Corder Enterprises International jpg
A Divider
1980 - 2016 Years of Service
Corder Enterprises International
A Divider
Go Green Gif The green data center
The Green Datacenter
A Divider Home
Training Offered by The Corder Company
The History of The Corder Company
The History of The Corder Company
e-Mail The Corder Company
e-Mail The Corder Company
VMware Training Courses
Site Map for C.E.I.
A Divider
AIX Training Courses
Solaris Training Courses
Linux Training Courses
Perl Training Courses
HTML Training Courses

E-Mail This Page
To a Friend.
Name Tag JPG
Now Hiring
Certified VMware Professional, VCP
VCP & VCIs

Fish GIF
1-Chronicles 4:10

Building World Class Teams
For you!®

Columbus

SPACER SPACER SPACER SPACER SPACER SPACER SPACER SPACER SPACER

CS502-# Solaris OE Advanced System Administration

  • CS502-8 = Solaris 8
  • CS502-9 = Solaris 9
  • CS502-10 = Solaris 10

Length: 5 Days

Description

This course provides information and hands-on exerciese for performing Solaris OE advanced system administration tasks. Attendess will learn how to use the Solaris Management console, manage software, perform hard drive management, set up auto mounting filesystems, set up and use Role Based Access Control, configure the system logging facility, identify methods of securing a Solaris system, and perform system troubleshooting and correct problems.

This course is applicable to both Solaris 8 and Solaris 9 Operating Environments.

Course Objectives

Upon completion of this course the student will be able to:
  1. Set up and use the Solaris Management Console
  2. Install and update software packages
  3. Install patches on the operating system and installed applications
  4. Set up Network File System Shares
  5. Set up the Auto Mounting facility
  6. Install new hard drives
  7. Partition hard drives
  8. Create new filesystems on new or existing hard drives
  9. Manage swap space
  10. Set up and use Role Based Access Control
  11. Set up and use the System Logging Facility
  12. Identify Solaris Security Issues
  13. Determine if a system has been compromised
  14. Implement system security recommendations
  15. Troubleshoot and correct system problems

Prerequisites:

Before attending this course, attendees must be able to:
  1. Perform basic system administration tasks
  2. Use the vi or equivalent editor
  3. read and interpret shell scripts

Course Content:

Unit 1 - Solaris Management Console

  1. Introduction
  2. The Solaris Management Console Overview
  3. Why Use the Solaris Management Console?
  4. Solaris Management Console Organization
    1. Changing the Solaris Management Console Window
    2. Solaris Management Console Documentation
  5. Adding Tools to the Solaris Management Console
    1. How to Add a Legacy Tool to a Toolbox
  6. Troubleshooting the Solaris Management Console
  7. Unit Conclusion

Unit 2 - Software Management

  1. Introduction
  2. Overview of Software Packages
  3. The Software Installation Database
  4. Signed Packages and Patches
  5. Tools for Managing Software Packages
  6. Guidelines for Adding Software Packages
    1. Key Points About Adding Software Packages
  7. Guidelines for Removing Packages
  8. Using an Administration File
    1. Administrative File Example
    2. Using a Response File
  9. Package Tools
  10. Installing A Package Using The pkgadd Command
  11. Alternate Installation Methods
  12. Obtaining Package Information Using The pkginfo Command
  13. Obtaining Package Information Using The pkgparam Command
  14. Checking A Package Using The pkgchk Command
  15. Removing A Package Using The pkgrm Command
  16. Package Administration Using admintool
  17. Package Administration Using prodreg
  18. Package Installation Using Web Start
  19. Patch Management
  20. What Is a Patch?
  21. What Is a Signed Patch?
  22. Accessing Solaris Patches
  23. Patch Management Tools
    1. Features of Solaris Patch Manager Tool:
  24. Selecting the Best Method for Adding Signed Patches
  25. Patch Pro Patch Manager
    1. How to Download the Patch Management Tools From SunSolve Online
    2. How to Install and Configure the Patch Management Tool
  26. Installing Patches Using the SMC
    1. Analyizing and Adding Patches
    2. List of Recommended Patches
    3. Download Patches
    4. Specifying a Backout Directory
    5. List of Patches
    6. Installing Patches
  27. Unit Conclusion

Unit 3 - Network File System

  1. Introduction
  2. NFS - Network File System
  3. NFS Terminology
  4. NFS Daemons
    1. Controlling NFS Daemons
  5. File System Sharing and Exporting
  6. NFS Commands and Files
    1. The /usr/sbin/share Command
    2. The /etc/dfs/dfstab File
    3. The /etc/mount Command
  7. Notes on NFS File System Options
  8. Configuring NFS
  9. Setting Up the NFS Server
  10. Setting Up A NFS Client
  11. Removing a NFS Resource
  12. Unit Conclusion

Unit 4 - Auto Mounting File Systems

  1. Introduction
  2. What is Automounting Filesystems?
  3. How AutoFs Works
  4. The Navigation Process
    1. The /etc/auto_master File
    2. The /etc/auto_home File
    3. Notes About NIS
  5. Automounting User Home Directories
  6. Exporting the Users Home Directories
  7. Changing the Users Home Directory
  8. Setting up The Automount Maps
  9. Unit Conclusion

