardening with STIG and CISAbout The AuthorAnish Nath is a developer, author, and a hacker who is willing to contribute and learn. He is an active member of StackOverflow and a Devops Engineer. He has expertise as a security advocate and security architect. He is experienced in handling security issues such as performing white-hat hacking. He is a community-oriented developer.
Facilities
Location
Start date
Start date
About this course
Perform SSH hardening and manage SSH users with Ansible
Deal with SELinux at a more advanced level
Harden your system by tweaking sysctl, bootloader, networks, and logging
Set up Ansible Tower and learn to use it
Install Ansible and connect to Windows boxes and network devices
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
- Operating System
- Install
- DOS
- Fedora
- Installation
- Protocol
- Server
- Governance
- Access
Course programme
- SSH Identity Management using Ansible
- Discuss how to give sudo access using Ansible system module user
- Ansible source code files and lab
- Deletion of multiple SSH users using Ansible
- Ansible system module user
- Ansible source code files and lab
- SSH Identity Management using Ansible
- Discuss how to give sudo access using Ansible system module user
- Ansible source code files and lab
- Deletion of multiple SSH users using Ansible
- Ansible system module user
- Ansible source code files and lab
- SSH Identity Management using Ansible
- Discuss how to give sudo access using Ansible system module user
- Ansible source code files and lab
- SSH Identity Management using Ansible
- Discuss how to give sudo access using Ansible system module user
- Ansible source code files and lab
- SSH Identity Management using Ansible
- Discuss how to give sudo access using Ansible system module user
- Ansible source code files and lab
- SSH Identity Management using Ansible
- Discuss how to give sudo access using Ansible system module user
- Ansible source code files and lab
- SSH Identity Management using Ansible
- Discuss how to give sudo access using Ansible system module user
- Ansible source code files and lab
- SSH Identity Management using Ansible
- Discuss how to give sudo access using Ansible system module user
- Ansible source code files and lab
- Deletion of multiple SSH users using Ansible
- Ansible system module user
- Ansible source code files and lab
- Deletion of multiple SSH users using Ansible
- Ansible system module user
- Ansible source code files and lab
- Deletion of multiple SSH users using Ansible
- Ansible system module user
- Ansible source code files and lab
- Deletion of multiple SSH users using Ansible
- Ansible system module user
- Ansible source code files and lab
- Deletion of multiple SSH users using Ansible
- Ansible system module user
- Ansible source code files and lab
- Deletion of multiple SSH users using Ansible
- Ansible system module user
- Ansible source code files and lab
- Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
- Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
- Ansible source code example - running the playbook
- Httpd server click jacking prevention
- Httpd server secure cookie, and DoS tuning
- Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
- Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
- Ansible source code example - running the playbook
- Httpd server click jacking prevention
- Httpd server secure cookie, and DoS tuning
- Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
- Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
- Ansible source code example - running the playbook
- Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
- Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
- Ansible source code example - running the playbook
- Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
- Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
- Ansible source code example - running the playbook
- Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
- Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
- Ansible source code example - running the playbook
- Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
- Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
- Ansible source code example - running the playbook
- Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
- Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
- Ansible source code example - running the playbook
- Httpd server click jacking prevention
- Httpd server secure cookie, and DoS tuning
- Httpd server click jacking prevention
- Httpd server secure cookie, and DoS tuning
- Httpd server click jacking prevention
- Httpd server secure cookie, and DoS tuning
- Httpd server click jacking prevention
- Httpd server secure cookie, and DoS tuning
- Httpd server click jacking prevention
- Httpd server secure cookie, and DoS tuning
- Httpd server click jacking prevention
- Httpd server secure cookie, and DoS tuning
- Securing network configuration
- Disable IP forwarding, Ansible Sysctl harden setting
- Ansible playbook example of sysctl module
- Exec Shield Configuration
- Randomized kernel VM region placements
- Ansible playbook example for process hardening
- Ansible way gpg check for yum repository
- Adding SSH banner for security Policy
- Removing legacy services from the OS using Ansible generic package module
- clamAV installation
- rootkit Detection Packages
- Ansible source code for running clamscan
- Securing network configuration
- Disable IP forwarding, Ansible Sysctl harden setting
- Ansible playbook example of sysctl module
- Exec Shield Configuration
- Randomized kernel VM region placements
- Ansible playbook example for process hardening
- Ansible way gpg check for yum repository
- Adding SSH banner for security Policy
- Removing legacy services from the OS using Ansible generic package module
- Ansible Tower Enterprise Edition LDAP Integration
- Ansible Tower Organization Mapping with the LDAP users
- Ansible Tower LDAP Troubleshooting
- Ansible Tower Enterprise Edition LDAP Integration
- Ansible Tower Organization Mapping with the LDAP users
- Ansible Tower LDAP Troubleshooting
- Ansible Tower Enterprise Edition LDAP Integration
- Ansible Tower Organization Mapping with the LDAP users
- Ansible Tower LDAP Troubleshooting
- Ansible Approach to Confidentiality, Integrity and Availability
- Ansible AWS EC2 group hardening
- Ansible Encrypted Credentials
- Ansible NMAP installation and cron scheduling
- Ansible way to patch the OS kernel
- Ansible asynchronous
- Ansible Approach to Confidentiality, Integrity and Availability
- Ansible AWS EC2 group hardening
- Ansible Encrypted Credentials
Additional information
Ansible 2: Advancements with Security Automation