Implementing AIX Security Features

Kurz na míru

Základní info

This course is designed to help you implement a security policy in an AIX environment. AIX 6.1 features are covered. Welcome Unit 1 - Introduction to AIX security features Unit 2 - AIX base system security Unit 3 - AIX network security, Topic 1: Securing remote commands Exercise 1 - Security in an IT environment Exercise 2 - AIX base system security Exercise 3 - AIX network security, Part 1: TCP/IP security environment Unit 3 - AIX network security, Topic 2: IP Security Unit 4 - Implementing and distributing a security policy with AIXPert Exercise 3 - AIX network security, Part 2: NFS Exercise 4 - Implementing and distributing a security policy with AIXPert Unit 5 - Implementing role-based access control Unit 6 - Implementing encrypted file systems Unit 7 - Implementing Trusted Execution Exercise 5 - Implementing role-based access control Exercise 6 - Implementing encrypted file systems Exercise 7 - Implementing Trusted Execution Unit 8 - Introduction to PowerSC Unit 9 - Centralizing security with LDAP and Kerberos, Topic 1: Implementing an AIX LDAP server Exercise 8 - Introducing PowerSC Exercise 9 - Centralizing security with LDAP and Kerberos, Part 1: LDAP on AIX Unit 9 - Centralizing security with LDAP and Kerberos, Topic 2: Kerberos and Active Directory Unit 10 - AIX install time security options Exercise 9 - Centralizing security with LDAP and Kerberos, Part 2: LDAP with Active Directory Exercise 10 - AIX install time security options Lab time

Implementing AIX Security Features

Kontaktovat dodavatele


Kontrola proti spamu. Kolik je sedm a sedm ? Součet zapište číslicemi.