Classroom Training
  Solaris Web-based Training
  Self-Paced Hardware Training
  Self-Paced Solaris Training
  Certification / Testing
  Solaris Courses


    > Training > Solaris Training Courses > Administering Security on the Solaris Operating System > Detailed Outline

Administering Security on the Solaris Operating System
Detailed Outline

Exploring Security
· Describe the role of system security
· Describe security awareness
· Describe historical examples of break-ins
· Define security terminology
· Classify security attacks
· Examine the motivations of an attacker
· Identify data gathering methods
· Run an intrusion detection system
· Define a security policy
· Use the open source security tools

Using Solaris OS Log Files
· Explore the standard Solaris OS log files
· Configure and use the system logging utility
· Monitor log files using the swatch tool
· Describe the process monitoring tools
· Collect information using the Solaris OS accounting package

Examining the Solaris OS Basic Security Module (BSM)
· Configure Basic Security Module (BSM) auditing
· Start and stop the BSM
· Create an audit trail using the BSM
· Generate an audit trail
· Interpret and filter audit data
· Implement BSM device management

Preventing Security Attacks
· Recognize Trojan horses
· Identify back door attacks
· Detect and prevent Trojan horse and back door attacks
· Use rootkits to hide attackers
· Identify DoS attacks

Administering User Accounts Securely
· Administer regular users
· Administer other accounts
· Configure special user security
· Limit user options with restricted shells

Administering Password Security
· Describe password mechanisms
· Run a password-cracking program

Securing Root Access
· Control root access with role-based access control (RBAC)
· Control root access with the sudo utility

Preventing File System Attacks
· Set up the root partition
· Set file system permissions for security
· Explore set-user-ID and set-group-ID permissions
· Use access control lists (ACLs)
· Examine other security defense mechanisms
· Protect systems using backups and restores

Auditing File Systems
· Examine file system auditing
· Explore file system auditing tools

Attacking Network Data
· Examine network sniffers
· Explore network sniffer tools
· Defend against network service attacks

Securing Network Data
· Describe secure communication by using the Secure Socket Layer (SSL)
· Configure SSL to encrypt and decrypt files

Analyzing Network Services
· Apply network security probing tools
· Describe using the GUI to configure the SAINT
· Configure the SAINT network analysis tool
· Interpret SAINT reports
· Detect network analyzer attacks

Securing Network Services
· Restrict network services
· Defend network services
· Use Berkeley r commands for remote connections
· Secure services with the chroot command
· Integrate services using the PAM
· Describe the SEAM

Automating Server Hardening
· Describe system hardening
· Describe system hardening using the Solaris Security Toolkit (SST)
· Set up the SST

Authenticating Network Services
· Describe network authentication using TCP wrappers
· Configure host access control
· Use banners with TCP wrappers

Securing Remote Access
· Describe the benefits of Secure Shell
· Configure Secure Shell

Securing Physical Access
· Assess the risk from physical intrusion
· Apply physical security measures

Connecting the Enterprise Network to the Outside World
· Design the network to improve security
· Run enterprise security audits
· Explain the role of security audits
· Identify common sources of security information