Course Duration |
3 Days Hands on |
Course Fee |
Available upon request (Write to
us at
info@tlcpak.com) |
Operating System |
AIX 7.1 and AIX 7.2 |
Course Location |
Customer Onsite |
Course Code |
TN470 |
Group Discount |
Discounts are available for a classs
of 5 and 8 students |
Deliverables |
Comprehensive Student Guide and
Course Certificate |
PURPOSE:
Today's leaders face multiple challenges,
including the need to secure the enterprise against a barrage of new and
evolving sophisticated threats. The IBM business-driven approach to enterprise
security helps to identify gaps in your existing capabilities across the
people, processes, applications, data, technology and physical facilities
across your organization.
The goal of this course is to provide
participants a detailed knowledge and hands-on experience in implementing
AIX security mechanisms under AIX 7.1 and AIX 7.2.
AUDIENCE:
This course is intended for persons
who:
-
Want to learn what the security mechanisms
are builtin AIX Version 7.1 and 7.2
-
Will plan, implement, or distribute
a security policy in AIX
The audience for this training includes:
-
AIX technical support individuals
-
System administrators
-
System architects
PREREQUISITES:
Students should have basic AIX administration
experience. The AIX prerequisite may be met by attending one of the two
following classes or having equivalent AIX skills:
-
Power Systems for AIX II - AIX Implementation
and Administration (AN120) (AU14)
-
AIX Jumpstart for UNIX Professionals
(AW18) (Q1818)
OBJECTIVES:
On completion of this course participants
should be able to:
-
Security in an IT Environment
-
Describe security threats to a computer
system
-
Understand AIX Base Security in detail
-
List the AIX commands and components
that can meet both the base system and network security threats.
-
Introduction and implementation of a
Security Policy with AIXpert
-
Configure the Role Based Access Control
(RBAC) feature
-
Implement the encrypted file systems
feature
-
Implement the Trusted Computing Base
-
Implement the AIX install time options
of Secure by Default and Trusted AIX
-
Maintaining Systems Availability
COURSE OUTLINE
Unit 1: Security in an IT Environment
-
Define the importance of IT Security
-
Describe some common threats to IT security
-
Define a basic model of security architecture
-
The ISO 7498-2 Security Architecture
-
Understanding Logical and physical security
-
List common AIX security services and
threats
-
List AIX mechanisms for host security
-
List general guidelines for security
policies
-
Firewall Technologies
-
Enterprise Security in a view
-
Integrating the physical, logical security
layer
-
IBM Security Framework.
Unit 2: AIX Base System Security
-
Understand the concepts of users and
groups.
-
Controlling root access on the system.
-
Define the uses of SUID, SGID and SVTX
bits.
-
Understanding system wide security critical
logs.
-
Users initialization process in AIX.
-
Assigning security privileges to a normal
user.
-
Add/Change/Delete user and group accounts.
-
Setting up a long character user login
ID.
-
Locking and unlocking a user account.
-
Assigning users with ADMIN rights.
-
AIX security files associated with Users
and Groups.
-
AIX security checkpoint for security
administrator.
-
Documenting Security Policy and Setup.
Unit 3: AIX network security
-
Potential security breaches in TCP/IP.
-
Check common security requirements:
Availability,Integrity,
Confidentiality and Monitoring.
-
Understanding TCP/IP start-up flow.
-
TCP/IP network services Ports and
Sockets
-
Use AIX Network Monitoring tools iptrace,
ipreport, netpmon
and securetcpip.
-
Understanding network configuration
files.
-
Why ssh is secure as compare to telnet.
-
Hardening host security.
Unit 4: Implementing Role Based Accessed
Control
-
Introduction to AIX Role Back Access
Control.
-
Traditional approach to AIX system administration.
-
Understanding available roles and authorizations.
-
Describe the role of Kernel Security
Table.
-
The RBAC Framework. Understand AIX RBAC
commands.
-
Configuring Role Based Access Control.
-
Understanding Domain RBAC.
|
Unit 5: Implementing Trusted
Computing Base
-
Protecting your system from attacks.
-
Trojan Horse Practical Example.
-
Customization of system login prompt.
-
Configuring the Restricted Shell.
-
Configure AIX User defined authentication.
-
Extended File Permissions Access Control
List.
-
Concurrent recording of users activity.
-
Use the Trusted Computing Base (TCB)
facility to
monitor your system and maintain
system integrity.
-
Describe and utilize TCB components.
Unit 6: Implementing and distributing
a security policy
with AIXpert
-
Holistic view of AIX security framework.
-
Learn about AIX security and regulatory
and compliance.
-
Understand AIXpert and different levels
of securities levels.
-
Illustrates how to configure security
levels.
-
Understand AIXpert file repositories.
-
Distributing a security policy.
-
Undo a security policy.
-
Check the consistency of the security
policy.
-
AIX security policy hardening groups.
-
Disabling the remote logins.
-
Actions against server tampering.
Unit 7: Implementing Encrypted File
Systems
-
Introduction to Encrypted File System.
-
AIX Encrypted File System usability.
-
Understanding CryptoLite cryptographic
library.
-
Create and test EFS and related commands.
-
To backup & restore EFS.
Unit 8: AIX Install Time Security
Options
-
BOS Install Security Options
-
Understand Secure by Default (SbD) Installation.
-
Security actions to perform on a newly
installed or existing system.
-
Enabling and disabling SbD option.
-
Login control and setting up a organization
specific herald.
-
AIX X11 and CDE concerns.
-
Security Baselines.
-
Hardening OS, Network, and Application
security.
Unit 9: Maintaining Systems Availability
-
System continuous availability
-
Understand Denial of Service (DoS) attack.
-
DoS Vs. DDoS A Basic AIX Example.
-
Basic tools for detecting DoS attacks.
-
AIX host security checklist.
-
List common warning signs of a security
breach.
-
AIX commands used to detect intrusion.
-
Real Time countermeasures.
-
Cleaning up the system after intrusion.
|
|