Implementing AIX 7 Security
366 Students
• Describe
security threats to a computer system
• Describe the AIX commands and components for AIX system
security
• Configure the role-based access control (RBAC) feature
• Implement encrypted file systems
• Implement the Trusted Execution feature
• Centralize security with LDAP
• Implement the AIX installation time options of Secure by
Default and Trusted AIX
The audiences for this advanced training include AIX technical support individuals, system administrators, system architects, engineers, and anyone who need an understanding of the security features of AIX.
3 Days - Basic to Intermediate