OR203

Ladda ner som PDF

Oracle Solaris 11 Security Administration Ed 2

What you will learn
This Oracle Solaris 11 Security Administration training helps you develop the knowledge and skills to customize security on the Oracle Solaris 11 operating system. Expert Oracle University instructors will help you explore new security features included in Oracle Solaris 11.1 and Oracle Solaris 11.2; learn how to use these features to reduce the risk of intrusion and secure both applications and data.

Målgrupp

Network Administrator
Security Administrators
System Administrator

Förkunskaper

Administer network and process on Oracle Solaris 11 systems
Administer services and zones on Oracle Solaris 11 systems
Administer users, packages, and applications on Oracle Solaris 11 systems
Perform system installation
Oracle Solaris 11 System Administration Ed 4
Oracle Solaris 11 Advanced System Administration Ed 4
UNIX and Linux Essentials
Suggested Prerequisites
Shell Programming Ed 1

Learn To:
Describe important security principles and technologies.
Secure user rights, process rights, files and file system.
Implement cryptographic services, network security, zones security and labeled security.
Administer system security and services.
Monitor file integrity and security related system events.

Benefits to You
When you walk away from this course, you'll leave with a better understanding of the Oracle Solaris 11.2 security
administration and new enhancements done to the OS. This allows you to run your most demanding enterprise
applications in private, hybrid, or public clouds. This course will also help you effectively create a security plan, while
implementing and monitoring security on a Solaris 11 system.
Develop Oracle Solaris 11.2 OS Expertise
This course builds on the system administration skills taught in the Oracle Solaris 11.2 System Administration courses.
You'll work with expert Oracle University instructors to develop a deep understanding of Oracle Solaris 11.2 security
features that you can leverage in your day-to-day job.

Please Note
If you don't have Oracle Solaris 11 system administration experience, you should first take the Oracle Solaris 11 System
Administration and Oracle Solaris 11 Advanced System Administration course first to ensure an effective knowledge of
Oracle Solaris 11 system administration before attempting to take this specialty course.... Läs mer

Learn To:
Describe important security principles and technologies.
Secure user rights, process rights, files and file system.
Implement cryptographic services, network security, zones security and labeled security.
Administer system security and services.
Monitor file integrity and security related system events.

Benefits to You
When you walk away from this course, you'll leave with a better understanding of the Oracle Solaris 11.2 security
administration and new enhancements done to the OS. This allows you to run your most demanding enterprise
applications in private, hybrid, or public clouds. This course will also help you effectively create a security plan, while
implementing and monitoring security on a Solaris 11 system.
Develop Oracle Solaris 11.2 OS Expertise
This course builds on the system administration skills taught in the Oracle Solaris 11.2 System Administration courses.
You'll work with expert Oracle University instructors to develop a deep understanding of Oracle Solaris 11.2 security
features that you can leverage in your day-to-day job.

Please Note
If you don't have Oracle Solaris 11 system administration experience, you should first take the Oracle Solaris 11 System
Administration and Oracle Solaris 11 Advanced System Administration course first to ensure an effective knowledge of
Oracle Solaris 11 system administration before attempting to take this specialty course. Those with Oracle Solaris 10
experience should take the Transition to Oracle Solaris 11 course, as it builds on your Oracle Solaris 10 knowledge and
provides training more tailored to your background.

Course Objectives
Administer system security
Identify key Oracle Solaris 11 security technologies
Secure users and processes
Audit the system
Use cryptographic services for encryption and decryption
Secure files and file system
Monitor systems for file integrity
Implement network security
Manage services
Implement security in zones
Implement labeled security
Describe important security principles and features

Introduction
Overview
Course Goals
Course Agenda
Introductions
Your Learning Center
Your lab environment

Planning for basic securityEvaluating Security Principles
Analyzing the need for a Security Policy
Configuring Systems Securely
Performing a Security Audit
Evaluating the need for upgrading systems

Identifying Oracle Solaris 11 Security Technologies
Describe Oracle Solaris 11 OS Security
Exploring Oracle Solaris 11 Security Features

Securing Users and Processes
Introducing user and process rights
Managing user rights
Managing process rights

Using the Oracle Solaris Cryptographic Services
Describing Cryptographic Services
Implementing the Cryptographic Framework
Implementing Key Management Framework (KMF)

Auditing in Oracle Solaris
Describing Oracle Solaris Auditing
Configuring Oracle Solaris Auditing
Administering the audit service
Managing the audit records

Securing Files and File System
Managing ZFS File System Security
Verifying File Integrity
Controlling Access to Files

Administering System Security
Protecting System integrity
Controlling System Access
Controlling Access to Devices

Implement PAM to Authenticate Users
Implementing Basic Network Security
Establishing network security
Implementing Secure Shell
Implementing TCP Wrappers
Implementing Kerberos Protocol
Implement IPsec and IKE
Secure remotely accesses file systems

Securing Network by Using Packet Filtering
Implementing IP Filter
Configuring the IP rule sets
Configuring the IP Filter Service

Managing Services
Describing SMF Configuration
Managing Services

Implementing Security in Oracle Solaris Zones
Describing Zones Security
Integrating Security Features into Zones
Managing Resources in Zones
Managing Network Security in Zones

Implementing Labeled Security Using Trusted Extensions
Describing labeled security
Managing Trusted Extensions

Utbildningen levereras i samarbete med

Kurs-ID: OR203
Längd: 5 dagar
Pris exkl moms: 30 000 kr
Kan betalas med:
TRAINING CARD

Avtalsrabatter och kampanjer kan ej nyttjas på denna kurs.


Lämna dina kontaktuppgifter om du önskar en företagsintern utbildning.

Tipsa