Oracle Solaris 11 Security Administration Ed 3

Course Details
Code: D77033GC30
Tuition (USD): $3,675.00 • Virtual (5 days)
$3,875.00 • Classroom (5 days)
Course Details
GSA (USD): $3,211.59 • Virtual (5 days)
$3,211.59 • Classroom (5 days)

The Oracle Solaris 11 Security Administration course provides students with the knowledge and skills to customize security on the Oracle Solaris 11 operating system. Students will learn about new security features included in Oracle Solaris 11.3, and how to use these features to reduce the risk of intrusion, and secure both applications and data. This course will help students to effectively create a security plan as well as implement and monitor security on a Solaris 11 system.

Note: Students without Oracle Solaris 11 system administration experience should take the Oracle Solaris 11 System Administration and Oracle Solaris 11 Advanced System Administration course first to ensure an effective knowledge of Oracle Solaris 11 system administration before attempting to take this specialty course. Those with Oracle Solaris 10 experience should take the Transition to Oracle Solaris 11 course as it builds on your Oracle Solaris 10 knowledge and provides training more tailored to your background.

Learn To:

  • Describe important security principles and technologies.
  • Secure user rights, process rights, files and file system.
  • Implement cryptographic services, network security, zones security and labeled security.
  • Administer system security and services.
  • Monitor file integrity and security related system events.

Benefits To You

Better understanding over the Oracle Solaris 11.3 security administration and new enhancements done to the OS, which allow you to run your most demanding enterprise applications in private, hybrid, or public clouds.

Develop Oracle Solaris 11.3 OS Expertise

This course builds on the system administration skills taught in the Oracle Solaris 11.3 System Administration courses. You'll work with expert Oracle University instructors to develop a deep understanding of Oracle Solaris 11.3 security features that you can leverage in your day-to-day job.

Suggested Audience

Skills Gained

  • Secure users and processes
  • Manage SMF security behavior
  • Manage encryption and certificates
  • Manage auditing
  • Secure files and file system
  • Secure systems and attached devices
  • Manage authentication services
  • Secure the network
  • Secure Oracle Solaris Zones
  • Implement labeled security using Trusted Extensions
  • Plan for basic security
  • Identify Oracle Solaris 11 security technologies

Who Can Benefit

  • Network Administrator
  • Security Administrators
  • System Administrator

Prerequisites

  • For beginners, please take all required prerequisite courses.
  • Shell Programming
  • For experienced system administrators take Transition to Oracle Solaris.

Course Details

Introduction

  • Overview
  • Course Goals
  • Course Agenda
  • Introductions
  • Your Learning Center
  • Your lab environment

Plan for basic security

  • Evaluate security principles
  • Analyze the need for a security policy
  • Configure systems securely
  • Perform a security audit
  • Evaluate the need for upgrading systems

Identify Oracle Solaris 11 Security Technologies

  • Describing Oracle Solaris 11 OS Security
  • Exploring Oracle Solaris 11 Security Features

Secure Users and Processes

  • Introducing user and process rights
  • Managing user rights
  • Managing process rights

Manage SMF Security Behavior

  • Describing SMF Configuration
  • Managing Services

Manage Encryption and Certificates

  • Describing Cryptographic Services
  • Implementing the Cryptographic Framework
  • Implementing Key Management Framework (KMF)

Manage Auditing

  • Describing Oracle Solaris Auditing
  • Configuring Oracle Solaris Auditing
  • Administering the audit service
  • Managing the audit records

Secure Files and File System

  • Managing ZFS File System Security
  • Verifying File Integrity
  • Controlling Access to Files

Secure Systems and Attached Devices

  • Protecting System integrity
  • Controlling System Access
  • Controlling Access to Devices
  • Assessing the Compliance of an Oracle Solaris System

Manage Authentication Services

  • Implement PAM to Authenticate Users
  • Implementing Kerberos Authentication Mechanism
  • Securing remotely accesses file systems

Secure the Network

  • Describe network security
  • Implementing Secure Shell
  • Implementing TCP Wrappers
  • Configuring Packet Filter to control network access
  • Configure IPsec and IKE

Secure Oracle Solaris Zones

  • Describing Zones Security
  • Integrating Security Features into Zones
  • Managing Resources in Zones
  • Managing Network Security in Zones

Implement Labeled Security Using Trusted Extensions

  • Describing labeled security
  • Managing Trusted Extensions