Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - Solaris 10: New Features

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


UXLIN15

Solaris 10: New Features
DURATION: 5 days

FEE: $2,475

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Network Administrator
  • Support Personnel
  • Security Analyst
  • IT Professional
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. Introduction
      • The instructor presents and demonstrates examples of interest and value to the client's implementation of Solaris 10.
    2. Containers
      • Solaris Container technology utilizes Dynamic Resource Pools for enabling CPU resources to be dedicated to specific applications.
      • Create a new resource pool.
    3. Zones
      • Create a zone on the New Resource Pool defined previously.
    4. Resource Management
      • Create a project and set the resource control.
      • Start up a task under this project.
      • Verify the project governing the current shell.
      • View resource constraints for a process.
      • List all existing projects.
    5. Authentication Changes
      • Identify changes to authentication features and then identify the features of Least Privilege.
      • Turn on monitoring for failed login attempts.
    6. Controlling Access to Devices
      • View the device policy for the devices on the instructor workstation.
      • Change the Device Policy on an existing device.
    7. RBAC: Role-based Access Control
      • Utilize RBAC: Role-based Access Control to create and set the role to a user.
    8. System Resources
      • Display the following resources: 1- Installed memory. 2- Operating system release information. 3- System information.
    9. DTrace Features and Architecture
      • Perform the following tasks: 1- Print all the functions that process id xxx calls. 2- Add the aggregates in the script developed in class for the purpose of examining a summary table of user functions. 3- Collect a table with function and library name by changing the index to probemod, probefunc.
    10. New Tunable Parameters
      • The instructor presents and demonstrates examples of interest and value to the client's implementation of Solaris 10.
    11. New Commands and Options
      • A number of new commands are available in Solaris 10. Present and develop a number of examples for these new commands.
      • For example, ascertain the following: 1- Processor type. 2- Number of physical processors installed on the system. 3- The number of virtual processors available on the system.
    12. Service Management Facility
      • The SMF: Service Management Facility module monitors and displays the services running on a host. The current state of a service can be observed. However, it is not possible to create, delete, or modify the properties of a service. A service can be enabled or disabled when certain conditions are met.
      • Perform the following: 1- Enable and disable services. 2- Stop, start, and restart services. 3- Observe the status of a system service.

 
 
    Virtual Classroom   Blended Learning    
Synchronous
Instruction
Asynchronous
Instruction

 

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.