PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
AUDIENCE:
Network Administrator
Support Personnel
Security Analyst
IT Professional
DATES:
CONTENT AND OBJECTIVES:
Introduction
The instructor presents and demonstrates examples of interest and value to the client's implementation of Solaris 10.
Containers
Solaris Container technology utilizes Dynamic Resource Pools for enabling CPU resources to be dedicated to specific applications.
Create a new resource pool.
Zones
Create a zone on the New Resource Pool defined previously.
Resource Management
Create a project and set the resource control.
Start up a task under this project.
Verify the project governing the current shell.
View resource constraints for a process.
List all existing projects.
Authentication Changes
Identify changes to authentication features and then identify the features of Least Privilege.
Turn on monitoring for failed login attempts.
Controlling Access to Devices
View the device policy for the devices on the instructor workstation.
Change the Device Policy on an existing device.
RBAC: Role-based Access Control
Utilize RBAC: Role-based Access Control to create and set the role to a user.
System Resources
Display the following resources: 1- Installed memory. 2- Operating system release information. 3- System information.
DTrace Features and Architecture
Perform the following tasks: 1- Print all the functions that process id xxx calls. 2- Add the aggregates in the script developed in class for the purpose of examining a summary table of user functions. 3- Collect a table with function and library name by changing the index to probemod, probefunc.
New Tunable Parameters
The instructor presents and demonstrates examples of interest and value to the client's implementation of Solaris 10.
New Commands and Options
A number of new commands are available in Solaris 10. Present and develop a number of examples for these new commands.
For example, ascertain the following: 1- Processor type. 2- Number of physical processors installed on the system. 3- The number of virtual processors available on the system.
Service Management Facility
The SMF: Service Management Facility module monitors and displays the services running on a host. The current state of a service can be observed. However, it is not possible to create, delete, or modify the properties of a service. A service can be enabled or disabled when certain conditions are met.
Perform the following: 1- Enable and disable services. 2- Stop, start, and restart services. 3- Observe the status of a system service.
Virtual Classroom
Blended Learning
↓
Synchronous Instruction
Asynchronous Instruction
Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.
CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.
Certain courses only should be taught by the source software company training company and open source purveyor.