Course objectives
After completing this course, students will be able to:
- Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security
- Develop a security plan for your Power Systems with IBM i
- Describe the options to implement security auditing
- Develop a plan to audit security on your Power Systems with IBM i
- Describe the IBM i availability products and features and choose the option(s) that best fit your company requirements
- Describe how to backup and recover user, IBM and full system data on your Power Systems with IBM i
- Develop a backup and recovery plan for your Power Systems with IBM i
- Describe the system diagnostics and problem determination procedures available on your Power Systems with IBM i
Course outlines
- Class administration and introductions
- IBM i overview and concepts
- Management central overview
- Security concepts and overview
- System values
- User security
- Resource security
- Security auditing
- Designing security
- IBM i availability overview
- Disk management
- Backup and recovery strategy using Save/Restore
- Journal management
- Commitment control overview
- Backup and recovery planning
- Problem determination
- Overview of Systems Director Navigator for i
- Introduction to BRMS