 |
- Become a Sun Certified Security Administrator -
Introduction
Most operating systems are insecure by default. Solaris is no exception.
As a prudent security professional, you need to bastionize the system before
loading any critical applications or sensitive data on it, and validate
that level of protection periodically.
In this 27-hour hands-on course, i-Total will examine the security features
of the Solaris operating system, build a Solaris bastion host from the
ground up, setup centralized logging facilities, establish secure network
and remote accesses, and audit the effectiveness of system security.
Upon completion of the course, you may also want to take the Prometric
exam 310-301 and become a Sun Certified Security Administrator.
Course Outline
We structure this course into 8 modules with a total of 27 contact hours.
Details about individual modules are given below. Please email us at
info@i-TotalSecurity.net for more information.
Enterprise Security Framework
Security Terminology
Security life cycle
Attack motives & methods
Security evaluation & certification
Secure Solaris Installation
Startup parameters
Minimal Installation
Secure network access
Package & patch installation
Kernel modules
Logging & Device Management
System logging utilities
Standalone & centralized logging
Log file monitors
Process accounting
Generate audit trail
Kernel level auditing
Analyze & filter audit data
Log rotation
Device management components
|
Solaris Security Attacks
Denial of services & prevention
Escalation of privileges & Trojans
Buffer overflow
Backdoors and rootkits
Loadable kernel modules
Passive sniffing
Attack Detection
User Account Security
Regular & superuser control
Password management
Pluggable authentication modules
Role-base access control
Password security audit
File System Configuration
Mount volume
Root partition
File permissions
Suid and sgid
Access control lists
Auditing file systems
|
Secure Network Access
Secure sockets layer
Using SKIP
IPSec VPN
SunScreen Firewall
Anti-sniffing
Network vulnerability scanning
Restrict network services
Remote procedure calls
Change root environment
Install TCP wrappers
Configure Secure Shell
Additional Security Issues
Solaris security toolkits
Lockdown tools & benchmarks
Backup and restore
Physical security
Network traffic filtering
Security auditing
Solaris security sources
|
Course Date & Venue
Date | Sep-02, 09, 16, 23, 30, Oct-07, 14, 21, 28Sep-06, 13 | Time | 7:00pm - 10:00pm |
Venue | The CharterHouse, 209 Wan Chai Road, Wan Chai See Map |
*i-TotalSecurity reserves the rights to modify the schedule as required.
Course Fee
Lectures (27 Hours) = Early Bird price HK$4,600.00*
Early bird price - enroll 1 week before course commencement.
Full price = HK$5,100.00.
Course Leader
Mr. Gamin Lou, CISSP, CISA, CISM, CEH, has over 14 years experience
in information systems security governance and practices. Before joining
i-TotalSecurity as a security consultant, he has been working in various
global and local financial institutes and was responsible for managing
overall information security programs, implementing and monitoring perimeter
security and intrusion detection systems, as well as responding to and
investigating security incidents for the organizations.
About i-TotalSecurity
A pioneer in information systems control and security education and
consultancy who bring the best knowledge, skills and practices to meet
the certification and working needs of individuals and corporations.
Since 1995, our qualified and no-nonsense security specialists are
teaching information security with students from leading corporations,
government and military organizations internationally.
Enquiry
Call us at +852 2965.4445 or e-mail info@i-TotalSecurity.net
|