Gerelateerde onderwerpen:
IBM


Implementing AIX Security Features

Doelgroep | Voorkennis | Doel | Onderwerpen | Data & prijzen | Aanmelden | Gerelateerd
Deze PlusPartner cursus hebben we niet meer in ons assortiment maar nog wel andere cursussen, bijvoorbeeld:Meer informatie? Klik hier!

This course is designed to help you implement a security policy in an AIX environment. AIX 6.1 features are covered.

Doelgroep cursus Implementing AIX Security Features

This course is intended for persons who:
Want to learn what the security mechanisms are in an AIX system.
Will plan, implement, or distribute a security policy in AIX.
The audience for this training includes:
AIX technical support individuals
System administrators
System architects

Voorkennis

Wij adviseren onderstaande voorkennis:

  • You should have basic AIX administration experience.
  • The AIX prerequisite can be met by attending one of the two following classes or having equivalent AIX skills:
  • AIX Version 5L System Administration I: Implementation (AU15) / (Q1314)
  • AIX 5L Jumpstart for UNIX Professionals (AW18) / (Q1818)

Doel

  • Describe security threats to a computer system
  • List the AIX commands and components that can meet both the base system and network security threats, including how to configure IPSEC and LDAP
  • Configure, distribute, and monitor a security policy and check sox-cobit compliance using AIX Security Expert and LDAP with Active Directory
  • Configure the Role Based Access Control (RBAC) feature (AIX 6.1)
  • Implement encrypted file systems (AIX 6.1)
  • Implement the Trusted Execution feature (AIX 6.1)
  • Implement trusted services using the PowerSC IBM product (AIX 6.1 TL6)
  • Implement the AIX install time options of Secure by Default and Trusted AIX (AIX 6.1)

Onderwerpen cursus Implementing AIX Security Features

De cursus Implementing AIX Security Features behandelt de volgende onderwerpen:

    • Day 1
      • (00:15) Welcome
      • (00:45) Unit 1 - Introduction to AIX security features
      • (01:30) Unit 2 - AIX base system security
      • (01:30) Unit 3 - AIX network security, topic 1 Securing remote commands
      • (00:30) Exercise 1 - Security in an IT environment
      • (01:00) Exercise 2 - AIX base system security
      • (00:30) Exercise 3 - AIX network security, topic 1 Securing remote commands
    • Day 2
      • (01:30) Unit 3 - AIX network security, topic 2 IPSec
      • (01:30) Unit 4 - Implementing and distributing a security policy with AIXpert
      • (01:30) Exercise 3 - AIX network security, topic 2 IPSec
      • (01:30) Exercise 4 - Implementing and distributing a security policy with AIXpert
    • Day 3
      • (01:00) Unit 5 - Implementing Role Based Access Control
      • (01:00) Unit 6 - Implementing encrypted file systems
      • (01:00) Unit 7 - Implementing Trusted Execution
      • (01:00) Exercise 5 - Implementing Role Based Access Control
      • (01:00) Exercise 6 - Implementing encrypted file systems
      • (01:00) Exercise 7 - Implementing Trusted Execution
    • Day 4
      • (01:30) Unit 8 - Centralizing security with LDAP and Kerberos
      • (00:30) Unit 9 - Implementing PowerSC, topic 1 Overview and compliance
      • (01:00) Unit 9 - Implementing PowerSC, topic 2 Trusted logs
      • (02:00) Exercise 8 - Implementing LDAP
      • (01:00) Exercise 9 - Implementing trusted logs

Meer informatie?

Geïnteresseerd geraakt in deze opleiding
en wilt u weten welke (vergelijkbare) cursus(sen) u wel kunt volgen?


Vraag informatie aan


Gerelateerde cursussen

In dezelfde cursusgroep bieden wij óók onderstaande opleidingen aan:


Getoonde informatie onder voorbehoud, genoemde prijzen zijn exclusief BTW.

Share |

 
Informatie 
  Contact
  Cursusoverzicht
  Cursuskalender
  Bel mij!
  Brochure aanvragen
  Aanmelden voor nieuwsbrief
  Stel een vraag
 
 
Cursuscategorieën