Solaris Trusted Extensions Installation, Configuration
Solaris Trusted Extensions Installation, Configuration, and Administration provide students with the knowledge to enable, configure, and administer Solaris Trusted Extensions software on a system, running the Solaris 10 Operating System. The course teaches students how to design and configure Trusted Extensions security label mechanisms, use extended security features of the two graphical desktops, compartmentalize system administrator powers, and control privileges and authorizations.
The course focuses on additional features which enhance system security such as auditing, controlling access to removable media devices, managing local and remote file systems, configuring labeled networking a…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Solaris Trusted Extensions Installation, Configuration, and Administration provide students with the knowledge to enable, configure, and administer Solaris Trusted Extensions software on a system, running the Solaris 10 Operating System. The course teaches students how to design and configure Trusted Extensions security label mechanisms, use extended security features of the two graphical desktops, compartmentalize system administrator powers, and control privileges and authorizations.
The course focuses on additional features which enhance system security such as auditing, controlling access to removable media devices, managing local and remote file systems, configuring labeled networking and labeled printing, setting up LDAP on Trusted Extensions, and migrating from Trusted Solaris 8 to Solaris Trusted Extensions.
Students who can benefit from this course:- System Administrators and Security Administrators who are responsible for installing, configuring and managing labeled systems. Systems Integrators and Designers of classified government systems or commercial systems with high-security data protection needs can also benefit from this course
This course counts towards the Hands-on course requirement for the Oracle Solaris 10 Security Administrator Certification. Only instructor-led inclass or instructor-led online formats of this course will meet the Certification Hands-on Requirement. Self Study CD-Rom and Knowledge Center courses DO NOT meet the Hands-on Requirement.
Audience
Course Topics Introducing Trusted Extensions Features Trusted Extensions Installation Trusted Extensions Configuration Access Controls User Interface Changes: Trusted CDE and TJDS Configuring and Installing the label_encodings File Configure Privileges, Authorizations, Rights Profiles, and Roles Perform Service Management in Solaris Trusted Extensions Device Allocation Auditing a Solaris Trusted Extensions (TX) System Networking Solaris Trusted Extensions Systems NFS and LOFS File Systems Solaris Trusted Extensions Printing Configuring LDAP Migrating From Trusted Solaris 8 to Solaris Trusted Extensions Installing Unbundled Applications
Course Objectives
- Install the Trusted Extensions package onto a Solaris 10 system
- Create and configure labeled zones
- Configure labeled networking in the labeled zones
- Design a security labeling scheme
- Implement a security labeling scheme with the label_encodings data base
- Apply the principle of least privilege to processes and users, and use privileges to grant additional rights to processes
- Use authorizations to grant rights to users
- Use the Service Management Facility to configure Solaris Trusted Extensions services and to secure Solaris services
- Configure the auditing system to audit user and kernel activity
- Configure networking between Solaris Trusted Extensions systems and other labeled and unlabeled systems
- Configure NFS and LOFS file system types in a labeled environment
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
