Solaris Trusted Extensions Installation, Configuration and Administration

Course Details
Code: STEI-CA
Tuition (USD): $3,500.00 • Classroom (5 days)

Solaris Trusted Extensions Installation, Configuration, and Administration provide students with the knowledge to enable, configure, and administer Solaris Trusted Extensions software on a system, running the Solaris 10 Operating System. The course teaches students how to design and configure Trusted Extensions security label mechanisms, use extended security features of the two graphical desktops, compartmentalize system administrator powers, and control privileges and authorizations.

The course focuses on additional features which enhance system security such as auditing, controlling access to removable media devices, managing local and remote file systems, configuring labeled networking and labeled printing, setting up LDAP on Trusted Extensions, and migrating from Trusted Solaris 8 to Solaris Trusted Extensions.

Students who can benefit from this course:
  • System Administrators and Security Administrators who are responsible for installing, configuring and managing labeled systems. Systems Integrators and Designers of classified government systems or commercial systems with high-security data protection needs can also benefit from this course

This course counts towards the Hands-on course requirement for the Oracle Solaris 10 Security Administrator Certification. Only instructor-led inclass or instructor-led online formats of this course will meet the Certification Hands-on Requirement. Self Study CD-Rom and Knowledge Center courses DO NOT meet the Hands-on Requirement.

Suggested Audience

Skills Gained

  • Install the Trusted Extensions package onto a Solaris 10 system
  • Create and configure labeled zones
  • Configure labeled networking in the labeled zones
  • Design a security labeling scheme
  • Implement a security labeling scheme with the label_encodings data base
  • Apply the principle of least privilege to processes and users, and use privileges to grant additional rights to processes
  • Use authorizations to grant rights to users
  • Use the Service Management Facility to configure Solaris Trusted Extensions services and to secure Solaris services
  • Configure the auditing system to audit user and kernel activity
  • Configure networking between Solaris Trusted Extensions systems and other labeled and unlabeled systems
  • Configure NFS and LOFS file system types in a labeled environment

Prerequisites

  • System Administration for the Solaris 10 Operating System Part 2 (SA-202-S10)
  • Solaris 10 ZFS Administration (SA-2290-S10)
  • Install and configure the Solaris 10 operating system
  • Perform basic Solaris network configuration tasks
  • Administer Solaris 10 systems
  • Configure Solaris 10 system features such as zones and file
  • Display an understanding of data separation requirements in high-security environments

Course Details

Introducing Trusted Extensions Features

Trusted Extensions Installation

Trusted Extensions Configuration

Access Controls

User Interface Changes: Trusted CDE and TJDS

Configuring and Installing the label_encodings File

Configure Privileges, Authorizations, Rights Profiles, and Roles

Perform Service Management in Solaris Trusted Extensions

Device Allocation

Auditing a Solaris Trusted Extensions (TX) System

Networking Solaris Trusted Extensions Systems

NFS and LOFS File Systems

Solaris Trusted Extensions Printing

Configuring LDAP

Migrating From Trusted Solaris 8 to Solaris Trusted Extensions

Installing Unbundled Applications