Configuring Security on the Oracle Solaris 10 Operating System

Total time

Configuring Security on the Oracle Solaris 10 Operating System

Oracle University
Logo Oracle University

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

Oracle Solaris Security provides enterprise-class features to help you protect your applications and your data. Security Administrators can minimize and harden Oracle Solaris to implement a secure foundation for deploying services. The Configuring Security on the Solaris 10 Operating System course provides students with the knowledge and skills to implement these features and customize security on Oracle Solaris 10 systems.

This course is also available as part of an all-inclusive Certification Value Package.
Save up to 20% on training and exam vouchers plus get the exclusive benefit of a free retake.


Audience
  • Security Administrators
  • Data Center Manager
  • System Administrator

Cou…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Solaris, Security, CompTIA A+ / Network+ / Security+, Internet Security, and Oracle.

Oracle Solaris Security provides enterprise-class features to help you protect your applications and your data. Security Administrators can minimize and harden Oracle Solaris to implement a secure foundation for deploying services. The Configuring Security on the Solaris 10 Operating System course provides students with the knowledge and skills to implement these features and customize security on Oracle Solaris 10 systems.

This course is also available as part of an all-inclusive Certification Value Package.
Save up to 20% on training and exam vouchers plus get the exclusive benefit of a free retake.
Audience
  • Security Administrators
  • Data Center Manager
  • System Administrator

Course Topics Basic Security Principles
  • Evaluate Security Principles
  • Need for a Security Policy
  • Configuring Systems Securely
  • Performing Security Audit
  • Need for Patching
Oracle Solaris 10 Security Features
  • Secure by Default
  • Process Rights Management
  • User Rights Management
  • Solaris Cryptographic Framework
  • Basic Audit Reporting Tool
  • Oracle Solaris Service Management Facility
  • Solaris IP Filter
  • Solaris Secure Shell
Minimal and Reduced Installation
  • Minimal Installation: A Type of Reduced Installation
  • Software Installation Clusters
  • Providing a Consistent, Known Configuration for Installations
Hardening a System
  • Performing Hardening
  • Implementing the Solaris Security Toolkit (SST)
Implementing Process Rights Management
  • Process Rights Management
  • Process Privileges
  • Determining Process Rights Requirements
  • Debugging Privileges
  • Assigning Privileges to an Executable
  • Assigning Privileges to a User
Implementing User Rights and Password Management
  • User Access Controls
  • RBAC Overview
  • The RBAC Databases
  • Using RBAC to Manage User Rights
  • Using the Rights That You Are Assigned
  • Managing Passwords
Using the Solaris Cryptographic Framework
  • The Solaris Cryptographic Framework
  • Solaris Cryptographic Framework User-Level Commands
  • Solaris Cryptographic Framework Administration Tools
  • Framework Management
  • Solaris Cryptographic Framework with a Web Server
  • Solaris Cryptographic Framework with a Java-Based Application
  • Solaris Cryptographic Framework with Cryptographic Accelerators
Monitoring File Integrity
  • Verifying File Integrity
  • Using BART
  • Signed ELF Objects
Using the Oracle Solaris Service Management Facility
  • Oracle Solaris Service Management Facility
  • Least Privilege and SMF
  • Authorizations and Rights
  • Service-Specific Property Groups
  • Limiting Service Privileges
  • Determining a Current Service‚Äôs Privileges
  • Configuring a Service to Use Reduced Privileges
Securing Networks
  • Network Security
  • Network Access Control
  • TCP Wrappers
  • Using Authentication with Encryption
  • Using Solaris SSH
  • Using Kerberos Authentication
  • Securing Remotely Accessed File Systems with the NFS Service
Implementing IPsec and IKE
  • Introduction to IPsec
  • Creating a simple IPsec security policy
  • Key Management for IPsec
  • Configuring Keys for IPsec
  • Configuring IPsec Policy with Keying Material
  • Troubleshooting IPsec Configurations
Oracle Solaris Auditing
  • Oracle Solaris Auditing
  • Configuring Oracle Solaris Auditing
  • Configuring Audit Policy
  • Preselecting Audit Events and Classes
  • Specifying Audit File Systems
  • Alerting the Audit Administrator
  • Excepting Users From System-Wide Audit Selections
  • Enabling and Disabling Auditing
Security and Oracle Solaris Zones
  • Security Characteristics of Oracle Solaris Zones
  • Zone Integration with Oracle Solaris 10 Security Features
  • The Global Zone
  • When and How to Use Oracle Solaris Zones
  • Resource Management in Oracle Solaris Zones
  • Auditing in Oracle Solaris Zones
  • Oracle Solaris Zones and Network Security
  • Patching Oracle Solaris Zones
How Security Components Work Together
  • Security Components Integration
  • Security Technologies Interaction
  • Infrastructure Requirements

Course Objectives
  • Install Solaris systems securely
  • Limit the system's vulnerability to a network attack
  • Restrict access to administrative files and programs
  • Monitor systems for file integrity
  • Control access to user applications
  • Monitor systems for proper use
  • Security principles and features

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.