Implementing AIX Security Features Global Knowledge Egypt
Price: TBA

    Course details

    This course is designed to help you implement a security policy in an AIX environment. AIX 6.1 features are covered.

    Target Audience:

    This course is intended for persons who: Want to learn what the security mechanisms are in an AIX system. Will plan, implement, or distribute a security policy in AIX.

    The audience for this training includes: AIX technical support individuals System administrators System architects

    Objectives:

    • Describe security threats to a computer system
    • List the AIX commands and components that can meet both the base system and network security threats, including how to configure IPSEC and LDAP
    • Configure, distribute, and monitor a security policy and check sox-cobit compliance using AIX Security Expert and LDAP with Active Directory
    • Configure the Role Based Access Control (RBAC) feature (AIX 6.1)
    • Implement encrypted file systems (AIX 6.1)
    • Implement the Trusted Execution feature (AIX 6.1)
    • Implement trusted services using the PowerSC IBM product (AIX 6.1 TL6)
    • Implement the AIX install time options of Secure by Default and Trusted AIX (AIX 6.1)

    Prerequisites:

    You should have basic AIX administration experience.

    • The AIX prerequisite can be met by attending one of the two following classes or having equivalent AIX skills:
    • AIX Version 5L System Administration I: Implementation (AU15) / (Q1314)
    • AIX 5L Jumpstart for UNIX Professionals (AW18) / (Q1818)

    Content:

    • Unit 1 - Introduction to AIX security features
    • Unit 2 - AIX base system security
    • Unit 3 - AIX network security, topic 1 Securing remote commands
    • Exercise 1 - Security in an IT environment
    • Exercise 2 - AIX base system security
    • Exercise 3 - AIX network security, topic 1 Securing remote commands
    • Unit 4 - Implementing and distributing a security policy with AIXpert
    • Exercise 3 - AIX network security, topic 2 IPSec
    • Exercise 4 - Implementing and distributing a security policy with AIXpert
    • Unit 6 - Implementing encrypted file systems
    • Unit 7 - Implementing Trusted Execution
    • Exercise 5 - Implementing Role Based Access Control
    • Exercise 6 - Implementing encrypted file systems
    • Exercise 7 - Implementing Trusted Execution
    • Unit 9 - Implementing PowerSC, topic 1 Overview and compliance
    • Unit 9 - Implementing PowerSC, topic 2 Trusted logs
    • Exercise 8 - Implementing LDAP
    • Exercise 9 - Implementing trusted logs
    Updated on 08 November, 2015

    About Global Knowledge Egypt

    Global Knowledge is the worldwide leader in IT and business skills training. They deliver via training centers, private facilities, and the Internet, enabling their customers to choose when, where, and how they want to receive training programs and learning services.

    See all Global Knowledge Egypt courses
    Are you from Global Knowledge Egypt ? Claim your course!
    Courses you can instantly connect with... Do an online course on Networking and Security starting now. See all courses

    Is this the right course for you?

    Rate this page

    Didn't find what you were looking for ?

    or