Red Hat Enterprise SELinux Policy Administration (RHS429)

Skills covered:
Displaying courses for United States [Change]
This course provides material for:
Red Hat Exam code: EX429
Certificate: Red Hat Certified Security Specialist RHCSS


This class culminates in a major project to analyze, determine the security needs of, and design and implement a set of net-new policies for a service previously unprotected by SELinux.


A Red Hat Certified Engineer (RHCE®) who successfully completes this course is prepared to take the Red Hat Enterprise SELinux Policy Administration Expertise Exam (EX429), sold separately. Course content summary
• Introduction to SELinux
• Using SELinux
• The Red Hat-targeted policy
• Introduction to policies
• Policy utilities
• User and role security
• Anatomy of a policy
• Manipulating policies


Senior System Administrators, Security Administrators, and Application Programmers.


Introduction to SELinux

  • Discretionary access control vs. mandatory access control SELinux history and architecture overview Elements of the SELinux security model: user identity and role; domain and type; sensitivity and categories; security context SELinux policy and Red Hat's targeted policy Configuring policy with Booleans Archiving Setting and displaying extended attributes

Using SELinux

  • Controlling SELinux File contexts Relabeling files and file systems Mount options

The Red Hat targeted policy

  • Identifying and toggling protected services
    • Apache security contexts and configuration Booleans
    • Name service contexts and configuration Booleans NIS client contexts Other services File context for special directory trees Troubleshooting and avc denial messages SE troubleshooting and logging

Introduction to policies

  • Policy overview and organization Compiling and loading the monolithic policy and policy modules Policy type enforcement module syntax Object classes Domain transition

Policy utilities

  • Tools available for manipulating and analyzing policies: apol, seaudit and seaudit_report, checkpolicy, sepcut, sesearch, sestatus, audit2allow and audit2why, sealert, avcstat, seinfo, semanage and semodule, man pages

User and role security

  • Role-based access control Multicategory security Defining a security administrator Multilevel security The strict policy User identification and declaration Role identification and declaration Roles in use in transitions Role dominance

Anatomy of a policy

  • Policy macros Type attributes and aliases Type transitions When and how files get labeled restorecond Customizable types

Manipulating policies

  • Installing and compiling policies The policy language Access vector SELinux logs Security Identifiers - SIDs File-system labeling behavior Context on network objects Creating and using new Booleans Manipulating policy by example Macros Enableaudit


  • Best practices Creating file contexts, types, and typealiases Editing and creating network contexts Editing and creating domains

Training provider

Teaching mode:
Online - Self paced
Classroom - Instructor Led
Duration: 4 days
Gooroo has partnered with the global leaders in IT training to give you access to quality training, personalised to you, targeted at increasing your job opportunities and salary.

Our pricing

We do not display pricing as Gooroo members qualify for special discounts not available elsewhere. You must enquire through Gooroo to get this benefit.

New courses are happening all the time

Our partner's expert training consultant will provide you with the times and all the details you need. Enquire today.

Top skills covered in this course

Apache HTTP Server
United States
This skill has an average salary of
and is mentioned in
of job ads in this area.