Solaris Security Training
Solaris Security Online Training Course Content
Planning for Basic Security
- Evaluating the security principles
- security policy
- Systems securely
- Performing a security audit
- Need for upgrading systems
- Identifying Oracle Solaris 11 Security Technologies
- Administering Roles, Rights, Profiles & Privileges
- Planning for RBAC & privileges implementation
- RBAC
- Privileges
- Oracle Solaris Cryptographic Services
- Planning for cryptographic services
- Cryptographic Framework
- Key Management Framework
Auditing in Oracle Solaris
- Planning
- Oracle Solaris Auditing
- Administering & Managing the audit service & records
- Securing Files & the File System
- ZFS File System Security
- Verifying File Integrity
- Access to Files
- Administering System Security
- Controlling Access to Systems & Devices
- PAM to Authenticate Users
- Implementing Basic Network Security
- Planning for basic network security
- Secure Shell
- TCP Wrappers
- Kerberos protocol
- IPsec & IKE
- Securing remotely accessed file systems
Securing Network Using Packet Filtering
- Planning for IP Filter Implementation
- Configuring the IP rules set & IP Filter
- Controlling & Managing Services
- SMF Configuration
- Managing the Services
- Implementing Security in Oracle Solaris Zones
- Planning for Security in Zones
- Integrating the Security Features into Zones
- Managing the Resources in Zones
- Managing the Network Security in Zones
- Implementing Labeled Security
- Planning for Labeled Security
- Managing Trusted Extensions