EduMaster, s.r.o., skoleni solaris/ SC-300

Školení: SC-300

Administering Security on the Solaris OS

Nejbližší termíny:

Kurz není v nejbližší době naplánován. Kontaktujte nás a pokusíme se Vám vyjít vstříc.

Podrobnosti:

The Administering Security on the Solaris Operating System course provides students with the skills to implement, administer, and maintain a secure Solaris Operating System (Solaris OS).Students who can benefit from this courseSystem Administrators and Security Administrators who have responsibility for administering one or more homogeneous Solaris OS systems or administering security on one or more Solaris OS systems

Vstupní předpoklady:

  • Network Administration for the Solaris 10 Operating System (SA-300-S10)
  • Install the Solaris OS
  • Demonstrate basic Solaris OS system and network administration skills
  • Administer users, file systems, networks, and devices on the Solaris OS
  • Demonstrate a basic understanding of Transmission Control Protocol/Internet Protocol (TCP/IP) networking

Co se u nás naučíte:

  • Describe security terminology and common forms of security attack
  • Use Solaris OS logging and auditing to identify actual and potential security attacks
  • Secure a Solaris OS host against user and network attacks
  • Use tools, such as Solaris Security Toolkit (SST), to improve system security

Osnova:

Exploring Security

  • Describe the role of system security
  • Describe security awareness
  • Describe historical examples of break-ins
  • Classify security attacks
  • Identify data gathering methods
  • Run an intrusion detection system
  • Define a security policy
  • Use the open source security tools

Using Solaris OS Log Files

  • Explore the standard Solaris OS log files
  • Configure and use the system logging utility
  • Monitor log files using the swatch tool
  • Describe the process monitoring tools
  • Collect information using the Solaris OS accounting package

Examining the Solaris OS Basic Security Module (BSM)

  • Configure Basic Security Module (BSM) auditing
  • Start and stop the BSM
  • Create an audit trail using the BSM
  • Generate an audit trail
  • Interpret and filter audit data
  • Implement BSM device management

Preventing Security Attacks

  • Recognize Trojan horses
  • Identify back door attacks
  • Detect and prevent Trojan horse and back door attacks
  • Use rootkits to hide attackers
  • Identify DoS attacks

Administering User Accounts Securely

  • Administer regular users
  • Administer other accounts
  • Configure special user security
  • Limit user options with restricted shells

Administering Password Security

  • Describe password mechanisms
  • Run a password-cracking program

Securing Root Access

  • Control root access with role-based access control (RBAC)
  • Control root access with the sudo utility

Preventing File System Attacks

  • Set up the root partition
  • Set file system permissions for security
  • Explore set-user-ID and set-group-ID permissions
  • Use access control lists (ACLs)
  • Examine other security defense mechanisms
  • Protect systems using backups and restores

Auditing File Systems

  • Examine file system auditing
  • Explore file system auditing tools

Attacking Network Data

  • Examine network sniffers
  • Explore network sniffer tools
  • Defend against network service attacks

Securing Network Data

  • Describe secure communication by using the Secure Socket Layer (SSL)
  • Configure SSL to encrypt and decrypt files

Analyzing Network Services

  • Apply network security probing tools
  • Describe using the GUI to configure the SAINT
  • Configure the SAINT network analysis tool
  • Interpret SAINT reports
  • Detect network analyzer attacks

Securing Network Services

  • Restrict network services
  • Defend network services
  • Use Berkeley r commands for remote connections
  • Secure services with the chroot command
  • Integrate services using the PAM
  • Describe the SEAM

Automating Server Hardening

  • Describe system hardening
  • Describe system hardening using the Solaris Security Toolkit (SST)
  • Set up the SST

Authenticating Network Services

  • Describe network authentication using TCP wrappers
  • Configure host access control
  • Use banners with TCP wrappers

Securing Remote Access

  • Describe the benefits of Secure Shell
  • Configure Secure Shell

Securing Physical Access

  • Assess the risk from physical intrusion
  • Apply physical security measures

Connecting the Enterprise Network to the Outside World

  • Design the network to improve security
  • Run enterprise security audits
  • Explain the role of security audits
  • Identify common sources of security information

Získané autorizace:



Ostatní partnerské organizace: