System i (AS/400, iSeries, i5) Security

Course Details:

Course code: ISSEC View/Download data sheet (PDF)
Duration: 1 Day Book Course
Price: £545 Return to Courses

Course Outline:

This course is intended for staff who are responsible for, or need to have a good understanding of security on the system. The key areas of security covered on this course are security system values, all the commands and tools needed to create and manage user and group profiles, all the commands and tools needed to secure data on the system, how to set up auditing and monitor activity on the system and how to secure the IFS.

Pre-requisites:

There are no specific pre-requisites but delegates should be computer literate.

Course content:

• Introduction to security
• The key elements of security on the System i
• Detail objects, libraries and library lists and introduce the IFS
• Detail all the security related system values
• The lock function for security system values
• How to set up system wide event auditing and how to set up user profile and object auditing
• Analyse audit entries
• How to create, change, copy, delete, display, print user and group profiles using CL commands
• How to manage user and group profiles effectively
• Additional commands to manage user profiles (automatically disable/delete profiles, default passwords, object ownership etc.)
• Useful tools in Navigator to help manage user and group profiles
• Detail adopted authority and how to monitor and manage it
• Detail Service Tools User ID’s (IBM default SST User ID’s, create and manage SST User ID’s, recover QSECOFR password etc.)
• Detail how object authority works
• How Public authority is assigned
• Use CL commands to secure objects and manage object authorities
• Create and manage authorisation lists
• Use the security tools menus
• How the system authenticates a user to an object
• How to secure directories and objects in the IFS
• Restricting access to the QSYS.LIB file system
• How to secure file shares and mapped network drives
• Work with Function Usage and Application Administration to secure functions such as FTP, Data Transfer, Navigator etc.

Follow on Courses:

Potential follow on courses will depend on the job role of the delegate concerned. Note the majority of this course is also covered on the System Management and Administration course (ISADM) so delegates should not attend both courses.

Schedule:       

  2025                      
Public schedule Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Northampton     3                  
                                                             We can offer dates for this course on request – Please contact us for details.

 

Schedule:

2025
 
Jan  
Feb  
Mar 3
Apr  
May  
Jun  
Jul  
Aug  
Sep  
Oct  
Nov  
Dec  
We can offer dates for this course on request – Please contact us for details

 

Book course:

ISSEC Security booking form
Please double check this!
Please tick the box below to confirm that you agree to the Privacy Policy of Sierra Training.
Please tick the box below to confirm that you agree to the Terms & Conditions of Sierra Training.
Sending