Softpanorama

May the source be with you, but remember the KISS principle ;-)
Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and  bastardization of classic Unix

Solaris Security Certification

News Recommended Solaris certification books Solaris 9 Security Certification Exam Structure Solaris 9 Exam Objectives The SCSA for the Solaris 10 Operating System Exam structure The SCSA for Solaris 10 Exam Objectives
Sun Homepage for Certified Security Administrator     Recommended Training Humor Etc

The Sun Certified Security Administrator (SCSA) for the Solaris 9 or Solaris 10 exam realistically is for administrators with more then three years of  experience administering security in either version of  Solaris. Exam for Solaris 10 includes questions related for zones and as such is more difficult. 

Solaris 9 security certification exam structure

The Sun Certified Security Administrator for the Solaris 9 Operating System exam realistically is for administrators with more then three years of experience administering security in a Solaris Operating System (Solaris OS).

There is no prerequisites. It requires neither Solaris administration certification nor network certification.

It is recommended that candidates:

The examination will include multiple choice scenario-based questions, matching, drag-drop, and free-response question types and will require in-depth knowledge on security topics including: general security concepts

Delivered at: Authorized Prometric Testing Centers

The main topics include:

Solaris BSM auditing

Solaris device management

Solaris Fingerprint Database

Solaris 9 Security Certification Exam Objectives

Version Product ID Price
Solaris 9 CX-310-301 $150.00
Solaris 10

Exams purchased on Sun web site may only be used in the US. Once exam vouchers are purchased you have up to one year from the date of purchase to use it. Each voucher is valid for one exam and may only be used at an Authorized Prometric Testing Center. Exam vouchers are nonrefundable.

Solaris 9 Security Certification Exam Objectives

Section 1: General Security Concepts
Section 2: Detection and Device Management

Section 3: Security Attacks

Section 4: File and System Resources Protection

Section 5: Host and Network Prevention

Section 6: Network Connection Access, Authentication, and Encryption


The SCSA for the Solaris 10 Operating System Exam

The Sun Certified Security Administrator for the Solaris 10 Operating System exam is for test candidates with extensive job-role experience administering security in a Solaris Operating System (Solaris 10 or OpenSolaris) environment.

Sun Certification recommends that candidates attend the course: SC-301-S10: Personalizing Security on the Solaris 10 Operating System, and previous Solaris OS system and network administration certification is strongly recommended.

This exam presumes the test candidate has an in-depth knowledge of UNIX and Solaris OS features.

The exam includes multiple-choice, scenario-based questions and drag-and-drop questions and requires extensive knowledge of Solaris OS security administration topics including:

Product ID Price
CX-310-303 $200.00

Exams purchased on this Web site may only be used in the US. If you reside outside the US, please select a country to inquire about products delivered in your country. Once exam vouchers are purchased you have up to one year from the date of purchase to use it. Each voucher is valid for one exam and may only be used at an Authorized Prometric Testing Center in the country for which it was purchased. Please be aware that exam vouchers are nonrefundable for any reason.

Details

The SCSA for Solaris 10 Exam Objectives


Section 1: General Security Principles and Features


# 1. Describe basic security principles including the need for a security policy, process, education and the need to audit, patch and securely configure systems.

# 2. Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:

# 3. Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:

# 4. Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:


Section 2: Installing Systems Securely



# 5. Describe minimization including minimal installation, software installation clusters, loose versus strict minimization, and providing consistent, known configuration for installations.

# 6. Manage patches including describing the Update Manager, describing signed patches, verifying signatures, and specifying a Web Proxy.

# 7. Perform hardening including implementing the Solaris Security Toolkit (SST).

Section 3: Principles of Least Privilege



# 8. Implement Process Rights Management including describing PRM, process privileges, determining rights required by process, profiling privileges used by processes, and assigning minimum rights to a process.

# 9. Implement User Rights Management including using Access Control, using RBAC, and implementing password strength, syntax checking, and history and aging improvements.


Section 4: Cryptographic Features


# 10. Utilize the Solaris Cryptographic framework including describing the Solaris Cryptographic Framework, using the basic administration tools for Solaris, using the SCF User-Level Commands, describing Framework Management, and using Solaris Cryptographic Framework with a Web server, with a Java-based application and with a Sun Crypto Accelerator.

# 11. Manage file system security, including using signed ELF objects, implementing BART for file integrity, and using the Solaris Fingerprint Database.

Section 5: Application and Network Security


# 12. Use the Service Management Facility (SMF) including describing using the SMF, describing the concept of Least Privilege and SMF, describing Authorizations, describing Limit Service Privileges, determining a current service's privileges and configuring a service to reduce privileges.

# 13. Secure networks including using Access Control, using TCP Wrappers, implementing the IPfitler Stateful Packet Filtering Firewall, describing Kerberos, implementing Solaris Secure Shell (SSH), and describing NFSv4.

# 14.Implement IPsec including describing IPsec, configuration IPsec, configuring IKE, and troubleshooting IPsec configurations.

# 15. Describe, implement, configure and troubleshoot Kerberos configurations, including Kerberos clients, KDCs, and Kerberized services such as Secure Shell and NFSv4.

Section 6: Auditing and Zone Security


# 16. Perform auditing and logging including describing Solaris Audit, configuring audit policy, implementing Solaris audit, configuring for Zones, reviewing audit logs, learning from audit trails, and using tamper proof logging.

# 17. Implement security in Solaris Zones including describing security characteristics, identifying differences from previous subjects, describe the Global Zones, identifying when and how to use Zones, describing resource management, identifying Zones and network security, and using patching Zones.

# 18. Describe how Security Components work together, how technologies interact, and identify infrastructure requirements.

# 19. Manage resources including describing resource controls and resource exhaustion attack prevention.
Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

News

[Jan 7, 2007] Solaris 10 Operating System Certification Learning Path is now available

Recommended Training

To succeed fully in this exam, candidates can take advantage of the following course(s):

Administering Security on the Solaris Operating System (SC-300)
Supporting Courses

Last modified: March 12, 2019