Oracle Solaris 11 Security Administration
Audience
- System Administrator
- Security Administrators
- Network Administrator
Course Topics Introduction
- Course Goals
- Course Agenda
- Introductions
- Your lab environment
- Evaluating security principles
- An…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Audience
- System Administrator
- Security Administrators
- Network Administrator
Course Topics Introduction
- Course Goals
- Course Agenda
- Introductions
- Your lab environment
- Evaluating security principles
- Analyzing the need for a security policy
- Configuring systems securely
- Performing a security audit
- Evaluating the need for upgrading systems
- Introducing the Oracle Solaris 11 operating system
- Exploring Oracle Solaris 11 security technologies
- Planning for RBAC and privileges implementation
- Configuring and using RBAC
- Configuring and managing privileges
- Planning for cryptographic services
- Using the Cryptographic Framework
- Using the Key Management Framework
- Planning for Oracle Solaris Auditing
- Configuring Oracle Solaris Auditing
- Administering the audit service
- Managing the audit records
- Managing ZFS File System Security
- Verifying File Integrity
- Controlling Access to Files
- Controlling Access to Systems
- Controlling Access to Devices
- Using PAM to Authenticate Users
- Planning for basic network security
- Using Secure Shell
- Using TCP Wrappers
- Using Kerberos protocol
- Using IPsec and IKE
- Securing remotely accessed file systems
- Planning for IP Filter Implementation
- Configuring the IP rules set
- Configuring IP Filter
- Planning for SMF Configuration
- Managing Services
- Planning for Security in Zones
- Integrating Security Features into Zones
- Managing Resources in Zones
- Managing Network Security in Zones
- Planning for Labeled Security
- Managing Trusted Extensions
Course Objectives
- Describe important Security principles and features
- Identify key Oracle Solaris 11 security technologies
- Administer roles, rights, profiles, and privileges
- Administer system security
- Monitor systems for file integrity
- Implement network security
- Control and manage services
- Implement Security in Zones
- Use cryptographic services for encryption and decryption
- Audit the system
- Implement Labeled Security
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
