Duration: 5 Days
What you will learn
This Oracle Solaris 11 Security Administration training helps you develop the knowledge and skills to customize security
on the Oracle Solaris 11 operating system. Expert Oracle University instructors will help you explore new security
features included in Oracle Solaris 11.1 and Oracle Solaris 11.2; learn how to use these features to reduce the risk of
intrusion and secure both applications and data.
Learn To:
Describe important security principles and technologies.
Secure user rights, process rights, files and file system.
Implement cryptographic services, network security, zones security and labeled security.
Administer system security and services.
Monitor file integrity and security related system events.
Benefits to You
When you walk away from this course, you’ll leave with a better understanding of the Oracle Solaris 11.2 security
administration and new enhancements done to the OS. This allows you to run your most demanding enterprise
applications in private, hybrid, or public clouds. This course will also help you effectively create a security plan, while
implementing and monitoring security on a Solaris 11 system.
Develop Oracle Solaris 11.2 OS Expertise
This course builds on the system administration skills taught in the Oracle Solaris 11.2 System Administration courses.
You’ll work with expert Oracle University instructors to develop a deep understanding of Oracle Solaris 11.2 security
features that you can leverage in your day-to-day job.
Please Note
If you don’t have Oracle Solaris 11 system administration experience, you should first take the Oracle Solaris 11 System
Administration and Oracle Solaris 11 Advanced System Administration course first to ensure an effective knowledge of
Oracle Solaris 11 system administration before attempting to take this specialty course. Those with Oracle Solaris 10
experience should take the Transition to Oracle Solaris 11 course, as it builds on your Oracle Solaris 10 knowledge and
provides training more tailored to your background.
Audience
Network Administrator
Security Administrators
System Administrator
Related Training
Required Prerequisites
Administer network and process on Oracle Solaris 11 systems
Administer services and zones on Oracle Solaris 11 systems
Administer users, packages, and applications on Oracle Solaris 11 systems
Perform system installation
Oracle Solaris 11 System Administration Ed 4
Oracle Solaris 11 Advanced System Administration Ed 4
UNIX and Linux Essentials
Suggested Prerequisites
Shell Programming Ed 1
Course Objectives
Administer system security
Identify key Oracle Solaris 11 security technologies
Secure users and processes
Audit the system
Use cryptographic services for encryption and decryption
Secure files and file system
Monitor systems for file integrity
Implement network security
Manage services
Implement security in zones
Implement labeled security
Describe important security principles and features
Course Topics
Introduction
Overview
Course Goals
Course Agenda
Introductions
Your Learning Center
Your lab environment
Planning for basic security
Evaluating Security Principles
Analyzing the need for a Security Policy
Configuring Systems Securely
Performing a Security Audit
Evaluating the need for upgrading systems
Identifying Oracle Solaris 11 Security Technologies
Describe Oracle Solaris 11 OS Security
Exploring Oracle Solaris 11 Security Features
Securing Users and Processes
Introducing user and process rights
Managing user rights
Managing process rights
Using the Oracle Solaris Cryptographic Services
Describing Cryptographic Services
Implementing the Cryptographic Framework
Implementing Key Management Framework (KMF)
Auditing in Oracle Solaris
Describing Oracle Solaris Auditing
Configuring Oracle Solaris Auditing
Administering the audit service
Managing the audit records
Securing Files and File System
Managing ZFS File System Security
Verifying File Integrity
Controlling Access to Files
Administering System Security
Protecting System integrity
Controlling System Access
Controlling Access to Devices
Implement PAM to Authenticate Users
Implementing Basic Network Security
Establishing network security
Implementing Secure Shell
Implementing TCP Wrappers
Implementing Kerberos Protocol
Implement IPsec and IKE
Secure remotely accesses file systems
Securing Network by Using Packet Filtering
Implementing IP Filter
Configuring the IP rule sets
Configuring the IP Filter Service
Managing Services
Describing SMF Configuration
Managing Services
Implementing Security in Oracle Solaris Zones
Describing Zones Security
Integrating Security Features into Zones
Managing Resources in Zones
Managing Network Security in Zones
Implementing Labeled Security Using Trusted Extensions
Describing labeled security
Managing Trusted Extensions
0.00 average based on 0 ratings