Cyber security specialists are in demand
Recent attempts to hack several websites across the country and proofs of cyber attacks being launched against India for intelligence gathering and offensive purposes has pushed the country to step up its cyber security measures. See details
The National Security Council (NSC) headed by Prime Minister Manmohan Singh may soon allow the Defence Intelligence Agency (DIA) and the National Technical Research Organization (NTRO) to carry out offensive cyber operations, as per requirement. NTRO would also be responsible to protect important government networks, along with the Intelligence Bureau (IB).
CERT – IN (Computer Emergency Response Team India) would protect most of the cyber space of the country. Other intelligence agencies too will be authorized to gather intelligence abroad, though they will not be allowed to carry out any offensive operations.
In such a scenario, cyber security specialists are seeing a sharp surge in demand.
If you aspire to be a cyber security specialist, professional certification from Red Hat can surely be of great help to launch your career. Known as Red Hat Certified Security Specialist (RHSS), this certification is open only to a Red Hat Certified Engineer (RHCE).
To get RHSS certification, one has to clear three exams:
- Red Hat Enterprise Security: Network Services (RHS333)
- Red Hat Enterprise Directory Services and Authentication (RH423)
- Red Hat Enterprise SELinux Policy Administration (RHS429)
Red Hat Certified Security Specialists are adept at:
- Configuration of a Kerberos realm
- Configuration of Red Hat Directory Server to provide a centralized directory with access control
- Configuration of Red Hat Enterprise Linux clients to authenticate using various mechanisms, including Kerberos, LDAP, and Microsoft Active Directory
- Customizing the default SELinux Targeted Policy implemented in Red Hat Enterprise Linux to address functional issues and needs
- File encryption using GPG to secure files
- Implementing custom SELinux policies
- Providing more secure network file sharing using Kerberos and NFSv4
- Specifying particular SELinux policies and enforcing modes
- Use of cryptographic tools in Red Hat Enterprise Linux that can secure network services, including DNS, SMTP, and POP/IMAP
Comments
(4)
m
2013-06-27 10:41:05
2013-05-11 17:01:30
v
2013-05-11 15:10:27
2012-06-28 00:08:43
v
2013-04-09 17:00:22
2012-07-04 15:42:56
2012-06-16 21:23:09
v
2013-04-09 17:02:39
v
2013-04-06 10:22:20
View More Replies (3)