Solaris Trusted Extensions Installation, Configuration

Total time

Solaris Trusted Extensions Installation, Configuration

Oracle University
Logo Oracle University
Provider rating: starstar_borderstar_borderstar_borderstar_border 2 Oracle University has an average rating of 2 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places
There are no known starting dates for this product.
  • View related products with starting dates: Solaris.

Description

Solaris Trusted Extensions Installation, Configuration, and Administration provide students with the knowledge to enable, configure, and administer Solaris Trusted Extensions software on a system, running the Solaris 10 Operating System. The course teaches students how to design and configure Trusted Extensions security label mechanisms, use extended security features of the two graphical desktops, compartmentalize system administrator powers, and control privileges and authorizations.

The course focuses on additional features which enhance system security such as auditing, controlling access to removable media devices, managing local and remote file systems, configuring labeled networking a…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Solaris, CompTIA A+ / Network+ / Security+, IT Security, Software / System Engineering, and Security.

Solaris Trusted Extensions Installation, Configuration, and Administration provide students with the knowledge to enable, configure, and administer Solaris Trusted Extensions software on a system, running the Solaris 10 Operating System. The course teaches students how to design and configure Trusted Extensions security label mechanisms, use extended security features of the two graphical desktops, compartmentalize system administrator powers, and control privileges and authorizations.

The course focuses on additional features which enhance system security such as auditing, controlling access to removable media devices, managing local and remote file systems, configuring labeled networking and labeled printing, setting up LDAP on Trusted Extensions, and migrating from Trusted Solaris 8 to Solaris Trusted Extensions.

Students who can benefit from this course:
  • System Administrators and Security Administrators who are responsible for installing, configuring and managing labeled systems. Systems Integrators and Designers of classified government systems or commercial systems with high-security data protection needs can also benefit from this course

This course counts towards the Hands-on course requirement for the Oracle Solaris 10 Security Administrator Certification. Only instructor-led inclass or instructor-led online formats of this course will meet the Certification Hands-on Requirement. Self Study CD-Rom and Knowledge Center courses DO NOT meet the Hands-on Requirement.


Audience
Course Topics Introducing Trusted Extensions Features Trusted Extensions Installation Trusted Extensions Configuration Access Controls User Interface Changes: Trusted CDE and TJDS Configuring and Installing the label_encodings File Configure Privileges, Authorizations, Rights Profiles, and Roles Perform Service Management in Solaris Trusted Extensions Device Allocation Auditing a Solaris Trusted Extensions (TX) System Networking Solaris Trusted Extensions Systems NFS and LOFS File Systems Solaris Trusted Extensions Printing Configuring LDAP Migrating From Trusted Solaris 8 to Solaris Trusted Extensions Installing Unbundled Applications
Course Objectives
  • Install the Trusted Extensions package onto a Solaris 10 system
  • Create and configure labeled zones
  • Configure labeled networking in the labeled zones
  • Design a security labeling scheme
  • Implement a security labeling scheme with the label_encodings data base
  • Apply the principle of least privilege to processes and users, and use privileges to grant additional rights to processes
  • Use authorizations to grant rights to users
  • Use the Service Management Facility to configure Solaris Trusted Extensions services and to secure Solaris services
  • Configure the auditing system to audit user and kernel activity
  • Configure networking between Solaris Trusted Extensions systems and other labeled and unlabeled systems
  • Configure NFS and LOFS file system types in a labeled environment

There are no reviews yet.
  • View related products with reviews: Solaris.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.