Sunteți pe pagina 1din 3

Oracle University | Contact Us: +34916267792

Oracle Solaris 11 Security Administration

Duration: 5 Days

What you will learn


The Oracle Solaris 11 Security Administration course provides students with the knowledge and skills to customize
security on the Oracle Solaris 11 operating system. Students will learn about new security features in Solaris 11 and
how to use these features to reduce the risk of intrusion and secure both applications and data. This course will help
students to effectively create a security plan as well as implement and monitor security on a Solaris 11 system.

A Live Virtual Class (LVC) is exclusively for registered students; unregistered individuals may not view an LVC at any
time. Registered students must view the class from the country listed in the registration form. Unauthorized recording,
copying, or transmission of LVC content may not be made.

Audience
Network Administrator
Security Administrators
System Administrator

Related Training

Required Prerequisites

Describe basic system and network security concepts

Administer networking and routing on Oracle Solaris 11 systems

Administer services and zones on Oracle Solaris 11 systems

Administer users, packages, and applications on Oracle Solaris 11 systems

Oracle Solaris 11 System Administration

Oracle Solaris 11 Advanced System Administration

Transition to Oracle Solaris 11

Course Objectives
Describe important Security principles and features

Identify key Oracle Solaris 11 security technologies

Administer roles, rights, profiles, and privileges

Copyright © 2013, Oracle. All rights reserved. Page 1


Administer system security

Monitor systems for file integrity

Implement network security

Control and manage services

Implement Security in Zones

Use cryptographic services for encryption and decryption

Audit the system

Implement Labeled Security

Course Topics

Introduction
Course Goals
Course Agenda
Introductions
Your lab environment

Planning for Basic Security


Evaluating security principles
Analyzing the need for a security policy
Configuring systems securely
Performing a security audit
Evaluating the need for upgrading systems

Identifying Oracle Solaris 11 Security Technologies


Introducing the Oracle Solaris 11 operating system
Exploring Oracle Solaris 11 security technologies

Administering Roles, Rights, Profiles and Privileges


Planning for RBAC and privileges implementation
Configuring and using RBAC
Configuring and managing privileges

Using the Oracle Solaris Cryptographic Services


Planning for cryptographic services
Using the Cryptographic Framework
Using the Key Management Framework

Auditing in Oracle Solaris


Planning for Oracle Solaris Auditing
Configuring Oracle Solaris Auditing
Administering the audit service
Managing the audit records

Copyright © 2013, Oracle. All rights reserved. Page 2


Securing Files and the File System
Managing ZFS File System Security
Verifying File Integrity
Controlling Access to Files

Administering System Security


Controlling Access to Systems
Controlling Access to Devices
Using PAM to Authenticate Users

Implementing Basic Network Security


Planning for basic network security
Using Secure Shell
Using TCP Wrappers
Using Kerberos protocol
Using IPsec and IKE
Securing remotely accessed file systems

Securing Network Using Packet Filtering


Planning for IP Filter Implementation
Configuring the IP rules set
Configuring IP Filter

Controlling and Managing Services


Planning for SMF Configuration
Managing Services

Implementing Security in Oracle Solaris Zones


Planning for Security in Zones
Integrating Security Features into Zones
Managing Resources in Zones
Managing Network Security in Zones

Implementing Labeled Security by Using Trusted Extensions


Planning for Labeled Security
Managing Trusted Extensions

Copyright © 2013, Oracle. All rights reserved. Page 3

S-ar putea să vă placă și