Tru64 UNIX Security Management
Course Code: U3697S
Length: 2 days
Schedule and Registration
- Mon, Feb 10, 2025 $1,900.00 Denver, CO
Course Description
This course is designed for individuals with experience managing a Tru64 UNIX operating system and are interested in learning how to recognize and address security threats in both the base and C2 enhanced security levels of the Tru64 UNIX V5 environment.
Who Should Attend
UNIX system administrators who require experience in the advanced topics of Tru64 UNIX system security.
Prerequisites
Students should have the experience and knowledge provided by:
- U3631S - Utilities and Commands
- U3632S - System Administration
Students should also have 6 months experience managing a Tru64 UNIX V5 system.
Benefits of Attending this Class
Upon completion of this course, students will be able to identify Tru64 UNIX security issues and terminology and contrast base-level security with enhanced C2 security. They will be able to describe the security requirements of a given system and improve system and network security. Students will be able to perform security operations using secconfig, the account manager (dxaccounts) and the audit manager tools. They will be able to administer the audit system using auditconfig and dxaudit and perform trusted system troubleshooting and recovery operations.
Course Contents
Security Overview
- Security Terms and Concepts
- Threats to a Computer System
- Basic Security Model
- Orange Book
- Tru64 UNIX and Security
Improving Base Level Security
- Authentication Changes
- Managing Accounts and Commands
- Division of Privileges
- Managing Accounts with CDE
- Security Guidelines
- Protecting Files
- Checking Security Issues
- TCP/IP Network Guidelines
- Workstation Guidelines
Historical Security Holes
- SUID and SGID Programs
- Security Concerns
- Security Case - Morris
Access Control Lists
- ACL Overview
- ACL Commands
- ACL Decision Process
- ACL Maintenance
- Administering ACLs
Enhanced Security
- Overview
- Setting Up System Security
- Rebooting Files after Setup
- Authorization Contraols and Tools
- Protected Password Database Fields
- Using edauth
- Lock File
- Manual Add of Account
- Protected Subsystems
- Time Values
Auditing
- Overview
- Audit Records
- Audit Data Recovery
- Auditing Tools
- Setting Up Auditing
- Audit Events
- Enabling Auditing
- Object Selection and Deselection
- Process Targeting
- Audit Log Files
- Audit Reports
Trusted System Troubleshooting and Recovery
- Backup Strategy
- Recovery
- Recovery Procedure
- Troubleshooting Trusted Systems
- Ensuring System Integrity