59.1. RHS427: Introduction to SELinux and Red Hat Targeted
Policy
https://www.redhat.com/training/security/courses/rhs427.html
1-day rapid intro to SELinux, how it operates within the Red
Hat targeted policy, and the tools available for working with
this powerful capability. RHS427 constitutes the first day of
RH429.
Computer security specialists and others responsible for
implementing security policies on a Linux computer. RHS429
requires RHCE or comparable knowledge.
Among the most significant features of Red Hat Enterprise
Linux is SELinux (Security Enhanced Linux), a powerful,
kernel-level security layer that provides fine-grained
control over what users and processes may access and do on a
system. By default, SELinux is enabled on Red Hat Enterprise
Linux systems, enforcing a set of mandatory access controls
that Red Hat calls the targeted policy. These access
controls substantially enhance the security of the network
services they target, but can sometimes affect the behavior
of third-party applications and scripts that worked on
previous versions of Red Hat Enterprise Linux.