Previous Page
Next Page

Introduction

The Sun Certified Security Administrator for the Solaris Operating System exam is for those candidates with 6 to 12 months of experience administering security in a Solaris Operating System (Solaris OS). It is recommended that candidates have at least 6 to 12 months security administration job-role experience and have previous Solaris OS and network administration certification.

About the Exam

The examination will include multiple choice scenario-based questions, matching, drag-drop, and free-response question types and will require in-depth knowledge on security topics such as general security concepts, detection and device management, security attacks, file and system resources protection, host and network prevention, network connection access, authentication, and encryption.

Testing Objectives

Working with Sun, we put together the following general collective testing objectives—all contained in this book—which cover the material for both Sun Certified Security Administrator for the Solaris 9 and 10 Operating System exams:

Section 1: Fundamental Security Concepts

  • Describe accountability, authentication, authorization, privacy, confidentiality, integrity, and non-repudiation

  • Explain fundamental concepts concerning information security and explain what good security architectures include (people, process, technology, defense in depth)

Section 2: Attacks, Motives, and Methods

  • Describe concepts of insecure systems, user trust, threat, and risk

  • Explain attackers, motives, and methods

  • Describe how the attackers gain information about the targets and describe methods to reduce disclosure of revealing information

Section 3: Security Management and Standards

  • Identify the security life cycle (prevent, detect, react, and deter) and describe security awareness, security policies and procedures, physical security, platform security, network security, application security, and security operations and management

  • Describe the benefits of evaluation standards

Section 4: Logging and Process Accounting

  • Identify, monitor, and disable logins

  • Configure syslog, customize the system logging facility, and monitor and control superuser

Section 5: Solaris Auditing, Planning, and Management

  • Configure Solaris auditing and customize audit events

  • Generate an audit trail and analyze the audit data

Section 6: Device, System, and File Security

  • Control access to devices by configuring and managing device policy and allocation

  • Use the Basic Audit Reporting Tool to create a manifest of every file installed on the system and check the integrity of the system

Section 7: Denial of Service Attacks

  • Differentiate between the types of host-based denial of service attacks and understand how attacks are executed

  • Establish courses of action to prevent denial of service attacks

Section 8: Remote Access Attacks

  • Identify, detect, and protect against Trojan horse programs and backdoors

  • Explain rootkits that exploit loadable kernel modules

Section 9: User and Domain Account Management with RBAC

  • Describe the benefits and capabilities of Role-Based Access Control (RBAC)

  • Explain how to configure and audit RBAC

Section 10: Fundamentals of Access Control

  • Use UNIX permissions to protect files

  • Use access control lists to set file permissions

Section 11: Using Cryptographic Services

  • Explain how to protect files using the Solaris cryptographic framework

  • Administer the Solaris cryptographic framework

Section 12: Secure RPC Across NFS and PAM

  • Explain and configure secure RPC to authenticate a host and a user across an NFS mount

  • Use the PAM framework to configure the use of system entry services for user authentication

Section 13: SASL and Secure Shell

  • Explain the Simple Authentication and Security Layer (SASL) in Solaris

  • Use Solaris Secure Shell to access a remote host securely over an unsecured network

Section 14: Sun Enterprise Authentication Mechanism

  • Define the Sun Enterprise Authentication Mechanism and configuration issues

  • Configure and administer the Sun Enterprise Authentication Mechanism

Purchasing, Scheduling, and Taking the Exam  When you're ready to take the actual exam, you must first purchase an exam voucher online from www.sun.com/training/certification/objectives/index.html. Once exam vouchers are purchased, you have up to one year from the date of purchase to use it. Each voucher is valid for one exam and may only be used at an Authorized Prometric Testing Center in the country for which it was purchased. Please be aware that exam vouchers are not refundable for any reason.

After you have purchased your exam, contact your Authorized Prometric Testing Center at www.2test.com to schedule your exam date, time, and location. All exams take place at Authorized Prometric Testing Centers.

You also must agree to maintain test confidentiality and sign a Certification Candidate Pre-Test Agreement. You can review this document and other certification policies and agreements before taking your exam at www.sun.com/training/certification/register/policies.html.

You will receive your results immediately following the exam. Exam information is also available from Sun's CertManager online at www.sun.com/training/certification/certmanager/index.html. Please allow three to five working days after you take the exam for the information to be posted there.


Previous Page
Next Page