Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
UNIX Security Administration
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Unix training, Linux training, Solaris training, AIX training, HP-UX training and OpenVMS training

Unix Training Overview

This five-day course enhances system administrators’ abilities to develop practical security measures on their Solaris machines. Students will be provided with hands-on experience in addition to valuable security knowledge.

Unix Training Audience

Administrators wishing to maximize their system’s security.

Unix Training Prerequisites

Completion of Introduction to UNIX, UNIX Administration I, and UNIX Administration II or equivalent experience.

Unix Training Course duration

5 Days

Unix Training Course outline

Security Concepts

  • What is Security?
  • Balance
  • Scope of this Manual
  • Staying up to Date
  • Documentation
  • Thinking Like the Enemy
  • Creating a Security Policy
  • What is a Security Policy?
  • Step 1 – Initially Secure the System
  • Step 2 – Maintain System Security
  • Step 3 – Recovery
  • Securing User Accounts
  • Introduction
  • Account Names
  • Mail aliases
  • The /etc/passwd, /etc/shadow and /etc/group files
  • Users and their passwords
  • Users with no passwords
  • Forcing user to change their password
  • Preventing user from changing their password
  • Restricted shell
  • Application accounts
  • Same UID, multiple user accounts
  • Dealing with the su command
  • Saving login failures
  • Tool: ASET
  • Tool: Crack
  • Other tools
  • Securing System Accounts
  • The root Account
  • Tools: COPS
  • Other System Accounts
  • Group System Account
  • Securing the File System
  • Basic UNIX permissions
  • Setting default permissions
  • Special permission: SUID
  • Special permission: SGID
  • Special permission: sticky bit
  • Access Control Lists (ACL)
  • Changing the ownership of a file
  • Changing the group ownership of a file
  • Device files
  • Partitions
  • Disk Quotas
  • Backups
  • Tool: Using pkgchk to detect security problems
  • Tool: Tiger
  • System Startup and Processes
  • Boot Up Process
  • Process Control
  • cron and at
  • crontab vs. at
  • Using the crontab Command
  • Using the at Command
  • Additional Security Concerns Regarding crontab and at
  • Tool: Tripwire
  • Auditing
  • ASET
  • System Logs
  • Typical System Logs
  • Process Accounting
  • Programmed Threats
  • What are Programmed Threats?
  • Protecting Against Programmed Threats
  • Executable Stacks
  • Physical Security
  • What is Physical Security?
  • Access Protection
  • Protecting PROM
  • Devices
  • Natural Disasters
  • Hardware Error
  • Theft
  • Network Security
  • Overview of Network Security
  • Basic Networking Files
  • Network Services
  • Unnecessary Services
  • Tool: Secure Shell
  • NFS
  • Firewalls
  • Tool: Satan

  • Please contact your training representative for more details on having this course delivered onsite or online

    Training Outlines - the one stop shopping center for IT training.
    © Training Outlines All rights reserved