Oracle Solaris 11 Security Administration Ed 2

0 étudiant

Duration: 5 Days

What you will learn

This Oracle Solaris 11 Security Administration training helps you develop the knowledge and skills to customize security
on the Oracle Solaris 11 operating system. Expert Oracle University instructors will help you explore new security
features included in Oracle Solaris 11.1 and Oracle Solaris 11.2; learn how to use these features to reduce the risk of
intrusion and secure both applications and data.

Learn To:

Describe important security principles and technologies.
Secure user rights, process rights, files and file system.
Implement cryptographic services, network security, zones security and labeled security.
Administer system security and services.
Monitor file integrity and security related system events.

Benefits to You

When you walk away from this course, you’ll leave with a better understanding of the Oracle Solaris 11.2 security
administration and new enhancements done to the OS. This allows you to run your most demanding enterprise
applications in private, hybrid, or public clouds. This course will also help you effectively create a security plan, while
implementing and monitoring security on a Solaris 11 system.
Develop Oracle Solaris 11.2 OS Expertise
This course builds on the system administration skills taught in the Oracle Solaris 11.2 System Administration courses.
You’ll work with expert Oracle University instructors to develop a deep understanding of Oracle Solaris 11.2 security
features that you can leverage in your day-to-day job.
Please Note
If you don’t have Oracle Solaris 11 system administration experience, you should first take the Oracle Solaris 11 System
Administration and Oracle Solaris 11 Advanced System Administration course first to ensure an effective knowledge of
Oracle Solaris 11 system administration before attempting to take this specialty course. Those with Oracle Solaris 10
experience should take the Transition to Oracle Solaris 11 course, as it builds on your Oracle Solaris 10 knowledge and
provides training more tailored to your background.

Audience

Network Administrator
Security Administrators
System Administrator

Related Training

Required Prerequisites
Administer network and process on Oracle Solaris 11 systems
Administer services and zones on Oracle Solaris 11 systems
Administer users, packages, and applications on Oracle Solaris 11 systems
Perform system installation
Oracle Solaris 11 System Administration Ed 4
Oracle Solaris 11 Advanced System Administration Ed 4
UNIX and Linux Essentials
Suggested Prerequisites
Shell Programming Ed 1

Course Objectives

Administer system security
Identify key Oracle Solaris 11 security technologies
Secure users and processes
Audit the system
Use cryptographic services for encryption and decryption
Secure files and file system
Monitor systems for file integrity
Implement network security
Manage services
Implement security in zones
Implement labeled security
Describe important security principles and features

Course Topics

Introduction

Overview
Course Goals
Course Agenda
Introductions
Your Learning Center
Your lab environment

Planning for basic security

Evaluating Security Principles
Analyzing the need for a Security Policy
Configuring Systems Securely
Performing a Security Audit
Evaluating the need for upgrading systems

Identifying Oracle Solaris 11 Security Technologies

Describe Oracle Solaris 11 OS Security
Exploring Oracle Solaris 11 Security Features

Securing Users and Processes

Introducing user and process rights
Managing user rights
Managing process rights

Using the Oracle Solaris Cryptographic Services

Describing Cryptographic Services
Implementing the Cryptographic Framework
Implementing Key Management Framework (KMF)

Auditing in Oracle Solaris

Describing Oracle Solaris Auditing
Configuring Oracle Solaris Auditing
Administering the audit service
Managing the audit records

Securing Files and File System

Managing ZFS File System Security
Verifying File Integrity
Controlling Access to Files

Administering System Security

Protecting System integrity
Controlling System Access
Controlling Access to Devices
Implement PAM to Authenticate Users

Implementing Basic Network Security

Establishing network security
Implementing Secure Shell
Implementing TCP Wrappers
Implementing Kerberos Protocol
Implement IPsec and IKE
Secure remotely accesses file systems

Securing Network by Using Packet Filtering

Implementing IP Filter
Configuring the IP rule sets
Configuring the IP Filter Service

Managing Services

Describing SMF Configuration
Managing Services

Implementing Security in Oracle Solaris Zones

Describing Zones Security
Integrating Security Features into Zones
Managing Resources in Zones
Managing Network Security in Zones

Implementing Labeled Security Using Trusted Extensions

Describing labeled security
Managing Trusted Extensions

Les détails ne sont pas renseignés

Formateur

Avatar de l’utilisateur bscf

0.00 average based on 0 ratings

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%
Gratuit

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont indiqués avec *