Configuring Security on the Oracle Solaris 10 Operating System/1Z0-881

Configuring Security on the Oracle Solaris 10 Operating System Certification Training Course Overview

This certification is meant for professionals with experience in managing security-based tasks in an Oracle Solaris OS environment. Individuals who thoroughly understand the features of Solaris and Unix OS, should attend this training.

The course offers exposure in high class features that let you secure business applications and data. It enables security administrators to implement a robust foundation for securely deploying services. The training makes students capable of implementing features like IPsec, hardening a system, Solaris security toolkit (SST). It also lets them customize security essentials as per business requirements.

This course prepares you for Exam 1Z0-881.

Configuring Security on the Oracle Solaris 10 Operating System (40 Hours) Download Course Contents

Live Virtual Classroom Fee On Request
Group Training Date On Request
1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here
Hire Our Trainers! Click here

Course Modules

Module 1: Basic Security Principles
  • Evaluate Security Principles
  • Need for a Security Policy
  • Configuring Systems Securely
  • Performing Security Audit
  • Need for Patching
Module 2: Oracle Solaris 10 Security Features
  • Secure by Default
  • Process Rights Management
  • User Rights Management
  • Solaris Cryptographic Framework
  • Basic Audit Reporting Tool
  • Oracle Solaris Service Management Facility
  • Solaris IP Filter
  • Solaris Secure Shell
Module 3: Minimal and Reduced Installation
  • Minimal Installation: A Type of Reduced Installation
  • Software Installation Clusters
  • Providing a Consistent, Known Configuration for Installations
Module 4: Hardening a System
  • Performing Hardening
  • Implementing the Solaris Security Toolkit (SST)
Module 5: Implementing Process Rights Management
  • Process Rights Management
  • Process Privileges
  • Determining Process Rights Requirements
  • Debugging Privileges
  • Assigning Privileges to an Executable
  • Assigning Privileges to a User
Module 6: Implementing User Rights and Password Management
  • User Access Controls
  • RBAC Overview
  • The RBAC Databases
  • Using RBAC to Manage User Rights
  • Using the Rights That You Are Assigned
  • Managing Passwords
Module 7: Using the Solaris Cryptographic Framework
  • The Solaris Cryptographic Framework
  • Solaris Cryptographic Framework User-Level Commands
  • Solaris Cryptographic Framework Administration Tools
  • Framework Management
  • Solaris Cryptographic Framework with a Web Server
  • Solaris Cryptographic Framework with a Java-Based Application
  • Solaris Cryptographic Framework with Cryptographic Accelerators
Module 8: Monitoring File Integrity
  • Verifying File Integrity
  • Using BART
  • Signed ELF Objects
Module 9: Using the Oracle Solaris Service Management Facility
  • Oracle Solaris Service Management Facility
  • Least Privilege and SMF
  • Authorizations and Rights
  • Service-Specific Property Groups
  • Limiting Service Privileges
  • Determining a Current Service’s Privileges
  • Configuring a Service to Use Reduced Privileges
Module 10: Securing Networks
  • Network Security
  • Network Access Control
  • TCP Wrappers
  • Using Authentication with Encryption
  • Using Solaris SSH
  • Using Kerberos Authentication
  • Securing Remotely Accessed File Systems with the NFS Service
Module 11: Implementing IPsec and IKE
  • Introduction to IPsec
  • Creating a simple IPsec security policy
  • Key Management for IPsec
  • Configuring Keys for IPsec
  • Configuring IPsec Policy with Keying Material
  • Troubleshooting IPsec Configurations
Module 12: Oracle Solaris Auditing
  • Oracle Solaris Auditing
  • Configuring Oracle Solaris Auditing
  • Configuring Audit Policy
  • Preselecting Audit Events and Classes
  • Specifying Audit File Systems
  • Alerting the Audit Administrator
  • Excepting Users From System-Wide Audit Selections
  • Enabling and Disabling Auditing
Module 13: Security and Oracle Solaris Zones
  • Security Characteristics of Oracle Solaris Zones
  • Zone Integration with Oracle Solaris 10 Security Features
  • The Global Zone
  • When and How to Use Oracle Solaris Zones
  • Resource Management in Oracle Solaris Zones
  • Auditing in Oracle Solaris Zones
  • Oracle Solaris Zones and Network Security
  • Patching Oracle Solaris Zones
Module 14: How Security Components Work Together
  • Security Components Integration
  • Security Technologies Interaction
  • Infrastructure Requirements
Download Course Contents

Request More Information

Course Prerequisites
  • Administer users, packages, and applications on Solaris 10 systems
  • Administer networking and routing on Solaris 10 systems
  • Describe basic system and network security concepts
  • Administer services and zones on Solaris 10 systems
  • Oracle Certified Professional, Oracle Solaris 10 System Administrator
  • Network Administration for the Oracle Solaris 10 Operating System
  • Regular Track: Any candidate with basic knowledge of Oracle Solaris 10.
  • Fast Track: Candidate with intermediate knowledge of Oracle Solaris 10.
  • Super Fast Track: Candidate with strong knowledge of Oracle Solaris 10.

Upon Completion of this Course, you will accomplish following:-

  • secure business applications and data
  • implement a robust foundation for securely deploying services
  • implementing features like IPsec
  • hardening a system
  • customize security essentials as per business requirements.

Give an edge to your career with Oracle certification training courses. Students can join the classes for Oracle Solaris 10 Security Administrator Expert Training Course at Koenig Campus located at New Delhi, Bengaluru, Shimla, Goa, Dehradun, Dubai & Instructor-Led Online.