Oracle Solaris 10 Security Administrator Certified Expert Exam

Oracle Solaris 10 Security Administrator Certified Expert Exam

This exam is for candidates with extensive job-role experience administering security in an Oracle Solaris or a Solaris Operating System (Oracle Solaris 10 or OpenSolaris) environment. Previous Oracle Solaris or Solaris OS system and network administration certification is strongly recommended. This exam presumes the test candidate has an in-depth knowledge of UNIX and Solaris OS features. Candidates should have with previous experience administering security in an Oracle Solaris Operating System.
Formerly Sun Certified Security Administrator (SCSECA) for Solaris OS 10.

Oracle Partners passing these exams will be recognized as OPN Certified Specialists. Prerequisites or additional requirements apply. This certification helps companies qualify for the Sun SPARC Enterprise T-Series Specialization, Sun SPARC Enterprise Entry-Level and Midrange M-Series Specialization, and Sun SPARC Enterprise High-End M-Series Specialization

Exam Number:
105 minutes
Associated Certifications:
Oracle Certified Expert, Oracle Solaris 10 Security Administrator
# of Questions:
Exam Price:
US$ 300
Pricing may vary slightly by country or by localized currency. Check the Prometric website for exact pricing in your country.
Click Here to Register:
Register for the exam here, and refer to the appropriate exam numbers above.
Passing score subject to change. View Details


Recommended Training Additional Information & Resources Exam Topics Fraudulent Activity Policy

Recommended Training
Training Resources by Exam Topics
Oracle University Training
Configuring Security on the Solaris 10 OS (SC-301-S10)
Oracle PartnerNetwork Training
Sun SPARC Enterprise T-Series Servers Implementation Specialist
Sun SPARC Enterprise Entry-Level and Midrange M-Series Servers Implementation Specialist
Sun SPARC Enterprise High-End M-Series Servers Implementation Specialist



Additional Information & Resources
Exam Retake Policy
Specialization Catalog (PDF) for all launched and planned Specializations
Product Mapping to Specialization (XLS) 
More Training Opportunities for Oracle Partners



Exam Topics

Section 1: General Security Principles and Features

  • Describe basic security principles including the need for a security policy, process, education and the need to audit, patch and securely configure systems.
  • Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:
    • Device Policy
    • Kerberos enabled applications, LDAP and Inter operability enhancements
    • Process Rights Management
    • Solaris Containers
    • User Rights Management
  • Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:
    • Password Strength, Syntax Checking, History and Aging Improvements
    • Basic Audit and Report Tool for File Integrity
    • IPfilter Stateful Packet Filtering Firewall
    • Solaris Secure Shell
    • IPsec/IKE Performance Enhancements
  • Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:
    • Solaris Auditing
    • Trusted Extensions
    • PAM Improvements
    • Encryption and Message Digest Functions Built into the Solaris OS

Section 2: Installing Systems Securely

  • Describe minimization including minimal installation, software installation clusters, loose versus strict minimization, and providing consistent, known configuration for installations.
  • Manage patches including describing the Update Manager, describing signed patches, verifying signatures, and specifying a Web Proxy.
  • Perform hardening including implementing the Solaris Security Toolkit (SST).

Section 3: Principles of Least Privilege

  • Implement Process Rights Management including describing PRM, process privileges, determining rights required by process, profiling privileges used by processes, and assigning minimum rights to a process.
  • Implement User Rights Management including using Access Control, using RBAC, and implementing password strength, syntax checking, and history and aging improvements.

Section 4: Cryptographic Features

  • Utilize the Solaris Cryptographic framework including describing the Solaris Cryptographic Framework, using the basic administration tools for Solaris, using the SCF User-Level Commands, describing Framework Management, and using Solaris Cryptographic Framework with a Web server, with a Java-based application and with a Sun Crypto Accelerator.
  • Manage file system security, including using signed ELF objects, implementing BART for file integrity, and using the Solaris Fingerprint Database.

Section 5: Application and Network Security

  • Use the Service Management Facility (SMF) including describing using the SMF, describing the concept of Least Privilege and SMF, describing Authorizations, describing Limit Service Privileges, determining a current service's privileges and configuring a service to reduce privileges.
  • Secure networks including using Access Control, using TCP Wrappers, implementing the IPfitler Stateful Packet Filtering Firewall, describing Kerberos, implementing Solaris Secure Shell (SSH), and describing NFSv4.
  • Implement IPsec including describing IPsec, configuration IPsec, configuring IKE, and troubleshooting IPsec configurations.
  • Describe, implement, configure and troubleshoot Kerberos configurations, including Kerberos clients, KDCs, and Kerberized services such as Secure Shell and NFSv4.

Section 6: Auditing and Zone Security

  • Perform auditing and logging including describing Solaris Audit, configuring audit policy, implementing Solaris audit, configuring for Zones, reviewing audit logs, learning from audit trails, and using tamper proof logging.
  • Implement security in Solaris Zones including describing security characteristics, identifying differences from previous subjects, describe the Global Zones, identifying when and how to use Zones, describing resource management, identifying Zones and network security, and using patching Zones.
  • Describe how Security Components work together, how technologies interact, and identify infrastructure requirements.
  • Manage resources including describing resource controls and resource exhaustion attack prevention.



Oracle Certification Program Fraudulent Activity Policy

Oracle reserves the right to take action against any candidate involved in fraudulent activities, including, but not limited to, fraudulent use of vouchers, promotional codes, reselling exam discounts and vouchers, cheating on an exam, alteration of score reports, alteration of completion certificates, violation of exam retake policies or other activities deemed fraudulent by Oracle.

If Oracle determines, in its sole discretion, that fraudulent activity has taken place, it reserves the right to take action up to and including, but not limited to, decertification of a candidate's Oracle Certified Associate, Oracle Certified Professional and/or OCM credentials, temporary, indefinite or permanent ban of a candidate from Oracle certification programs, notification to a candidate's employer, and notification to law enforcement agencies. Candidates found committing fraudulent activities forfeit all fees previously paid to Oracle, or to Oracle's authorized vendors, and may be required to pay additional fees for services rendered.

View the Oracle Certification Program Candidate Agreement which requires your agreement before the start of each exam.

 E-mail this page  Printer View