Learn about the AIX facilities to implement security and compliance policies. During this course you will discuss: security concerns in an IT environment; the AIX commands to implement base system and network security; the aixpert facility to design, implement, check and distribute a security policy. You will also learn about the new features in AIX 6.1 and AIX 7.1: Role Based Access Control (RBAC) and domain RBAC, Encrypted File Systems, Trusted Execution, PowerSC, Secure by Default and Trusted AIX.
This course provides lectures and hands on labs in a face-to-face classroom setting. The course is also offered in a live virtual classroom environment with hands-on labs Implementing AIX Advanced Security Features (ILO) (AX570HU).
- Describe security threats to a computer system
- List the AIX commands and components that can meet both the base system and network security threats including how to configure Internet Protocol Security (IPSEC) and Lightweight Directory Access Protocol (LDAP).
- Configure, distribute and monitor a security policy and check soxx-cobit compliance using AIXPert and LDAP with Active Directory
- Configure the RBAC and domain RBAC feature in AIX 6.1 and AIX 7.1
- Implement the encrypted file systems feature of AIX 6.1/ AIX 7.1
- Implement the trusted execution feature of AIX 6.1/ AIX 7.1
This advanced course is intended for system administrators, system architects and other AIX technical support individuals who will plan, implement, or distribute a security policy in AIX.
- Implement the AIX install time options of Secure by Default and Trusted AIX.
- Configure PowerSC
- Unit 1 - Security in an IT environment
- Unit 2 - AIX base system security
- Unit 3 - AIX network security topic 1 (securing remote commands)
- Exercise 1 - Security in an IT environment
- Exercise 2 - AIX base system security
- Exercise 3 - AIX network security topic 1 (securing remote commands)
- Unit 3 - AIX network security topic 2 (IPSEC)
- Unit 4 - Implementing AIXpert
- Exercise 3 - AIX network security topic 2 (IPSEC)
- Exercise 4 - Implementing AIXpert
- Unit 5 - Implementing RBAC
- Unit 6 - Implementing Encrypted File Systems
- Unit 7 - Implementing Trusted Execution
- Exercise 5 - Implementing RBAC
- Exercise 6 - Implementing Encrypted File Systems
- Exercise 7 - Implementing Trusted Execution
- Unit 8 - Implementing LDAP
- Unit 9 - Implementing PowerSC overview and compliance
- Unit 9 - Implementing PowerSC trusted logs
- Exercise8 - Implementing LDAP
- Exercise9 - Implementing PowerSC trusted logs
- Unit 9 - Implementing PowerSC trusted patch management
- Unit 9 - Implementing PowerSC trusted boot
- Unit 9 - Implementing PowerSC trusted firewall
- Unit 10 - AIX install time security options
- Exercise 10 - AIX install time security options
You should have basic AIX administration experience.
The AIX prerequisite may be met by attending one of the two following classes or having equivalent AIX skills:
- Power Systems for AIX II: AIX Implementation and Administration (AN120HU)
- •AIX Jumpstart for UNIX Professionals (AN140HU)