Previous Page
Next Page

The Sun Exam Preparation Course

Getting trained and certified as a Solaris Operating System (Solaris OS) system, network or security administrator is a great way to invest in your professional development. Sun certification can help you become a more valuable member of your IT organization and boost your career potential. IT managers know that the skills verified during the certification process are the same skills that can help lead to decreased time-to-market, increased productivity, less system failure, and higher employee satisfaction.

As we know that any IT certification path can be confusing and costly, Sun offers comprehensive Career Accelerator Packages (CAPs) that take the guesswork out of preparing for certification. Offered at little more than the instructor-led component sold individually, these packages provide an excellent value for your educational investment.

The Sun Career Accelerator Package for Advanced Security Administrators

Sun CAPs can help ease the certification process by providing the right combination of classroom training, online training, online practice certification exams, and actual certification exams. The Administering Security on the Solaris Operating System course provides students with the skills to implement, administer, and maintain a secure Solaris Operating System (Solaris OS).

Students who can benefit from this course are system administrators or security administrators who are responsible for administering one or more homogeneous Solaris OSes or administering security on one or more Solaris OSes.

Prerequisites and Skills Gained  To succeed fully in this course, students should be able to:

  • Demonstrate basic Solaris OS and network administration skills

  • Install the Solaris OS

  • Administer users, printers, file systems, networks, and devices on the Solaris OS

  • Demonstrate a basic understanding of Transmission Control Protocol/ Internet Protocol (TCP/IP) networking

Upon completion of this course, students should be able to:

  • Describe security terminology and common forms of security attack

  • Use Solaris OS logging and auditing to identify actual and potential security attacks

  • Secure a Solaris OS host against user and network attacks

  • Use tools, such as Solaris Security Toolkit (SST), to improve system security

Course Content

Module 1: Exploring Security

  • Describe the role of system security

  • Describe security awareness

  • Describe historical examples of break-ins

  • Define security terminology

  • Classify security attacks

  • Examine the motivations of an attacker

  • Identify data gathering methods

  • Run an intrusion detection system

  • Define a security policy

  • Use open-source security tools

Module 2: Using Solaris OS Log Files

  • Explore the standard Solaris OS log files

  • Configure and use the system logging utility

  • Monitor log files using the swatch tool

  • Describe the process monitoring tools

  • Collect information using the Solaris OS accounting package

Module 3: Examining the Solaris OS Basic Security Module (BSM)

  • Configure Basic Security Module (BSM) auditing

  • Start and stop the BSM

  • Create an audit trail using the BSM

  • Generate an audit trail

  • Interpret and filter audit data

  • Implement BSM device management

Module 4: Preventing Security Attacks

  • Recognize Trojan horses

  • Identify backdoor attacks

  • Detect and prevent Trojan horse and backdoor attacks

  • Explain how rootkits can hide attackers

  • Identify DoS attacks

Module 5: Administering User Accounts Securely

  • Administer regular users

  • Administer other accounts

  • Configure special user security

  • Limit user options with restricted shells

Module 6: Administering Password Security

  • Describe password mechanisms

  • Run a password-cracking program

Module 7: Securing Root Access

  • Control root access with Role-Based Access Control (RBAC)

  • Control root access with the sudo utility

Module 8: Preventing File System Attacks

  • Set up the root partition

  • Set file system permissions for security

  • Explore set-user-ID and set-group-ID permissions

  • Use access control lists (ACLs)

  • Examine other security defense mechanisms

  • Protect systems using backups and restores

Module 9: Auditing File Systems

  • Examine file system auditing

  • Explore file system auditing tools

Module 10: Attacking Network Data

  • Examine network sniffers

  • Explore network sniffer tools

  • Defend against network service attacks

Module 11: Securing Network Data

  • Describe secure communication by using the Secure Socket Layer (SSL)

  • Configure SSL to encrypt and decrypt files

Module 12: Analyzing Network Services

  • Apply network security probing tools

  • Describe using the GUI to configure the SAINT

  • Configure the SAINT network analysis tool

  • Interpret SAINT reports

  • Detect network analyzer attacks

Module 13: Securing Network Services

  • Restrict network services

  • Defend network services

  • Use Berkeley r commands for remote connections

  • Secure services with the chroot command

  • Integrate services using PAM

  • Describe the SEAM

Module 14: Automating Server Hardening

  • Describe system hardening

  • Describe system hardening using the Solaris Security Toolkit (SST)

  • Set up the SST

Module 15: Authenticating Network Services

  • Describe network authentication using TCP wrappers

  • Configure host access control

  • Use banners with TCP wrappers

Module 16: Securing Remote Access

  • Describe the benefits of Secure Shell

  • Configure Secure Shell

Module 17: Securing Physical Access

  • Assess the risk from physical intrusion

  • Apply physical security measures

Module 18: Connecting the Enterprise Network to the Outside World

  • Design the network to improve security

  • Run enterprise security audits

  • Explain the role of security audits

  • Identify common sources of security information

You can check availability and request a class online at www.sun.com/training/catalog/accelerator_solaris.html.


Previous Page
Next Page