Administering Security on the Solaris Operating System

RPS Consulting pvt Ltd
In Bangalore

Rs 25,000
+ VAT
You can also call the Study Centre
99019... More
Compare this course with other similar courses
See all

Important information

  • Course
  • Bangalore
  • Duration:
    5 Days
Description

Describe security terminology and common forms of security attack. Use Solaris OS logging and auditing to identify actual and potential security attacks. Secure a Solaris OS host against user and network attacks. Use tools, such as Solaris Security Toolkit (SST), to improve system security. PreRequisites

Important information
Venues

Where and when

Starts Location
On request
Bangalore
560 025, Karnataka, India
See map

Course programme


SC-300 Administering Security on the Solaris Operating System
Course Content :: Duration :: Course Fees
5 days

INR 25000.0 plus service taxes

Overview
The Administering Security on the Solaris Operating System course provides students with the skills to implement, administer, and maintain a secure Solaris Operating System (Solaris OS).

Objectives

Upon completion of this course, students should be able to:
· Describe security terminology and common forms of security attack
· Use Solaris OS logging and auditing to identify actual and potential security attacks
· Secure a Solaris OS host against user and network attacks
· Use tools, such as Solaris Security Toolkit (SST), to improve system security

PreRequisites

To succeed fully in this course, students should be able to:
· Demonstrate basic Solaris OS system and network administration skills
· Install the Solaris OS
· Administer users, printers, file systems, networks, and devices on the Solaris OS
· Demonstrate a basic understanding of Transmission Control Protocol/Internet Protocol (TCP/IP) networking

Who Can Benefit

Students who can benefit from this course are system administrators or security administrators who have responsibility for administering one or more homogeneous Solaris OS systems or administering security on one or more Solaris OS systems.

Duration :5 days

Course Fees :INR 25000.0 plus service taxes

INR 28090.00 inclusive of service taxes

Course Content :
Exploring Security
· Describe the role of system security
· Describe security awareness
· Describe historical examples of break-ins
· Define security terminology
· Classify security attacks
· Examine the motivations of an attacker
· Identify data gathering methods
· Run an intrusion detection system
· Define a security policy
· Use the open source security tools

Using Solaris OS Log Files
· Explore the standard Solaris OS log files
· Configure and use the system logging utility
· Monitor log files using the swatch tool
· Describe the process monitoring tools
· Collect information using the Solaris OS accounting package

Examining the Solaris OS Basic Security Module (BSM)
· Configure Basic Security Module (BSM) auditing
· Start and stop the BSM
· Create an audit trail using the BSM
· Generate an audit trail
· Interpret and filter audit data
· Implement BSM device management

Preventing Security Attacks
· Recognize Trojan horses
· Identify back door attacks
· Detect and prevent Trojan horse and back door attacks
· Use rootkits to hide attackers
· Identify DoS attacks

Administering User Accounts Securely
· Administer regular users
· Administer other accounts
· Configure special user security
· Limit user options with restricted shells

Administering Password Security
· Describe password mechanisms
· Run a password-cracking program

Securing Root Access
· Control root access with role-based access control (RBAC)
· Control root access with the sudo utility

Preventing File System Attacks
· Set up the root partition
· Set file system permissions for security
· Explore set-user-ID and set-group-ID permissions
· Use access control lists (ACLs)
· Examine other security defense mechanisms
· Protect systems using backups and restores

Auditing File Systems
· Examine file system auditing
· Explore file system auditing tools

Attacking Network Data
· Examine network sniffers
· Explore network sniffer tools
· Defend against network service attacks

Securing Network Data
· Describe secure communication by using the Secure Socket Layer (SSL)
· Configure SSL to encrypt and decrypt files

Analyzing Network Services
· Apply network security probing tools
· Describe using the GUI to configure the SAINT
· Configure the SAINT network analysis tool
· Interpret SAINT reports
· Detect network analyzer attacks

Securing Network Services
· Restrict network services
· Defend network services
· Use Berkeley r commands for remote connections
· Secure services with the chroot command
· Integrate services using the PAM
· Describe the SEAM

Automating Server Hardening
· Describe system hardening
· Describe system hardening using the Solaris Security Toolkit (SST)
· Set up the SST

Authenticating Network Services
· Describe network authentication using TCP wrappers
· Configure host access control
· Use banners with TCP wrappers

Securing Remote Access
· Describe the benefits of Secure Shell
· Configure Secure Shell

Securing Physical Access
· Assess the risk from physical intrusion
· Apply physical security measures

Connecting the Enterprise Network to the Outside World
· Design the network to improve security
· Run enterprise security audits
· Explain the role of security audits
· Identify common sources of security information

Related Courses (Before)

Related Courses (After)


Compare this course with other similar courses
See all