Unit 5 - Hard Drive Management

  1. Introduction
  2. Hard Drive Management
  3. Installing the Drive
    1. Installing a Hard Drive - General
    2. IDE Drive Installation Notes
    3. SCSI Drive Installation Notes
  4. Post Installation
  5. Partitions and Slices
    1. Slice Naming
  6. Slice Assignments
    1. SPARC Slices
    2. x86 Slices
  7. Determining Slice Information
    1. Creating Slices
    2. Creating Slices Using fmthard
  8. Creating the Filesystems
  9. Labeling A Filesystem
  10. Checking the New Filesystem
  11. Mounting the New Filesystem
  12. Verifying the Mount
  13. Notes About New Filesystems
    1. The lost+found Directory
    2. Filesystem Permissions
  14. The /etc/vfstab and /etc/mnttab Files
  15. The /etc/vfstab File
  16. Unmounting a Filesystem
  17. Logical Volumes
    1. Concatenation and Striping
  18. Installing Solstice DiskSuite 4.2.1
    1. Getting Solstice DiskSuite 4.2.1
    2. Installing Solstice DiskSuite 4.2.1
    3. Post-Installation Procedures
  19. Creating Logical Volumes
  20. Managing Pseudo Filesystems
    1. The Cache File System
    2. The Temporary File System
    3. The Loopback File System
    4. The Process File System
  21. Swap Space
    1. Swap Space and Virtual Memory
    2. Swap Space and the TMPFS File System
    3. Determining if More Swap Space is Needed
    4. How Swap Space Is Allocated
    5. The /etc/vfstab File
    6. Planning for Swap Space
    7. Monitoring Swap Resources
  22. Adding More Swap Space
    1. Creating a Swap File
    2. Activating the Swap File.
    3. Updating /dev/vfstab
    4. Removing Extra Swap Space
  23. Unit Conclusion

Unit 6 - Role Based Access Control

  1. Introduction
  2. Overview of Role-Based Access Control
    1. The Extended User Attributes Database
    2. The Authorizations Database
    3. The Execution Profiles Database
    4. The Execution Attributes Database
  3. How to Assume Role-Based Access Control
  4. Tools for Managing Role-Based Access Control
  5. Managing Roles
  6. Modifying a Role
  7. Deleting a Role
  8. Unit Conclusion

Unit 7 - System Logging

  1. Introduction
  2. The syslogd Facility
  3. The /etc/syslog.conf File
  4. syslogd Functions
  5. syslogd Actions
  6. Log Messages Security
  7. Message Storage Policy
  8. Prepare Files To Store Log Messages
  9. Configuring syslogd
    1. Marking Messages
    2. Starting, Stopping, and Restarting the syslogd Facility
    3. Testing the syslogd Configuration
    4. Additional syslogd Information
  10. Unit Conclusion

Unit 8 - Solaris System Security

  1. Unit Overview
  2. Security Documentation and Resources
    1. Books & Publications
    2. Solaris Manual Pages and System Documentation
    3. Web Sites
  3. Why is a System Compromised?
  4. How are Systems Compromised?
  5. How is Compromise Prevented?
  6. Has Your System Been Compromised?
  7. What To Do if Your System is Compromised
    1. Stop the Damage
    2. Damage Assessment and Control
    3. Bring the System Back On-Line
  8. Controlling Access - Users
    1. Login and Password
    2. Network Programs
  9. Auditing User and Group Accounts
    1. Password Check - pwck
    2. Group Check - grpck
  10. File System Security
    1. Incorrect File/Directory Permissions
    2. Incorrect File/Directory Ownership
    3. Incorrect File/Directory Group Ownership
    4. Set User Id and Set Group Id
  11. Access Control ListsListing ACL Attributes
    1. Setting ACL Permissions on a File
    2. Other ACL Operations
    3. Checking If a File Has an ACL
  12. Filesystem Integrity Checking
    1. Filesystem Integrity Checking Programs
    2. Tripwire
    3. Tripwire Policies
  13. Unit Conclusion

Unit 9 - System Troubleshooting

  1. Introduction
  2. System Efficiency
  3. System Troubleshooting
  4. Recovering From System Problems
  5. Troubleshooting a System Crash
    1. What to Do if the System Crashes
    2. Gathering Troubleshooting Data
    3. System Crash Checklist
    4. Viewing System Messages
    5. How to View System Messages
  6. Troubleshooting Miscellaneous Software Problems
    1. What to Do If Booting/Rebooting Fails
    2. What to Do if a System Hangs
    3. What to Do if a File System Fills Up
    4. Troubleshooting Backup Problems
    5. Troubleshooting File Access Problems
    6. Solving File Access Problems
    7. Forgotten Root Password or Corrupted Password File(s)
  7. Corrupted Root Filesystem
  8. Unit Conclusion

pdf icon gif
Course
Flyer
pdf icon gif
C.E.I.
Flyer
pdf icon gif
Course
Offering
3mb
AIX | HPUX | Linux | Solaris
General UNIX | Web | Perl
Copywrite 1980 - 2015
VMware Certified Instructor