IBM i

logo

Tailored to Needs

Call Us: 01225 339705 Email: This email address is being protected from spambots. You need JavaScript enabled to view it. Address: Verhoef Training, 11 Kingsmead Square, Bath, BA1 2AB

  • Register

 

Audience

This course is for IT managers and staff who are responsible for:

  • Designing and implementing a security plan.
  • Implementing a backup and recovery plan.
  • Implementing a system availability plan.
  • Performing problem determination procedures and activities.


This course is not recommended for system operators or end users.

Dates (Bath):

29 Jan 2018

9 Apr 2018

10 Dec 2018

Click for details & booking.

Also available on your site, please call for details.

Prerequisites

Delegates should have:

  • Completed the System Operator Workshop for IBM i (AS24G) course, or have the equivalent knowledge and experience.
  • A basic understanding of security concepts on the System i.
  • A working knowledge of how to perform backup and recovery activities on the system.

 

Duration

5 days.

 

Objectives

This course explains how to plan for, implement and manage the ongoing operations of the System i. Emphasis is on security, system availability, backup and recovery, system software management and problem determination. Delegates are also introduced to the architecture and terminology of IBM i and the System i.

This course provides lectures and hands-on labs in a face-to-face classroom setting. Delegates will perform the following activities using either a green screen 5250 emulation session (via command line entry), by using System i Navigator or the IBM Systems:

  • Describe the features, functions and benefits of the Power based server running IBM i relevant to security.
  • Describe the security requirements for your Power based server running IBM i.
  • Identify the system security features that satisfy your requirements.
  • Describe and implement the features and facilities of the Power based server running IBM i available to audit security.
  • List the elements of a security plan.
  • Describe the features, functions and benefits of the Power based server running IBM i relevant to availability and recovery.
  • List the elements of a security plan and a backup and recovery plan.
  • Describe Power based server running IBM i problem determination and resolution techniques.
  • Describe how to manage PTFs.
  • Director Navigator.

 

Topics

Day 1
Welcome, course administration, introductions, lab setup.
Unit 1: IBM i overview and concepts.
Lab 1: Establishing a user environment.
Unit 2: Management Central overview.
Lab 2: Management Central inventory and system values.
Unit 3: Security concepts and overview.
Unit 4: Security related system values.
Unit 5: User security - Topic 1.
Lab 3: Working with user profiles.

Day 2
Unit 5: User security - Topic 2.
Lab 4: Working with group profiles.
Unit 5: User security - Topics 3 - 4.
Unit 6: Resource security - Topics 1 - 3.
Lab 5: Working with authorization lists.
Unit 6: Resource security - Topics 4 - 5.
Lab 6: Working with object authority and adopted authority.
Unit 7: Security auditing.
Unit 8: Designing security.

Day 3
Unit 9: IBM Power based servers running IBM i availability overview.
Unit 10: Disk management.
Unit 11: Backup and recovery strategy using save/restore.
Lab 7: Media devices and virtual tape.
Unit 11: Backup and recovery strategy using save/restore (continued).

Day 4
Lab 8: Save/restore.
Unit 11: Backup and recovery strategy using save/restore (continued).
Unit 12: Journal management.
Lab 9: Journal management.
Unit 12: Journal management (continued).
Unit 13: Commitment control overview.
Lab 10: Commitment control.
Unit 14: Backup and recovery planning.

Day 5
Unit 15: Problem determination.
Lab 11: Problem determination.
Unit 16: Overview of Systems Director Navigator for IBM i.
Unit 17: Introduction to Backup, Recovery, and Media Services (BRMS).

S5 Box

Login

Register