Home Phone Email

Implementing AIX 7 Security

This course is designed to help implement a security policy in an AIX environment. Students will learn the security features of AIX including administrative commands and components such as Role Based Access Control and Trusted Execution, to secure the operating environment from security threats.

This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO – Instructor Led Online).

Profil uczestnika

The audiences for this advanced training include AIX technical support individuals, system administrators, system architects, engineers, and anyone who need an understanding of the security features of AIX.

Agenda

    AIX security features
    AIX base system security
    Role-based access control
    Encrypted file systems
    Trusted Execution
    LDAP
    Implementing security features at AIX installation

Wymagane przygotowanie uczestników

Students should have basic AIX administration experience. The AIX prerequisite may be met by attending one of the following courses or having equivalent AIX skills:
•    Power Systems for AIX II AIX Implementation and Administration 
•    Jumpstart for UNIX Professionals 

Zagadnienia

•    Describe security threats to a computer system
•    Describe the AIX commands and components for AIX system security
•    Configure the role-based access control (RBAC) feature
•    Implement encrypted file systems
•    Implement the Trusted Execution feature
•    Centralize security with LDAP
•    Implement the AIX installation time options of Secure by Default and Trusted AIX

INFORMACJA CENOWA:
od - zł netto za jedną osobę

CZAS TRWANIA (dni): 3

KOD SZKOLENIA: AN58G

MASZ PYTANIA?

Jeśli potrzebujesz więcej informacji o tym szkoleniu, zadzwoń do nas +48 22 487 84 90 lub wyślij wiadomość.

Leave this field blank

REJESTRACJA

Leave this field blank



INNE SZKOLENIA

Udostępnij swoim znajomym