Getting trained and certified as a Solaris Operating System (Solaris OS) system, network or security administrator is a great way to invest in your professional development. Sun certification can help you become a more valuable member of your IT organization and boost your career potential. IT managers know that the skills verified during the certification process are the same skills that can help lead to decreased time-to-market, increased productivity, less system failure, and higher employee satisfaction.
As we know that any IT certification path can be confusing and costly, Sun offers comprehensive Career Accelerator Packages (CAPs) that take the guesswork out of preparing for certification. Offered at little more than the instructor-led component sold individually, these packages provide an excellent value for your educational investment.
Sun CAPs can help ease the certification process by providing the right combination of classroom training, online training, online practice certification exams, and actual certification exams. The Administering Security on the Solaris Operating System course provides students with the skills to implement, administer, and maintain a secure Solaris Operating System (Solaris OS).
Students who can benefit from this course are system administrators or security administrators who are responsible for administering one or more homogeneous Solaris OSes or administering security on one or more Solaris OSes.
Prerequisites and Skills Gained To succeed fully in this course, students should be able to:
Demonstrate basic Solaris OS and network administration skills
Install the Solaris OS
Administer users, printers, file systems, networks, and devices on the Solaris OS
Demonstrate a basic understanding of Transmission Control Protocol/ Internet Protocol (TCP/IP) networking
Upon completion of this course, students should be able to:
Describe security terminology and common forms of security attack
Use Solaris OS logging and auditing to identify actual and potential security attacks
Secure a Solaris OS host against user and network attacks
Use tools, such as Solaris Security Toolkit (SST), to improve system security
Describe the role of system security
Describe security awareness
Describe historical examples of break-ins
Define security terminology
Classify security attacks
Examine the motivations of an attacker
Identify data gathering methods
Run an intrusion detection system
Define a security policy
Use open-source security tools
Explore the standard Solaris OS log files
Configure and use the system logging utility
Monitor log files using the swatch tool
Describe the process monitoring tools
Collect information using the Solaris OS accounting package
Configure Basic Security Module (BSM) auditing
Start and stop the BSM
Create an audit trail using the BSM
Generate an audit trail
Interpret and filter audit data
Implement BSM device management
Recognize Trojan horses
Identify backdoor attacks
Detect and prevent Trojan horse and backdoor attacks
Explain how rootkits can hide attackers
Identify DoS attacks
Administer regular users
Administer other accounts
Configure special user security
Limit user options with restricted shells
Describe password mechanisms
Run a password-cracking program
Control root access with Role-Based Access Control (RBAC)
Control root access with the sudo utility
Set up the root partition
Set file system permissions for security
Explore set-user-ID and set-group-ID permissions
Use access control lists (ACLs)
Examine other security defense mechanisms
Protect systems using backups and restores
Examine network sniffers
Explore network sniffer tools
Defend against network service attacks
Describe secure communication by using the Secure Socket Layer (SSL)
Configure SSL to encrypt and decrypt files
Apply network security probing tools
Describe using the GUI to configure the SAINT
Configure the SAINT network analysis tool
Interpret SAINT reports
Detect network analyzer attacks
Restrict network services
Defend network services
Use Berkeley r commands for remote connections
Secure services with the chroot command
Integrate services using PAM
Describe the SEAM
Describe system hardening
Describe system hardening using the Solaris Security Toolkit (SST)
Set up the SST
Describe network authentication using TCP wrappers
Configure host access control
Use banners with TCP wrappers
Assess the risk from physical intrusion
Apply physical security measures
Design the network to improve security
Run enterprise security audits
Explain the role of security audits
Identify common sources of security information
You can check availability and request a class online at www.sun.com/training/catalog/accelerator_solaris.html.