What You'll Learn
- Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security
- Develop a security plan for your IBM i
- Describe the options to implement security auditing
- Develop a plan to audit security on your IBM i
You should complete System Operator Workshop for IBM i (AS240) and have responsibility for implementing the security features available for your Power Systems with IBM i.
Who Needs To Attend
This is an intermediate course intended for IBM i system administrators, data processing managers and other individuals who implement and manage security on the IBM i. This course is not recommended for system operators.