Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Solaris Security Administration
Solaris Training Overview

This four-day class enhances system administrations’ abilities to develop practical security measures on their Solaris machines. Students will be provided hand-on experience in addition to valuable security knowledge.

Solaris Training Audience

Administrators who must build/maintain a secure Solaris system in a networked environment.

Solaris Training Prerequisites

Solaris System Admin 1

Solaris Training Course duration

4 days

Solaris Training Course Objectives:

Upon successful completion of this course, students should:

  • Understand basic security concepts
  • Know how to create a security policy
  • Be able to secure user and system accounts
  • Know how to secure the file system
  • Know how to secure the boot sequence
  • Know how to handle the security risks processes present
  • Be able to secure cron and at
  • Know how to use audit files to improve system security
  • Be able to secure Solaris from programmed threatsknow how to secure the system from physical security
  • Be able to secure the system from network threats
Solaris Training Course outline

Module One Security Concepts

Module Two Creating a Security Policy

Module Three Securing User Accounts

Module Four Securing System Accounts

Module Five Securing the File System

Module Six System Startup and Processes

Module Seven cron and at

Module Eight Auditing

Module Nine Programmed Threats

Module Ten Physical Security

Module Eleven Network Security


Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved