|
AIX 5L Securities
Code SA41 |
2 Days – Hands on |
84,000 PKR |
AIX 5L Version 5.3 |
Karachi |
To Be Assigned |
The goal of this course is to provide participants a detailed knowledge and hands-on experience in implementing AIX security mechanisms.
This course is targeted for system administrators with at least one year experience in AIX and with other relevant education.
Participants should be experienced System Administrators and should have previously attended IBM AU14 (AIX System Administration I: Implementation) and AU16 (AIX System Administration II: Problem Determination).
- Explain common security concepts including authentication, authorization, confidentiality, privacy, integrity, and availability, as well as how they can apply in AIX environment.
- Describe processes for effective security management and evaluate a security policy. Identify security vulnerabilities in any AIX system.
- The basic concepts taught in this course are based on IBM AIX security architecture model that discuss AIX Trusted Computing Base in detail.
|
On successful completion of this course, students should be able to
- Introduction to AIX Security
- Identification and Authorization
- AIX System Authentication
- Understand password management
- System architecture
- System Access Control
- Understand advanced file permissions
- Explain potential security exposures caused by improper file permission management
- Monitoring Host Integrity
- Monitoring Security Breaches in AIX
- Define what is Denial of Service Attacks (DoS)
- Describe different types of DoS attacks
|
- Manage limited system resources
- Describe attacks on AIX system resources
- Use AIX Trusted Computing Base (TCB) facility to monitor your system and maintain system integrity
- Describe and utilize essential TCB components
- Understand the use of Secure Attention Key (SAK)
- The use of Trusted Login Shell for higher security
- List the common warning signs of a security breach
- Describe commands that may be used to detect intrusion
- Understand security issues that go beyond system security
|
|
|