Ansible 2: Advancements with Security Automation

Course

Online

£ 15 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Safeguard your system with advanced features of Ansible 2Nowadays, security plays an important part in securing your system or data. With over 750 automation modules, Ansible makes it easy for you to secure any part of your system, including setting firewalls, providing authentication to users and groups, and setting custom security policies. Ansible allows you to write automation procedures once and use them across your entire infrastructure.The course starts with basic Ansible concepts and later progresses to the advanced features of Ansible 2. You'll start with the usage of Ansible with non-Linux targets, before then moving on to discuss some advanced uses of Ansible Tower. Ansible Tower makes it easy to control the way your infrastructure is configured via configuration definitions and continuous remediationNext, we will look at secure user management with Ansible managing multiple user and different permissions. We will be closely looking at more complex hardening with STIG and CISAbout The AuthorAnish Nath is a developer, author, and a hacker who is willing to contribute and learn. He is an active member of StackOverflow and a Devops Engineer. He has expertise as a security advocate and security architect. He is experienced in handling security issues such as performing white-hat hacking. He is a community-oriented developer.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Perform SSH hardening and manage SSH users with Ansible
Deal with SELinux at a more advanced level
Harden your system by tweaking sysctl, bootloader, networks, and logging
Set up Ansible Tower and learn to use it
Install Ansible and connect to Windows boxes and network devices

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Operating System
  • Install
  • DOS
  • Fedora
  • Installation
  • Protocol
  • Server
  • Governance
  • Access

