UNIX Security Administration

Unix Training Overview

This five-day course enhances system administrators’ abilities to develop practical security measures on their Solaris machines. Students will be provided with hands-on experience in addition to valuable security knowledge.

Unix Training Audience

Administrators wishing to maximize their system’s security.

Unix Training Prerequisites

Completion of Introduction to UNIX, UNIX Administration I, and UNIX Administration II or equivalent experience.

Unix Training Course duration

5 Days

Unix Training Course outline

Security Concepts

  • What is Security?
  • Balance
  • Scope of this Manual
  • Staying up to Date
  • Documentation
  • Thinking Like the Enemy
  • Creating a Security Policy
  • What is a Security Policy?
  • Step 1 – Initially Secure the System
  • Step 2 – Maintain System Security
  • Step 3 – Recovery
  • Securing User Accounts
  • Introduction
  • Account Names
  • Mail aliases
  • The /etc/passwd, /etc/shadow and /etc/group files
  • Users and their passwords
  • Users with no passwords
  • Forcing user to change their password
  • Preventing user from changing their password
  • Restricted shell
  • Application accounts
  • Same UID, multiple user accounts
  • Dealing with the su command
  • Saving login failures
  • Tool: ASET
  • Tool: Crack
  • Other tools
  • Securing System Accounts
  • The root Account
  • Tools: COPS
  • Other System Accounts
  • Group System Account
  • Securing the File System
  • Basic UNIX permissions
  • Setting default permissions
  • Special permission: SUID
  • Special permission: SGID
  • Special permission: sticky bit
  • Access Control Lists (ACL)
  • Changing the ownership of a file
  • Changing the group ownership of a file
  • Device files
  • Partitions
  • Disk Quotas
  • Backups
  • Tool: Using pkgchk to detect security problems
  • Tool: Tiger
  • System Startup and Processes
  • Boot Up Process
  • Process Control
  • cron and at
  • crontab vs. at
  • Using the crontab Command
  • Using the at Command
  • Additional Security Concerns Regarding crontab and at
  • Tool: Tripwire
  • Auditing
  • ASET
  • System Logs
  • Typical System Logs
  • Process Accounting
  • Programmed Threats
  • What are Programmed Threats?
  • Protecting Against Programmed Threats
  • Executable Stacks
  • Physical Security
  • What is Physical Security?
  • Access Protection
  • Protecting PROM
  • Devices
  • Natural Disasters
  • Hardware Error
  • Theft
  • Network Security
  • Overview of Network Security
  • Basic Networking Files
  • Network Services
  • Unnecessary Services
  • Tool: Secure Shell
  • NFS
  • Firewalls
  • Tool: Satan

  • Wintrac Inc.
    16523 SW McGwire Ct.
    Beaverton OR 97007
    © Wintrac, Inc. All rights reserved.                                                                               Site Map   |   Terms of Use   |   Privacy Policy