4levels teams with the top technology providers to enhance your operations   |   Domains & Hosting   |  Get Support   | My 4levels
GET IN TOUCH
+27 (0)11 848 6229

IBM

4levels-IT-Default-Header

Implementing AIX Security Features


Course Description


Overview

This course is designed to help you implement a security policy in an AIX environment. AIX 6.1 features are covered.  

Audience

This advanced course is intended for persons who:
  • Want to learn what the security mechanisms are in an AIX system
  • Will plan, implement, or distribute a security policy in AIX
  • The audience for this training includes:
  • AIX technical support individuals
  • System administrators
  • System architects

Prerequisites

You should have basic AIX administration experience. The AIX prerequisite may be met by attending one of the two following classes or having equivalent AIX skills:
  • AIX Basics (AN10G)
  • Jumpstart for UNIX Professionals (AN14G)
To use PowerSC, a knowledge of VIO LPARs is required. This prerequisite could be met by attending the following class or having equivalent skills.
  • Power Systems for AIX - Virtualization I: Implementing Virtualization (AN30G)

Key topics

Day 1
  • Welcome
  • Unit 1 - Introduction to AIX security features Unit 2 - AIX base system security
  • Unit 3 - AIX network security, Topic 1: Securing remote commands Exercise 1 - Security in an IT environment
  • Exercise 2 - AIX base system security
  • Exercise 3 - AIX network security, Part 1: TCP/IP security environment
Day 2
  • Unit 3 - AIX network security, Topic 2: IP Security
  • Unit 4 - Implementing and distributing a security policy with AIXPert Exercise 3 - AIX network security, Part 2: NFS
  • Exercise 4 - Implementing and distributing a security policy with AIXPert
Day 3
  • Unit 5 - Implementing role-based access control
  • Unit 6 - Implementing encrypted file systems Unit 7 - Implementing Trusted Execution
  • Exercise 5 - Implementing role-based access control Exercise 6 - Implementing encrypted file systems Exercise 7 - Implementing Trusted Execution
Day 4
  • Unit 8 - Introduction to PowerSC
  • Unit 9 - Centralizing security with LDAP and Kerberos, Topic 1: Implementing an AIX LDAP server
  • Exercise 8 - Introducing PowerSC
  • Exercise 9 - Centralizing security with LDAP and Kerberos, Part 1: LDAP on AIX
Day 5
  • Unit 9 - Centralizing security with LDAP and Kerberos, Topic 2: Kerberos and
  • Active Directory
  • Unit 10 - AIX install time security options
  • Exercise 9 - Centralizing security with LDAP and Kerberos, Part 2: LDAP with Active Directory
  • Exercise 10 - AIX install time security options
  • Lab time

Objectives

  • Describe security threats to a computer system
  • List the AIX commands and components that can meet both the base system and network security threats, including how to configure IPSEC and LDAP
  • Configure, distribute, and monitor a security policy and check sox-cobit compliance using AIX Security Expert and LDAP with Active Directory
  • Configure the role-based access control (RBAC) feature (AIX 6.1)
  • Implement encrypted file systems (AIX 6.1)
  • Implement the Trusted Execution feature (AIX 6.1)
  • Implement trusted services using the PowerSC IBM product (AIX 6.1 TL6)
  • Implement the AIX install time options of Secure by Default and Trusted AIX (AIX 6.1)

Course Duration

5 days
  • Brands we have partnered with to add value to your business


    We are committed to helping our clients reach their business goals

    4levels’ preferred access to the latest technologies, premier technical support and advanced training helps provide you with specialist and customized solutions that help you achieve your business goals.

4levels Solutions sign up form


Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur excepteur sint occaecat cupidatat non

4levels Solutionslogin form