IBM PowerSC Workshop
- Course Code AN80G
- Duration 3 days
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopThis hands-on course is designed to provide students with a comprehensive understanding of IBM PowerSC, including its features, benefits, and how to install, configure, and manage it.
We will cover the four main pillars of PowerSC: Security, Compliance, threat protection, and Multifactor Authentication (MFA).
File Integrity Monitoring (FIM), allow listing, block listing, endpoint detection and response (EDR) and anti-malware capabilities will also be covered.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Schedule
Top-
- Delivery Format: Virtual Learning
- Date: 23-25 February, 2026 | 9:00 AM to 5:00 PM
- Location: Virtual (GMT Standa)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 18-20 May, 2026 | 9:00 AM to 5:00 PM
- Location: Virtual (GMT Standa)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 21-23 September, 2026 | 9:00 AM to 5:00 PM
- Location: Virtual (GMT Standa)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 14-16 December, 2026 | 9:00 AM to 5:00 PM
- Location: Virtual (GMT Standa)
- Language: English
Target Audience
TopTypical students may include:
- Customers,
- Technical IBM personnel,
- Business partner technical personnel,
- IT consultants and architects.
Course Objectives
TopAfter this course participants should be able to:
- Describe the key features and capabilities of PowerSC across AIX, IBM i, and Linux
- Perform the installation and initial configuration
- Summarize the purpose and usage of security compliance profiles
- Demonstrate how to manage and monitor endpoint security
- Configure system scans, reporting, and alerting mechanisms
- Explain the role and implementation of Multi-Factor Authentication (MFA)
- Implement anti-malware features and verify their effectiveness
- Configure allow lists using Trusted Execution and Fapolicyd for application security
- Analyze file integrity monitoring reports using Real-Time Compliance and auditd
Course Content
Top- Unit 0: Course Introduction
- Unit 1: Introduction to IBM PowerSC on IBM Power (covering AIX, IBM i and Linux)
- Unit 2: Installation and Configuration of IBM PowerSC
- Unit 3: Security Compliance profiles
- Unit 4: Managing and Monitoring endpoint security
- Unit 5: Configuring system scans, reporting and alerting
- Unit 6: Introduction to MFA
- Unit 7: Anti-malware
- Unit 8: Allow List (Trusted Execution and Fapolicyd)
- Unit 9: File Integrity Monitoring (Real Time Compliance and auditd)
- Exercices
- Exercise 1. Accessing the lab environment
- Exercise 2. PowerSC Installation and Configuration
- Exercise 3. Working with Security Profiles
- Exercise 4. Creating Custom Profiles and Run Compliance Scans
- Exercise 5. Configuring MFA on AIX
- Exercise 6. Configuring Anti-malware
- Exercise 7. Allow List (Trusted Execution and fapolicyd)
- Exercise 8. File Integrity Monitoring (Real Time Compliance and auditd)
Course Prerequisites
TopFurther Information
TopOfficial course book provided to participants