name :
AN58G
title :
Implementing AIX 7 Security
RegistrationLink :
https://academy.techdata.com/on-demand/TT-141467
category :
Systems
vendor :
IBM
classroomDeliveryMethod :
Classroom IBM
descriptions :
description :
OverviewThis course is designed to help implement a security policy in an AIX environment. Students will learn the security features of AIX including administrative commands and components such as Role Based Access Control and Trusted Execution, to secure the operating environment from security threats.
This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO - Instructor Led Online).AudienceThe audiences for this advanced training include AIX technical support individuals, system administrators, system architects, engineers, and anyone who need an understanding of the security features of AIX.PrerequisitesStudents should have basic AIX administration experience. The AIX prerequisite may be met by attending one of the following courses or having equivalent AIX skills:
• Power Systems for AIX II AIX Implementation and Administration (AN12G) or (AX12G)
• Jumpstart for UNIX Professionals (AN14G)Objective• Describe security threats to a computer system
• Describe the AIX commands and components for AIX system security
• Configure the role-based access control (RBAC) feature
• Implement encrypted file systems
• Implement the Trusted Execution feature
• Centralize security with LDAP
• Implement the AIX installation time options of Secure by Default and Trusted AIX Course Outline AIX security features
AIX base system security
Role-based access control
Encrypted file systems
Trusted Execution
LDAP
Implementing security features at AIX installation
• Power Systems for AIX II AIX Implementation and Administration (AN12G) or (AX12G)
• Jumpstart for UNIX Professionals (AN14G)Objective• Describe security threats to a computer system
• Describe the AIX commands and components for AIX system security
• Configure the role-based access control (RBAC) feature
• Implement encrypted file systems
• Implement the Trusted Execution feature
• Centralize security with LDAP
• Implement the AIX installation time options of Secure by Default and Trusted AIX Course Outline AIX security features
AIX base system security
Role-based access control
Encrypted file systems
Trusted Execution
LDAP
Implementing security features at AIX installation
overview :
[This course is designed to help implement a security policy in an AIX environment. Students will learn the security features of AIX including administrative commands and components such as Role Based Access Control and Trusted Execution, to secure the operating environment from security threats., This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO - Instructor Led Online).]
abstract :
This course is designed to help implement a security policy in an AIX environment. Students will learn the security features of AIX including administrative commands and components such as Role Based Access Control and Trusted Execution, to secure the operating environment from security threats.
This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO - Instructor Led Online).
prerequisits :
objective :
Overview
This course is designed to help implement a security policy in an AIX environment. Students will learn the security features of AIX including administrative commands and components such as Role Based Access Control and Trusted Execution, to secure the operating environment from security threats.
This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO - Instructor Led Online).
Audience
The audiences for this advanced training include AIX technical support individuals, system administrators, system architects, engineers, and anyone who need an understanding of the security features of AIX.
Prerequisites
Students should have basic AIX administration experience. The AIX prerequisite may be met by attending one of the following courses or having equivalent AIX skills:
• Power Systems for AIX II AIX Implementation and Administration (AN12G) or (AX12G)
• Jumpstart for UNIX Professionals (AN14G) Objective • Describe security threats to a computer system
• Describe the AIX commands and components for AIX system security
• Configure the role-based access control (RBAC) feature
• Implement encrypted file systems
• Implement the Trusted Execution feature
• Centralize security with LDAP
• Implement the AIX installation time options of Secure by Default and Trusted AIX
• Power Systems for AIX II AIX Implementation and Administration (AN12G) or (AX12G)
• Jumpstart for UNIX Professionals (AN14G) Objective • Describe security threats to a computer system
• Describe the AIX commands and components for AIX system security
• Configure the role-based access control (RBAC) feature
• Implement encrypted file systems
• Implement the Trusted Execution feature
• Centralize security with LDAP
• Implement the AIX installation time options of Secure by Default and Trusted AIX
topic :
Course Outline AIX security features
AIX base system security
Role-based access control
Encrypted file systems
Trusted Execution
LDAP
Implementing security features at AIX installation
AIX base system security
Role-based access control
Encrypted file systems
Trusted Execution
LDAP
Implementing security features at AIX installation
startDate :
2021-01-22T02:40:11Z
endDate :
2021-01-30T00:00:00Z
lastModified :
2021-01-20T08:00:40Z
created :
2016-11-19T08:02:13Z
duration :
24
durationUnit :
HOURS
ibmIPType :
listPrice :
1785
currency :
GBP
badge_Template_ID :
badge_Title :
badge_Url :