Introduction
Course Goals
Course Agenda
Introductions
Your lab environment
Planning for Basic Security
Evaluating security principles
Analyzing the need for a security policy
Configuring systems securely
Performing a security audit
Evaluating the need for upgrading systems
Identifying Oracle Solaris 11 Security Technologies
Introducing the Oracle Solaris 11 operating system
Exploring Oracle Solaris 11 security technologies
Administering Roles, Rights, Profiles and Privileges
Planning for RBAC and privileges implementation
Configuring and using RBAC
Configuring and managing privileges
Using the Oracle Solaris Cryptographic Services
Planning for cryptographic services
Using the Cryptographic Framework
Using the Key Management Framework
Auditing in Oracle Solaris
Planning for Oracle Solaris Auditing
Configuring Oracle Solaris Auditing
Administering the audit service
Managing the audit records
Securing Files and the File System
Managing ZFS File System Security
Verifying File Integrity
Controlling Access to Files
Administering System Security
Controlling Access to Systems
Controlling Access to Devices
Using PAM to Authenticate Users
Implementing Basic Network Security
Planning for basic network security
Using Secure Shell
Using TCP Wrappers
Using Kerberos protocol
Using IPsec and IKE
Securing remotely accessed file systems
Securing Network Using Packet Filtering
Planning for IP Filter Implementation
Configuring the IP rules set
Configuring IP Filter
Controlling and Managing Services
Planning for SMF Configuration
Managing Services
Implementing Security in Oracle Solaris Zones
Planning for Security in Zones
Integrating Security Features into Zones
Managing Resources in Zones
Managing Network Security in Zones
Implementing Labeled Security by Using Trusted Extensions
Planning for Labeled Security
Managing Trusted Extensions