Oracle Solaris 11 Security Administration

Total time

Oracle Solaris 11 Security Administration

Oracle University
Logo Oracle University

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

The Oracle Solaris 11 Security Administration course provides students with the knowledge and skills to customize security on the Oracle Solaris 11 operating system. Students will learn about new security features in Solaris 11 and how to use these features to reduce the risk of intrusion and secure both applications and data. This course will help students to effectively create a security plan as well as implement and monitor security on a Solaris 11 system.

Audience
  • System Administrator
  • Security Administrators
  • Network Administrator

Course Topics Introduction
  • Course Goals
  • Course Agenda
  • Introductions
  • Your lab environment
Planning for Basic Security
  • Evaluating security principles
  • An…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Solaris, Security, CompTIA A+ / Network+ / Security+, Internet Security, and Oracle.

The Oracle Solaris 11 Security Administration course provides students with the knowledge and skills to customize security on the Oracle Solaris 11 operating system. Students will learn about new security features in Solaris 11 and how to use these features to reduce the risk of intrusion and secure both applications and data. This course will help students to effectively create a security plan as well as implement and monitor security on a Solaris 11 system.

Audience
  • System Administrator
  • Security Administrators
  • Network Administrator

Course Topics Introduction
  • Course Goals
  • Course Agenda
  • Introductions
  • Your lab environment
Planning for Basic Security
  • Evaluating security principles
  • Analyzing the need for a security policy
  • Configuring systems securely
  • Performing a security audit
  • Evaluating the need for upgrading systems
Identifying Oracle Solaris 11 Security Technologies
  • Introducing the Oracle Solaris 11 operating system
  • Exploring Oracle Solaris 11 security technologies
Administering Roles, Rights, Profiles and Privileges
  • Planning for RBAC and privileges implementation
  • Configuring and using RBAC
  • Configuring and managing privileges
Using the Oracle Solaris Cryptographic Services
  • Planning for cryptographic services
  • Using the Cryptographic Framework
  • Using the Key Management Framework
Auditing in Oracle Solaris
  • Planning for Oracle Solaris Auditing
  • Configuring Oracle Solaris Auditing
  • Administering the audit service
  • Managing the audit records
Securing Files and the File System
  • Managing ZFS File System Security
  • Verifying File Integrity
  • Controlling Access to Files
Administering System Security
  • Controlling Access to Systems
  • Controlling Access to Devices
  • Using PAM to Authenticate Users
Implementing Basic Network Security
  • Planning for basic network security
  • Using Secure Shell
  • Using TCP Wrappers
  • Using Kerberos protocol
  • Using IPsec and IKE
  • Securing remotely accessed file systems
Securing Network Using Packet Filtering
  • Planning for IP Filter Implementation
  • Configuring the IP rules set
  • Configuring IP Filter
Controlling and Managing Services
  • Planning for SMF Configuration
  • Managing Services
Implementing Security in Oracle Solaris Zones
  • Planning for Security in Zones
  • Integrating Security Features into Zones
  • Managing Resources in Zones
  • Managing Network Security in Zones
Implementing Labeled Security by Using Trusted Extensions
  • Planning for Labeled Security
  • Managing Trusted Extensions

Course Objectives
  • Describe important Security principles and features
  • Identify key Oracle Solaris 11 security technologies
  • Administer roles, rights, profiles, and privileges
  • Administer system security
  • Monitor systems for file integrity
  • Implement network security
  • Control and manage services
  • Implement Security in Zones
  • Use cryptographic services for encryption and decryption
  • Audit the system
  • Implement Labeled Security

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.