Winter Savings - Limited time left to save on IT training. Use promo code SNOWBALL


Oracle Solaris 11 Security Administration Ed 2

Course Details
Code: D77033GC20
Tuition (USD): $4,070.00 • Classroom (5 days)
Course Details
GSA (USD): $3,211.59 • Classroom (5 days)

This Oracle Solaris 11 Security Administration training helps you develop the knowledge and skills to customize security on the Oracle Solaris 11 operating system. Expert Oracle University instructors will help you explore new security features included in Oracle Solaris 11.1 and Oracle Solaris 11.2; learn how to use these features to reduce the risk of intrusion and secure both applications and data.

Learn To:

  • Describe important security principles and technologies.
  • Secure user rights, process rights, files and file system.
  • Implement cryptographic services, network security, zones security and labeled security.
  • Administer system security and services.
  • Monitor file integrity and security related system events.

Benefits to You

When you walk away from this course, you'll leave with a better understanding of the Oracle Solaris 11.2 security administration and new enhancements done to the OS. This allows you to run your most demanding enterprise applications in private, hybrid, or public clouds. This course will also help you effectively create a security plan, while implementing and monitoring security on a Solaris 11 system.

Develop Oracle Solaris 11.2 OS Expertise

This course builds on the system administration skills taught in the Oracle Solaris 11.2 System Administration courses. You'll work with expert Oracle University instructors to develop a deep understanding of Oracle Solaris 11.2 security features that you can leverage in your day-to-day job.

Please Note

If you don't have Oracle Solaris 11 system administration experience, you should first take the Oracle Solaris 11 System Administration and Oracle Solaris 11 Advanced System Administration course first to ensure an effective knowledge of Oracle Solaris 11 system administration before attempting to take this specialty course. Those with Oracle Solaris 10 experience should take the Transition to Oracle Solaris 11 course, as it builds on your Oracle Solaris 10 knowledge and provides training more tailored to your background.

Skills Gained

  • Administer system security
  • Identify key Oracle Solaris 11 security technologies
  • Secure users and processes
  • Audit the system
  • Use cryptographic services for encryption and decryption
  • Secure files and file system
  • Monitor systems for file integrity
  • Implement network security
  • Manage services
  • Implement security in zones
  • Implement labeled security
  • Describe important security principles and features


  • Administer users, packages, and applications on Oracle Solaris 11 systems
  • Administer network and process on Oracle Solaris 11 systems
  • Administer services and zones on Oracle Solaris 11 systems
  • Perform system installation

Course Details


  • Overview
  • Course Goals
  • Course Agenda
  • Introductions
  • Your Learning Center
  • Your lab environment

Planning for basic security

  • Evaluating Security Principles
  • Analyzing the need for a Security Policy
  • Configuring Systems Securely
  • Performing a Security Audit
  • Evaluating the need for upgrading systems

Identifying Oracle Solaris 11 Security Technologies

  • Describe Oracle Solaris 11 OS Security
  • Exploring Oracle Solaris 11 Security Features

Securing Users and Processes

  • Introducing user and process rights
  • Managing user rights
  • Managing process rights

Using the Oracle Solaris Cryptographic Services

  • Describing Cryptographic Services
  • Implementing the Cryptographic Framework
  • Implementing Key Management Framework (KMF)

Auditing in Oracle Solaris

  • Describing Oracle Solaris Auditing
  • Configuring Oracle Solaris Auditing
  • Administering the audit service
  • Managing the audit records

Securing Files and File System

  • Managing ZFS File System Security
  • Verifying File Integrity
  • Controlling Access to Files

Administering System Security

  • Protecting System integrity
  • Controlling System Access
  • Controlling Access to Devices
  • Implement PAM to Authenticate Users

Implementing Basic Network Security

  • Establishing network security
  • Implementing Secure Shell
  • Implementing TCP Wrappers
  • Implementing Kerberos Protocol
  • Implement IPsec and IKE
  • Secure remotely accesses file systems

Securing Network by Using Packet Filtering

  • Implementing IP Filter
  • Configuring the IP rule sets
  • Configuring the IP Filter Service

Managing Services

  • Describing SMF Configuration
  • Managing Services

Implementing Security in Oracle Solaris Zones

  • Describing Zones Security
  • Integrating Security Features into Zones
  • Managing Resources in Zones
  • Managing Network Security in Zones

Implementing Labeled Security Using Trusted Extensions

  • Describing labeled security
  • Managing Trusted Extensions
Contact Us 1-800-803-3948
Contact Us Live Chat
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward