Menu

IBM i Security Concepts and Implementation – ol50gpl

Course #: ol50gpl

Duration: 2 Days

Learn how to plan for, implement, and manage security on the IBM i. Also, get an introduction to the features and functions of Management Central.

If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

http://www.ibm.com/training/terms

Objectives

  • Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security
  • Develop a security plan for your IBM i
  • Describe the options to implement security auditing
  • Develop a plan to audit security on your IBM i

Audience

This is an intermediate course intended for IBM i system administrators, data processing managers and other individuals who implement and manage security on the IBM i. This course is not recommended for system operators.

Prerequisites

You should complete System Operator Workshop for IBM i (AS240) and have responsibility for implementing the security features available for your Power Systems with IBM i.

Topics

  • Class administration and introductions
  • IBM i overview and concepts
  • Management central overview
  • Security concepts and overview
  • System values
  • User security
  • Resource security
  • Security auditing
  • Designing security

Contact us regarding the training