AN57G: Implementing AIX Security Features



             Recommended Duration: 5 Days
Skill Level: Advanced
Cost: $5,200 (b/GST)
(ENROL NOW)
Available for Web and Classroom Trainings.

This course is designed to help students implement a security policy in an AIX environment. AIX 6.1 features are covered.

Training Path to IBM AIX Security, Network Administration and Performance



Audience


This advanced course is intended for persons who:

  • Want to learn what the security mechanisms are in an AIX system
  • Will plan, implement, or distribute a security policy in AIX

The audience for this training includes:

  • AIX Technical Support Individuals
  • System Administrators
  • System Architects


Prerequisites


Students should have basic AIX administration experience. The AIX prerequisite may be met by attending one of the two following classes or having equivalent AIX skills:

To use PowerSC, a knowledge of VIO LPARs is required. This prerequisite could be met by attending the following class or having equivalent skills.



Course Agenda


Describe Security Threats to a Computer Ssystem
List the AIX cCommands and Components that can meet both the Base System and Network Security Threats, including how to configure IPSEC and LDAP
Configure, Distribute, and Monitor a Security Policy and Check sox-cobit Compliance using AIX Security Expert and LDAP with Active Directory
Configure the Role-Based Access Control (RBAC) Feature (AIX 6.1)
Implement Encrypted File Systems (AIX 6.1)
Implement the Trusted Execution Feature (AIX 6.1)
Implement Trusted Services using the PowerSC IBM Product (AIX 6.1 TL6)
Implement the AIX Install Time Options of Secure by Default and Trusted AIX (AIX 6.1)



Course Overview


Day 1

  • Introduction
  • Unit 1: Introduction to AIX Security Features
  • Unit 2: AIX Base System Security
  • Unit 3: AIX Network Security (Topic 1 - Securing Remote Commands)
  • Exercise 1: Security in an IT Environment
  • Exercise 2: AIX Base System Security
  • Exercise 3: AIX Network Security (Part 1 - TCP/IP Security Environment)

Day 2

  • Unit 3: AIX Network Security (Topic 2 - IP Security)
  • Unit 4: Implementing and Distributing a Security Policy with AIXPert
  • Exercise 3: AIX Network Security (Part 2 - NFS)
  • Exercise 4: Implementing and Distributing a Security Policy with AIXPert

Day 3

  • Unit 5: Implementing Role-Based Access Control
  • Exercise 5: Implementing Role-Based Access Control
  • Unit 6: Implementing Encrypted File Systems
  • Exercise 6: Implementing Encrypted File Systems
  • Unit 7: Implementing Trusted Execution
  • Exercise 7: Implementing Trusted Execution

Day 4

  • Unit 8: Introduction to PowerSC
  • Unit 9: Centralizing Security with LDAP and Kerberos (Topic 1 - Implementing an AIX LDAP Server)
  • Exercise 8: Introducing to PowerSC
  • Exercise 9: Centralizing Security with LDAP and Kerberos (Part 1 - LDAP on AIX)

Day 5

  • Unit 9: Centralizing Security with LDAP and Kerberos (Topic 2 - Kerberos and Active Directory)
  • Unit 10: AIX install Time Security Options
  • Exercise 9: Centralizing Security with LDAP and Kerberos (Part 2 - LDAP with Active Directory)
  • Exercise 10: AIX install Time Security Option