Administering Security on the Solaris Operating System
Course
In Bangalore
Description
-
Type
Course
-
Location
Bangalore
-
Duration
5 Days
Describe security terminology and common forms of security attack. Use Solaris OS logging and auditing to identify actual and potential security attacks. Secure a Solaris OS host against user and network attacks. Use tools, such as Solaris Security Toolkit (SST), to improve system security. PreRequisites
Facilities
Location
Start date
Start date
Reviews
Course programme
SC-300 Administering Security on the Solaris Operating System
Course Content :: Duration :: Course Fees
5 days
INR 25000.0 plus service taxes
Overview
The Administering Security on the Solaris Operating System course provides students with the skills to implement, administer, and maintain a secure Solaris Operating System (Solaris OS).
Objectives
Upon completion of this course, students should be able to:
· Describe security terminology and common forms of security attack
· Use Solaris OS logging and auditing to identify actual and potential security attacks
· Secure a Solaris OS host against user and network attacks
· Use tools, such as Solaris Security Toolkit (SST), to improve system security
PreRequisites
To succeed fully in this course, students should be able to:
· Demonstrate basic Solaris OS system and network administration skills
· Install the Solaris OS
· Administer users, printers, file systems, networks, and devices on the Solaris OS
· Demonstrate a basic understanding of Transmission Control Protocol/Internet Protocol (TCP/IP) networking
Who Can Benefit
Students who can benefit from this course are system administrators or security administrators who have responsibility for administering one or more homogeneous Solaris OS systems or administering security on one or more Solaris OS systems.
Duration :5 days
Course Fees :INR 25000.0 plus service taxes
INR 28090.00 inclusive of service taxes
Course Content :
Exploring Security
· Describe the role of system security
· Describe security awareness
· Describe historical examples of break-ins
· Define security terminology
· Classify security attacks
· Examine the motivations of an attacker
· Identify data gathering methods
· Run an intrusion detection system
· Define a security policy
· Use the open source security tools
Using Solaris OS Log Files
· Explore the standard Solaris OS log files
· Configure and use the system logging utility
· Monitor log files using the swatch tool
· Describe the process monitoring tools
· Collect information using the Solaris OS accounting package
Examining the Solaris OS Basic Security Module (BSM)
· Configure Basic Security Module (BSM) auditing
· Start and stop the BSM
· Create an audit trail using the BSM
· Generate an audit trail
· Interpret and filter audit data
· Implement BSM device management
Preventing Security Attacks
· Recognize Trojan horses
· Identify back door attacks
· Detect and prevent Trojan horse and back door attacks
· Use rootkits to hide attackers
· Identify DoS attacks
Administering User Accounts Securely
· Administer regular users
· Administer other accounts
· Configure special user security
· Limit user options with restricted shells
Administering Password Security
· Describe password mechanisms
· Run a password-cracking program
Securing Root Access
· Control root access with role-based access control (RBAC)
· Control root access with the sudo utility
Preventing File System Attacks
· Set up the root partition
· Set file system permissions for security
· Explore set-user-ID and set-group-ID permissions
· Use access control lists (ACLs)
· Examine other security defense mechanisms
· Protect systems using backups and restores
Auditing File Systems
· Examine file system auditing
· Explore file system auditing tools
Attacking Network Data
· Examine network sniffers
· Explore network sniffer tools
· Defend against network service attacks
Securing Network Data
· Describe secure communication by using the Secure Socket Layer (SSL)
· Configure SSL to encrypt and decrypt files
Analyzing Network Services
· Apply network security probing tools
· Describe using the GUI to configure the SAINT
· Configure the SAINT network analysis tool
· Interpret SAINT reports
· Detect network analyzer attacks
Securing Network Services
· Restrict network services
· Defend network services
· Use Berkeley r commands for remote connections
· Secure services with the chroot command
· Integrate services using the PAM
· Describe the SEAM
Automating Server Hardening
· Describe system hardening
· Describe system hardening using the Solaris Security Toolkit (SST)
· Set up the SST
Authenticating Network Services
· Describe network authentication using TCP wrappers
· Configure host access control
· Use banners with TCP wrappers
Securing Remote Access
· Describe the benefits of Secure Shell
· Configure Secure Shell
Securing Physical Access
· Assess the risk from physical intrusion
· Apply physical security measures
Connecting the Enterprise Network to the Outside World
· Design the network to improve security
· Run enterprise security audits
· Explain the role of security audits
· Identify common sources of security information
Related Courses (Before)
Related Courses (After)
Administering Security on the Solaris Operating System