Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Advanced Solaris Systems Administration
(Network management/setup, security issues, performance)
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Unix training, Linux training, Solaris training, AIX training, HP-UX training and OpenVMS training

Solaris Training Overview

This course will teach the commands and methods needed to setup and manage advanced features in a Solaris system. The course will also use a problem solving approach in the lab exercises to teach system managers the proper application of advanced features.

Systems: Sun Solaris versions 8,9,10, running on Intel or x86/x64 platforms

Solaris Training Prerequisites

It is assumed that the participant has successfully completed the Fundamentals of Solaris, and the Solaris Systems Administration course or equivalent system time as a user.

Solaris Training Course duration

This course normally requires four (4) days, approximately 50% lecture, and 50% lab time.

Solaris Training Course Objectives

On completion of this course, a systems administrator should be able to implement security features for the system and it's users; enable communications via networks; define name service capabilities; and use advanced options and setups for system users.

Solaris Training Course outline

Networking Management

Review of System Concepts for Systems Administrators

        Process concepts
        Shell command usage and review

Advanced Network Features

         Review of network basic setup
        Subnet addressing
        Using arp (address resolution protocol)
        Network statistics
        Controlling the inetd process via inetadm/svcadm
        Miscellaneous network commands/tools

File Transfer Capabilities

        The ftp utility
                setup
                file capabilities
                additional features
        ftpd controls via ftpaccess and other files

Network File System (NFS) Features

        Review of basic NFS setup
        Advanced capabilities of server setup
        Advanced capabilities in client setup
        Setting up the automounter

Name Services

        Capabilities of DNS
        BIND configurations
        Configuring the resolver
        Configuring the named process
        Cache initialization
        Using nslookup to obtain information

Miscellaneous network capabilities

         Setting up network printer(s) (queues)
        Backups across a network

Security Issues

Advanced Security Concepts for System Administrators

        Overview of issues related to Solaris / Unix security
        System administrator functions related to security

System Security Features Updating

        Security levels in a Solaris / Unix system

Managing of System Users

        Using the root account securely
                sudo
                menus
                RBAC (role based access control)
        Password issues
                changing
                encryption
                aging,expirations,history, dictionaries
                shadow files
        Privileges
        Groups

File System Security

        File permissions review
        Special permissions: SUID,SGID,Sticky Bits
        Device files
        Using chown and chgrp
        Enabling and using ACLs

Using Unix Log Files

        Users
                lastlog
                utmp
                wtmp
                acct
                syslog
        System
                sulog/messages
                using and controlling kernel auditing
                ASET / BART

Network Security

        Proper maintenance of the /etc/hosts file
        Using the "r" commands
        The restricted shell
        NFS security implications
        controlling sshd




Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved