Skip to main Content

IBM PowerSC Workshop

  • Código del Curso AN80G
  • Duración 3 días

Otros Métodos de Impartición

Aprendizaje Virtual Precio

eur2,550.00

Solicitar Formación Grupal Inscribirse

Método de Impartición

Este curso está disponible en los siguientes formatos:

  • Clase de calendario

    Aprendizaje tradicional en el aula

  • Aprendizaje Virtual

    Aprendizaje virtual

Solicitar este curso en un formato de entrega diferente.

This hands-on course is designed to provide students with a comprehensive understanding of IBM PowerSC, including its features, benefits, and how to install, configure, and manage it.

We will cover the four main pillars of PowerSC: Security, Compliance, threat protection, and Multifactor Authentication (MFA).

File Integrity Monitoring (FIM), allow listing, block listing, endpoint detection and response (EDR) and anti-malware capabilities will also be covered.

Curso Remoto (Abierto)

Nuestra solución de formación remota o virtual, combina tecnologías de alta calidad y la experiencia de nuestros formadores, contenidos, ejercicios e interacción entre compañeros que estén atendiendo la formación, para garantizar una sesión formativa superior, independiente de la ubicación de los alumnos.

Calendario

Parte superior

Dirigido a

Parte superior

Typical students may include:

  • Customers,
  • Technical IBM personnel,
  • Business partner technical personnel,
  • IT consultants and architects.

Objetivos del Curso

Parte superior

After this course participants should be able to:

  • Describe the key features and capabilities of PowerSC across AIX, IBM i, and Linux
  • Perform the installation and initial configuration
  • Summarize the purpose and usage of security compliance profiles
  • Demonstrate how to manage and monitor endpoint security
  • Configure system scans, reporting, and alerting mechanisms
  • Explain the role and implementation of Multi-Factor Authentication (MFA)
  • Implement anti-malware features and verify their effectiveness
  • Configure allow lists using Trusted Execution and Fapolicyd for application security
  • Analyze file integrity monitoring reports using Real-Time Compliance and auditd
  • Unit 0: Course Introduction
  • Unit 1: Introduction to IBM PowerSC on IBM Power (covering AIX, IBM i and Linux)
  • Unit 2: Installation and Configuration of IBM PowerSC
  • Unit 3: Security Compliance profiles
  • Unit 4: Managing and Monitoring endpoint security
  • Unit 5: Configuring system scans, reporting and alerting
  • Unit 6: Introduction to MFA
  • Unit 7: Anti-malware
  • Unit 8: Allow List (Trusted Execution and Fapolicyd)
  • Unit 9: File Integrity Monitoring (Real Time Compliance and auditd)

  • Exercices
    • Exercise 1. Accessing the lab environment
    • Exercise 2. PowerSC Installation and Configuration
    • Exercise 3. Working with Security Profiles
    • Exercise 4. Creating Custom Profiles and Run Compliance Scans
    • Exercise 5. Configuring MFA on AIX
    • Exercise 6. Configuring Anti-malware
    • Exercise 7. Allow List (Trusted Execution and fapolicyd)
    • Exercise 8. File Integrity Monitoring (Real Time Compliance and auditd)

Pre-requisitos

Parte superior
Basic knowledge of IBM AIX and Power servers

Más información

Parte superior

Official course book provided to participants