Apple Mac Advanced OS X Security — A 1 day course

contact usEnquire about this course

Synopsis

This one day course will cover the skills necessary to secure OS X. The course is a mixture of theory and hands on and will cover both Apple and third party tools. Delegates will learn how to secure the Mac manually as well as creating payloads to automatically secure these systems.

Objectives

Security planing along with a threat overview. Learn about OS X security layers. The layers of security include integrated features, methods and functions that prevent unauthorized use of OS X.

Contents

Parental Controls (Managed Preferences)

Gatekeeper

Controlling what gets installed on your Mac.
Understand how Gatekeeper restricts which apps can be installed from an Admin, User and developer perspective.
You will also explore the advanced command line tools for Gatekeeper.

Sandboxing

Profiles

Dynamically apply configuration changes.
 Configuration profiles that can be used to automatically and securely configure a host of policies, restrictions and other settings. You will look at various tools and ways of generating these profiles.

FileVault 2

Learn how iOS devices secure the network over which an iOS device transmits and receives data. This layer consists of several integrated features, methods and functions that prevent unauthorised access to data sent to and from the device.

App Security

Learn how OS X secures data on the device itself.

Certificate Services

Certificates and identities that serve many purposes for data security, including automatically and securely authenticating users. Code signing mechanisms that prevent tampering with an application. Keychain services that securely store credentials such as usernames and passwords.

Network Security

Learn how OS X secures the network over which an OS X device transmits and receives data. This layer consists of several integrated features, methods and functions that prevent unauthorised access to data sent to and from the device.

Authentication methods that securely validate user credentials on login to private networks and resources. Network encryption technologies and protocols that protect the transmission of data between devices.

Wi-Fi technologies and protocols that provide seamless integration and secure access to wireless networks. VPN technologies that access private networks securely
.

Profiles

Privacy Controls

Application/Firewalls

Remote Lock/Wipe

Suitable For

Take this course if you are:

Prerequisites

Attendance on OS X Support Essentials v10.8 course, or equivalent experience.

Attendance on OS X Server Essentials v10.8 course, or equivalent experience.