System i (AS/400, iSeries, i5) Security
|Course code: ISSEC||View/Download data sheet (PDF)|
|Duration: 1 Day||Book Course|
|Price: £475||Return to Courses|
This course is intended for staff who are responsible for, or need to have a good understanding of security on the system. The key areas of security covered on this course are security system values, all the commands and tools needed to create and manage user and group profiles, all the commands and tools needed to secure data on the system, how to set up auditing and monitor activity on the system and how to secure the IFS.
There are no specific pre-requisites but delegates should be computer literate.
• Introduction to security
• The key elements of security on the System i
• Detail objects, libraries and library lists and introduce the IFS
• Detail all the security related system values
• The lock function for security system values
• How to set up system wide event auditing and how to set up user profile and object auditing
• Analyse audit entries
• How to create, change, copy, delete, display, print user and group profiles using CL commands
• How to manage user and group profiles effectively
• Additional commands to manage user profiles (automatically disable/delete profiles, default passwords, object ownership etc.)
• Useful tools in Navigator to help manage user and group profiles
• Detail adopted authority and how to monitor and manage it
• Detail Service Tools User ID’s (IBM default SST User ID’s, create and manage SST User ID’s, recover QSECOFR password etc.)
• Detail how object authority works
• How Public authority is assigned
• Use CL commands to secure objects and manage object authorities
• Create and manage authorisation lists
• Use the security tools menus
• How the system authenticates a user to an object
• How to secure directories and objects in the IFS
• Restricting access to the QSYS.LIB file system
• How to secure file shares and mapped network drives
• Work with Function Usage and Application Administration to secure functions such as FTP, Data Transfer, Navigator etc.
Follow on Courses:
Potential follow on courses will depend on the job role of the delegate concerned. Note the majority of this course is also covered on the System Management and Administration course (ISADM) so delegates should not attend both courses.
|We will scheule this course on demand – Please contact us for details|
|We will schedule this course on demand – Please contact us for details|