Základní info
This course is designed to help you implement a security policy in an AIX environment. AIX 6.1 features are covered.
- Welcome
- Unit 1 - Introduction to AIX security features Unit 2 - AIX base system security
- Unit 3 - AIX network security, Topic 1: Securing remote commands Exercise 1 - Security in an IT environment
- Exercise 2 - AIX base system security
- Exercise 3 - AIX network security, Part 1: TCP/IP security environment
- Unit 3 - AIX network security, Topic 2: IP Security
- Unit 4 - Implementing and distributing a security policy with AIXPert Exercise 3 - AIX network security, Part 2: NFS
- Exercise 4 - Implementing and distributing a security policy with AIXPert
- Unit 5 - Implementing role-based access control
- Unit 6 - Implementing encrypted file systems Unit 7 - Implementing Trusted Execution
- Exercise 5 - Implementing role-based access control Exercise 6 - Implementing encrypted file systems Exercise 7 - Implementing Trusted Execution
- Unit 8 - Introduction to PowerSC
- Unit 9 - Centralizing security with LDAP and Kerberos, Topic 1: Implementing an AIX LDAP server
- Exercise 8 - Introducing PowerSC
- Exercise 9 - Centralizing security with LDAP and Kerberos, Part 1: LDAP on AIX
- Unit 9 - Centralizing security with LDAP and Kerberos, Topic 2: Kerberos and
- Active Directory
- Unit 10 - AIX install time security options
- Exercise 9 - Centralizing security with LDAP and Kerberos, Part 2: LDAP with Active Directory
- Exercise 10 - AIX install time security options
- Lab time