Consulting Services
Systems Integration
ERP Services
NSG Services
e-Commerce Services
Application Development & Management Services
Education & Training Services
About Instructor
AIX Education and Training Roadmap
Fax Back Form
Hardware Repair & Maintenance Services
Data Center Hosting Services

 

 
Home > IT Services > Education & Training Services
 
 
 
 

AIX 5L Securities

Course Code : Code SA41
Course Duration : 2 Days – Hands on
Course Fee : 84,000 PKR
Operating System : AIX 5L Version 5.3
Course Location : Karachi
Course Starting Date : To Be Assigned

PURPOSE:
The goal of this course is to provide participants a detailed knowledge and hands-on experience in implementing AIX security mechanisms. 

AUDIENCE:
This course is targeted for system administrators with at least one year experience in AIX and with other relevant education.

PREREQUISITES:
Participants should be experienced System Administrators and should have previously attended IBM AU14 (AIX System Administration I: Implementation) and AU16 (AIX System Administration II: Problem Determination).

OBJECTIVES: 
On completion of this course participants should be able to:

  • Explain common security concepts including authentication, authorization, confidentiality, privacy, integrity, and availability, as well as how they can apply in AIX  environment.
  • Describe processes for effective security management and evaluate a security policy. Identify security vulnerabilities in any AIX system.
  • The basic concepts taught in this course are based on IBM AIX security architecture model that discuss AIX Trusted Computing Base in detail.

Course Outline: 
On successful completion of this course, students should be able to

  • Introduction to AIX Security
  • Identification and Authorization 
  • AIX System Authentication
  • Understand password management 
  • System architecture 
  • System Access Control 
  • Understand advanced file permissions
  • Explain potential security exposures caused by improper  file permission management
  • Monitoring Host Integrity
  • Monitoring Security Breaches in AIX
  • Define what is Denial of Service Attacks  (DoS)
  • Describe different types of DoS attacks 
  • Manage limited system resources 
  • Describe attacks on AIX system resources 
  • Use AIX Trusted Computing Base (TCB) facility to monitor your system and maintain system integrity 
  • Describe and utilize essential TCB components 
  • Understand the use of Secure Attention Key (SAK) 
  • The use of Trusted Login Shell for higher security
  • List the common warning signs of a security breach
  • Describe commands that may be used to detect intrusion 
  • Understand security issues that go beyond system security

Back

 

 

 
 
 
 
 
 
Successful up-gradation of RDBMS 10gR2 for Oracle Application 11i & Data Guard implemented with (Real time data replication) on IBM Power Series for NLC.
Si3 Successfully Implemented of AWACS (Survilliance Application) Phase1at SECP.
Our performance speaks for itself: Si3 has won 6 awards from P@SHA since 2004
As part of the restructuring initiative, Adnan Ikram has been appointed as the new Chief Operating Officer
DP World Pakistan extends the Service Level Agreement for Oracle ERP
Full suite of Oracle HRMS implementation at Faysal Bank Limited.
Memova Messaging Deployment at PTCL
IBM AIX training program launched as part of its services initiative
Si3 is implementing Oracle HRMS at NIB Bank.
HP Pakistan awards “Best Performing Managed Partner – TSG” for Southern Region – Year 2008



 

 
Contact Us | Sitemap | Term of Use
Copyright © 2010. System Innovations (Pvt) Limited