Sun Certified Security Administrator for Solaris OS 10 (SCSECA) Exam

Oracle Certified Expert, Oracle Solaris 10 Security Administrator

This certification is for candidates with extensive job-role experience administering security in an Oracle Solaris or a Solaris Operating System (Oracle Solaris 10 or OpenSolaris) environment. Previous Oracle Solaris or Solaris OS system and network administration certification is strongly recommended. This exam presumes the test candidate has an in-depth knowledge of UNIX and Solaris OS features. Candidates should have with previous experience administering security in an Oracle Solaris Operating System.
Formerly Sun Certified Security Administrator (SCSECA) for Solaris OS 10.

Oracle Partners passing these exams will be recognized as OPN Certified Specialists. Prerequisites or additional requirements apply. Please click on the certification link for further clarification. This certification helps their companies qualify for the Oracle Solaris 10 Network Administrator Specialization.
 

Exam Number:

CX-310-303

Duration:
105 minutes
Associated Certifications:
Oracle Certified Expert, Oracle Solaris 10 Security Administrator
# of Questions:
59
Exam Price:
US$ 300

Pricing may vary slightly by country or by localized currency. Check Pearson VUE’s website for exact pricing in your country.
Passing
52%
Click Here to Register:
Register
Score:
Passing score subject to change. View Details

 

Recommended Training Additional Information & Resources Exam Topics Fraudulent Activity Policy


Recommended Training
OPN Guided Learning Paths

Sun SPARC Enterprise T-Series Servers Implementation Specialist

Sun SPARC Enterprise Entry-Level and Midrange M-Series Servers Implementation Specialist

Sun SPARC Enterprise High-End M-Series Servers Implementation Specialist

Oracle University Training
Configuring Security on the Solaris 10 OS (SC-301-S10)

 

Additional Information & Resources

Exam Retake Policy
Specialization Catalog (PDF) for all launched and planned Specializations
Product Mapping to Specialization (XLS)
More Training Opportunities for Oracle Partners


 

 

Exam Topics

Section 1: General Security Principles and Features   

  • Describe basic security principles including the need for a security policy, process, education and the need to audit, patch and securely configure systems.
  • Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:
    • Device Policy
    • Kerberos enabled applications, LDAP and Inter operability enhancements
    • Process Rights Management
    • Solaris Containers
    • User Rights Management
  • Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:
    • Password Strength, Syntax Checking, History and Aging Improvements
    • Basic Audit and Report Tool for File Integrity
    • IPfilter Stateful Packet Filtering Firewall
    • Solaris Secure Shell
    • IPsec/IKE Performance Enhancements
  • Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:
    • Solaris Auditing
    • Trusted Extensions
    • PAM Improvements
    • Encryption and Message Digest Functions Built into the Solaris OS

Section 2: Installing Systems Securely

  • Describe minimization including minimal installation, software installation clusters, loose versus strict minimization, and providing consistent, known configuration for installations.
  • Manage patches including describing the Update Manager, describing signed patches, verifying signatures, and specifying a Web Proxy.
  • Perform hardening including implementing the Solaris Security Toolkit (SST).
  • Section 3: Principles of Least Privilege

  • Implement Process Rights Management including describing PRM, process privileges, determining rights required by process, profiling privileges used by processes, and assigning minimum rights to a process.
  • Implement User Rights Management including using Access Control, using RBAC, and implementing password strength, syntax checking, and history and aging improvements.
  • Section 4: Cryptographic Features

  • Utilize the Solaris Cryptographic framework including describing the Solaris Cryptographic Framework, using the basic administration tools for Solaris, using the SCF User-Level Commands, describing Framework Management, and using Solaris Cryptographic Framework with a Web server, with a Java-based application and with a Sun Crypto Accelerator.
  • Manage file system security, including using signed ELF objects, implementing BART for file integrity, and using the Solaris Fingerprint Database.

Section 5: Application and Network Security

  • Use the Service Management Facility (SMF) including describing using the SMF, describing the concept of Least Privilege and SMF, describing Authorizations, describing Limit Service Privileges, determining a current service's privileges and configuring a service to reduce privileges.
  • Secure networks including using Access Control, using TCP Wrappers, implementing the IPfitler Stateful Packet Filtering Firewall, describing Kerberos, implementing Solaris Secure Shell (SSH), and describing NFSv4.
  • Implement IPsec including describing IPsec, configuration IPsec, configuring IKE, and troubleshooting IPsec configurations.
  • Describe, implement, configure and troubleshoot Kerberos configurations, including Kerberos clients, KDCs, and Kerberized services such as Secure Shell and NFSv4.

Section 6: Auditing and Zone Security

  • Perform auditing and logging including describing Solaris Audit, configuring audit policy, implementing Solaris audit, configuring for Zones, reviewing audit logs, learning from audit trails, and using tamper proof logging.
  • Implement security in Solaris Zones including describing security characteristics, identifying differences from previous subjects, describe the Global Zones, identifying when and how to use Zones, describing resource management, identifying Zones and network security, and using patching Zones.
  • Describe how Security Components work together, how technologies interact, and identify infrastructure requirements.
  • Manage resources including describing resource controls and resource exhaustion attack prevention.

 

 

Oracle Certification Program Fraudulent Activity Policy

Oracle reserves the right to take action against any candidate involved in fraudulent activities, including, but not limited to, fraudulent use of vouchers, promotional codes, reselling exam discounts and vouchers, cheating on an exam, alteration of score reports, alteration of completion certificates, violation of exam retake policies or other activities deemed fraudulent by Oracle.

If Oracle determines, in its sole discretion, that fraudulent activity has taken place, it reserves the right to take action up to and including, but not limited to, decertification of a candidate's Oracle Certified Associate, Oracle Certified Professional and/or OCM credentials, temporary, indefinite or permanent ban of a candidate from Oracle certification programs, notification to a candidate's employer, and notification to law enforcement agencies. Candidates found committing fraudulent activities forfeit all fees previously paid to Oracle, or to Oracle's authorized vendors, and may be required to pay additional fees for services rendered.

View the Oracle Certification Program Candidate Agreement which requires your agreement before the start of each exam.


 
 E-mail this page  Printer View