Apple Mac Advanced OS X Security — A 1 day course
This one day course will cover the skills necessary to secure OS X. The course is a mixture of theory and hands on and will cover both Apple and third party tools. Delegates will learn how to secure the Mac manually as well as creating payloads to automatically secure these systems.
Security planing along with a threat overview. Learn about OS X security layers. The layers of security include integrated features, methods and functions that prevent unauthorized use of OS X.
Parental Controls (Managed Preferences)
- Restricting access to Macs running OS X
Controlling what gets installed on your Mac. Understand how Gatekeeper restricts which apps can be installed from an Admin, User and developer perspective. You will also explore the advanced command line tools for Gatekeeper.
- Block malicious code
Dynamically apply configuration changes. Configuration profiles that can be used to automatically and securely configure a host of policies, restrictions and other settings. You will look at various tools and ways of generating these profiles.
Learn how iOS devices secure the network over which an iOS device transmits and receives data. This layer consists of several integrated features, methods and functions that prevent unauthorised access to data sent to and from the device.
Learn how OS X secures data on the device itself.
- FileVault architecture
- Live encryption
- Instant Wipe
- Simple end user recovery
- Time Machine compatibility
- Command line tools
Certificates and identities that serve many purposes for data security, including automatically and securely authenticating users. Code signing mechanisms that prevent tampering with an application. Keychain services that securely store credentials such as usernames and passwords.
Learn how OS X secures the network over which an OS X device transmits and receives data. This layer consists of several integrated features, methods and functions that prevent unauthorised access to data sent to and from the device.
Authentication methods that securely validate user credentials on login to private networks and resources. Network encryption technologies and protocols that protect the transmission of data between devices.
Wi-Fi technologies and protocols that provide seamless integration and secure access to wireless networks. VPN technologies that access private networks securely .
- Creating and deploying profiles
Take this course if you are:
- Responsible for the maintenance, deployment and security of OS X devices
- Would like an overview of solutions available to secure OS X devices
Attendance on OS X Support Essentials v10.8 course, or equivalent experience.
Attendance on OS X Server Essentials v10.8 course, or equivalent experience.