999 18th Street, Denver, CO 80202.
Log in Contact Us Now! +1 888 472 7732

hp Tru64 UNIX Security Management


Course Code: U3697S
Length: 2 days

Schedule and Registration

This course is not currently scheduled.

Course Description

This course is designed for individuals with experience managing a Tru64 UNIX operating system and are interested in learning how to recognize and address security threats in both the base and C2 enhanced security levels of the Tru64 UNIX V5 environment.

Who Should Attend

UNIX system administrators who require experience in the advanced topics of Tru64 UNIX system security.

Prerequisites

Students should have the experience and knowledge provided by:

Students should also have 6 months experience managing a Tru64 UNIX V5 system.

Benefits of Attending this Class

Upon completion of this course, students will be able to identify Tru64 UNIX security issues and terminology and contrast base-level security with enhanced C2 security. They will be able to describe the security requirements of a given system and improve system and network security. Students will be able to perform security operations using secconfig, the account manager (dxaccounts) and the audit manager tools. They will be able to administer the audit system using auditconfig and dxaudit and perform trusted system troubleshooting and recovery operations.

Course Contents

Security Overview
  • Security Terms and Concepts
  • Threats to a Computer System
  • Basic Security Model
  • Orange Book
  • Tru64 UNIX and Security
Improving Base Level Security
  • Authentication Changes
  • Managing Accounts and Commands
  • Division of Privileges
  • Managing Accounts with CDE
  • Security Guidelines
  • Protecting Files
  • Checking Security Issues
  • TCP/IP Network Guidelines
  • Workstation Guidelines
Historical Security Holes
  • SUID and SGID Programs
  • Security Concerns
  • Security Case - Morris
Access Control Lists
  • ACL Overview
  • ACL Commands
  • ACL Decision Process
  • ACL Maintenance
  • Administering ACLs
Enhanced Security
  • Overview
  • Setting Up System Security
  • Rebooting Files after Setup
  • Authorization Contraols and Tools
  • Protected Password Database Fields
  • Using edauth
  • Lock File
  • Manual Add of Account
  • Protected Subsystems
  • Time Values
Auditing
  • Overview
  • Audit Records
  • Audit Data Recovery
  • Auditing Tools
  • Setting Up Auditing
  • Audit Events
  • Enabling Auditing
  • Object Selection and Deselection
  • Process Targeting
  • Audit Log Files
  • Audit Reports
Trusted System Troubleshooting and Recovery
  • Backup Strategy
  • Recovery
  • Recovery Procedure
  • Troubleshooting Trusted Systems
  • Ensuring System Integrity