This course is designed to help you implement a security policy in an AIX environment. AIX 6.1 features are covered.

Target Audience:

This course is intended for persons who: Want to learn what the security mechanisms are in an AIX system. Will plan, implement, or distribute a security policy in AIX.

The audience for this training includes: AIX technical support individuals System administrators System architects

Objectives:

  • Describe security threats to a computer system
  • List the AIX commands and components that can meet both the base system and network security threats, including how to configure IPSEC and LDAP
  • Configure, distribute, and monitor a security policy and check sox-cobit compliance using AIX Security Expert and LDAP with Active Directory
  • Configure the Role Based Access Control (RBAC) feature (AIX 6.1)
  • Implement encrypted file systems (AIX 6.1)
  • Implement the Trusted Execution feature (AIX 6.1)
  • Implement trusted services using the PowerSC IBM product (AIX 6.1 TL6)
  • Implement the AIX install time options of Secure by Default and Trusted AIX (AIX 6.1)

Prerequisites:

You should have basic AIX administration experience.

  • The AIX prerequisite can be met by attending one of the two following classes or having equivalent AIX skills:
  • AIX Version 5L System Administration I: Implementation (AU15) / (Q1314)
  • AIX 5L Jumpstart for UNIX Professionals (AW18) / (Q1818)

Content:

  • Unit 1 - Introduction to AIX security features
  • Unit 2 - AIX base system security
  • Unit 3 - AIX network security, topic 1 Securing remote commands
  • Exercise 1 - Security in an IT environment
  • Exercise 2 - AIX base system security
  • Exercise 3 - AIX network security, topic 1 Securing remote commands
  • Unit 4 - Implementing and distributing a security policy with AIXpert
  • Exercise 3 - AIX network security, topic 2 IPSec
  • Exercise 4 - Implementing and distributing a security policy with AIXpert
  • Unit 6 - Implementing encrypted file systems
  • Unit 7 - Implementing Trusted Execution
  • Exercise 5 - Implementing Role Based Access Control
  • Exercise 6 - Implementing encrypted file systems
  • Exercise 7 - Implementing Trusted Execution
  • Unit 9 - Implementing PowerSC, topic 1 Overview and compliance
  • Unit 9 - Implementing PowerSC, topic 2 Trusted logs
  • Exercise 8 - Implementing LDAP
  • Exercise 9 - Implementing trusted logs

Global Knowledge is the worldwide leader in IT and business skills training. They deliver via training centers, private facilities, and the Internet, enabling their customers to choose when, where, and how they want to receive training programs and learning services.

See all Global Knowledge Egypt courses

Contact information not available.

Courses you can instantly connect with...
Cisco Certified Network Associate - CCNA American Academy Cisco Certified Network Associate (CCNA) Helper Learning AutoCAD + SAP Package Jelecom Training

Is this the right course for you?

Rate our content

Didn't find what you were looking for ?

or