Course programme

User Management with Ansible 3 lectures 10:28 The Course Overview This video gives us an overview of the entire course. User Management With Ansible - Part 1 In this video, we will learn SSH user creation on RHEL 6/CentOS 7 Fedora like system.
  • SSH Identity Management using Ansible
  • Discuss how to give sudo access using Ansible system module user
  • Ansible source code files and lab
User Management with Ansible - Part 2 In this video, we will learn SSH multiple user deletion on RHEL 6/CentOS 7 Fedora like system.
  • Deletion of multiple SSH users using Ansible
  • Ansible system module user
  • Ansible source code files and lab
User Management with Ansible 3 lectures 10:28 The Course Overview This video gives us an overview of the entire course. User Management With Ansible - Part 1 In this video, we will learn SSH user creation on RHEL 6/CentOS 7 Fedora like system.
  • SSH Identity Management using Ansible
  • Discuss how to give sudo access using Ansible system module user
  • Ansible source code files and lab
User Management with Ansible - Part 2 In this video, we will learn SSH multiple user deletion on RHEL 6/CentOS 7 Fedora like system.
  • Deletion of multiple SSH users using Ansible
  • Ansible system module user
  • Ansible source code files and lab
The Course Overview This video gives us an overview of the entire course. The Course Overview This video gives us an overview of the entire course. The Course Overview This video gives us an overview of the entire course. The Course Overview This video gives us an overview of the entire course. This video gives us an overview of the entire course. This video gives us an overview of the entire course. User Management With Ansible - Part 1 In this video, we will learn SSH user creation on RHEL 6/CentOS 7 Fedora like system.
  • SSH Identity Management using Ansible
  • Discuss how to give sudo access using Ansible system module user
  • Ansible source code files and lab
User Management With Ansible - Part 1 In this video, we will learn SSH user creation on RHEL 6/CentOS 7 Fedora like system.
  • SSH Identity Management using Ansible
  • Discuss how to give sudo access using Ansible system module user
  • Ansible source code files and lab
User Management With Ansible - Part 1 In this video, we will learn SSH user creation on RHEL 6/CentOS 7 Fedora like system.
  • SSH Identity Management using Ansible
  • Discuss how to give sudo access using Ansible system module user
  • Ansible source code files and lab
User Management With Ansible - Part 1 In this video, we will learn SSH user creation on RHEL 6/CentOS 7 Fedora like system.
  • SSH Identity Management using Ansible
  • Discuss how to give sudo access using Ansible system module user
  • Ansible source code files and lab
In this video, we will learn SSH user creation on RHEL 6/CentOS 7 Fedora like system.
  • SSH Identity Management using Ansible
  • Discuss how to give sudo access using Ansible system module user
  • Ansible source code files and lab
In this video, we will learn SSH user creation on RHEL 6/CentOS 7 Fedora like system.
  • SSH Identity Management using Ansible
  • Discuss how to give sudo access using Ansible system module user
  • Ansible source code files and lab
User Management with Ansible - Part 2 In this video, we will learn SSH multiple user deletion on RHEL 6/CentOS 7 Fedora like system.
  • Deletion of multiple SSH users using Ansible
  • Ansible system module user
  • Ansible source code files and lab
User Management with Ansible - Part 2 In this video, we will learn SSH multiple user deletion on RHEL 6/CentOS 7 Fedora like system.
  • Deletion of multiple SSH users using Ansible
  • Ansible system module user
  • Ansible source code files and lab
User Management with Ansible - Part 2 In this video, we will learn SSH multiple user deletion on RHEL 6/CentOS 7 Fedora like system.
  • Deletion of multiple SSH users using Ansible
  • Ansible system module user
  • Ansible source code files and lab
User Management with Ansible - Part 2 In this video, we will learn SSH multiple user deletion on RHEL 6/CentOS 7 Fedora like system.
  • Deletion of multiple SSH users using Ansible
  • Ansible system module user
  • Ansible source code files and lab
In this video, we will learn SSH multiple user deletion on RHEL 6/CentOS 7 Fedora like system.
  • Deletion of multiple SSH users using Ansible
  • Ansible system module user
  • Ansible source code files and lab
In this video, we will learn SSH multiple user deletion on RHEL 6/CentOS 7 Fedora like system.
  • Deletion of multiple SSH users using Ansible
  • Ansible system module user
  • Ansible source code files and lab
Httpd (apache2) Web Server Hardening 2 lectures 10:39 Httpd Hardening-Part 1 In this video, we will learn how to install httpd webserver and harden the httpd server
  • Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
  • Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
  • Ansible source code example - running the playbook
Httpd Hardening-Part 2 In this video, we will learn how to disable the server signature and httpd header security
  • Httpd server click jacking prevention
  • Httpd server secure cookie, and DoS tuning
Httpd (apache2) Web Server Hardening 2 lectures 10:39 Httpd Hardening-Part 1 In this video, we will learn how to install httpd webserver and harden the httpd server
  • Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
  • Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
  • Ansible source code example - running the playbook
Httpd Hardening-Part 2 In this video, we will learn how to disable the server signature and httpd header security
  • Httpd server click jacking prevention
  • Httpd server secure cookie, and DoS tuning
Httpd Hardening-Part 1 In this video, we will learn how to install httpd webserver and harden the httpd server
  • Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
  • Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
  • Ansible source code example - running the playbook
Httpd Hardening-Part 1 In this video, we will learn how to install httpd webserver and harden the httpd server
  • Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
  • Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
  • Ansible source code example - running the playbook
Httpd Hardening-Part 1 In this video, we will learn how to install httpd webserver and harden the httpd server
  • Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
  • Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
  • Ansible source code example - running the playbook
Httpd Hardening-Part 1 In this video, we will learn how to install httpd webserver and harden the httpd server
  • Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
  • Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
  • Ansible source code example - running the playbook
In this video, we will learn how to install httpd webserver and harden the httpd server
  • Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
  • Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
  • Ansible source code example - running the playbook
In this video, we will learn how to install httpd webserver and harden the httpd server
  • Installation of httpd webserver, Running httpd webserver using least privilege principle, Httpd certificate configuration
  • Apply strong ciphers, tls 1.2 protocol , disable SSI and directly listening in the httpd.conf file
  • Ansible source code example - running the playbook
Httpd Hardening-Part 2 In this video, we will learn how to disable the server signature and httpd header security
  • Httpd server click jacking prevention
  • Httpd server secure cookie, and DoS tuning
Httpd Hardening-Part 2 In this video, we will learn how to disable the server signature and httpd header security
  • Httpd server click jacking prevention
  • Httpd server secure cookie, and DoS tuning
Httpd Hardening-Part 2 In this video, we will learn how to disable the server signature and httpd header security
  • Httpd server click jacking prevention
  • Httpd server secure cookie, and DoS tuning
Httpd Hardening-Part 2 In this video, we will learn how to disable the server signature and httpd header security
  • Httpd server click jacking prevention
  • Httpd server secure cookie, and DoS tuning
In this video, we will learn how to disable the server signature and httpd header security
  • Httpd server click jacking prevention
  • Httpd server secure cookie, and DoS tuning
In this video, we will learn how to disable the server signature and httpd header security
  • Httpd server click jacking prevention
  • Httpd server secure cookie, and DoS tuning
OS Hardening 4 lectures 14:17 Hardening With Sysctl In this video, we will get to know how to harden the Operating System with systcl
  • Securing network configuration
  • Disable IP forwarding, Ansible Sysctl harden setting
  • Ansible playbook example of sysctl module
Hardening Process In this video, we will get to know how to harden the Operating System with process hardening
  • Exec Shield Configuration
  • Randomized kernel VM region placements
  • Ansible playbook example for process hardening
Hardening Software Updates Warning Banners and Remove Services In this video, we will get to know how to harden the yum repository
  • Ansible way gpg check for yum repository
  • Adding SSH banner for security Policy
  • Removing legacy services from the OS using Ansible generic package module
rootkit Detections and Protections In this video, we will learn about rootkit.
  • clamAV installation
  • rootkit Detection Packages
  • Ansible source code for running clamscan
OS Hardening. 4 lectures 14:17 Hardening With Sysctl In this video, we will get to know how to harden the Operating System with systcl
  • Securing network configuration
  • Disable IP forwarding, Ansible Sysctl harden setting
  • Ansible playbook example of sysctl module
Hardening Process In this video, we will get to know how to harden the Operating System with process hardening
  • Exec Shield Configuration
  • Randomized kernel VM region placements
  • Ansible playbook example for process hardening
Hardening Software Updates Warning Banners and Remove Services In this video, we will get to know how to harden the yum repository
  • Ansible way gpg check for yum repository
  • Adding SSH banner for security Policy
  • Removing legacy services from the OS using Ansible generic package module
rootkit Detections and Protections In this video, we will learn about rootkit li
  • Ansible Tower LDAP Troubleshooting
  • Ansible Tower LDAP Integration In this video, we will get to know Ansible Integrate LDAP with Ansible Tower
    • Ansible Tower Enterprise Edition LDAP Integration
    • Ansible Tower Organization Mapping with the LDAP users
    • Ansible Tower LDAP Troubleshooting
    In this video, we will get to know Ansible Integrate LDAP with Ansible Tower
    • Ansible Tower Enterprise Edition LDAP Integration
    • Ansible Tower Organization Mapping with the LDAP users
    • Ansible Tower LDAP Troubleshooting
    In this video, we will get to know Ansible Integrate LDAP with Ansible Tower
    • Ansible Tower Enterprise Edition LDAP Integration
    • Ansible Tower Organization Mapping with the LDAP users
    • Ansible Tower LDAP Troubleshooting
    Security Governance With Ansible 2 lectures 16:04 How to Enforce Governance with Ansible-Part 1 In this video, we will get to know about Security Governance Concept
    • Ansible Approach to Confidentiality, Integrity and Availability
    • Ansible AWS EC2 group hardening
    • Ansible Encrypted Credentials
    How to Enforce Governance with Ansible-Part 2 In this video, we will get to vulnerability scanning and Kernel Patching
    • Ansible NMAP installation and cron scheduling
    • Ansible way to patch the OS kernel
    • Ansible asynchronous
    Security Governance With Ansible 2 lectures 16:04 How to Enforce Governance with Ansible-Part 1 In this video, we will get to know about Security Governance Concept
    • Ansible Approach to Confidentiality, Integrity and Availability
    • Ansible AWS EC2 group hardening
    • Ansible Encrypted Credentials
    How to Enforce Governance with Ansible-Part...

    Additional information

    Basic of knowledge of Ansible Towers is required

    Ansible 2: Advancements with Security Automation

    £ 15 VAT inc.