Manta alt

YOUR IBM i TRAINING SOURCE

You must allow the browser to execute JavaScript programs if you want to view product information. If your browser is set up to execute JavaScript programs, the problem is that the product ID was incorrect. Use the menu bar above to find the desired product.

Overview

Audio

The IBM i Security series describes the security facilities that are built into the IBM i operating system. It also covers the IBM i commands and system values for controlling resource security.

The series describes IBM i security at three levels: physical security, user profile security, and resource security. Physical security controls who can access the hardware, including the system unit and devices such as workstations and printers. Under the topic of user profile security, you will see how the security officer can control system access through the use of system values and user profile options. Under the topic of resource security, you will see how to restrict access to system resources and secure sensitive data.

IBM i resource security consists of a variety of security concepts and mechanisms, including object ownership, public authority, private authority, group profiles, primary group authority, authorization lists, and adopted authority. You will see how these are used and how to select the best security mechanism for a given security requirement. You will also learn to use IBM i commands and panels to establish and modify your security plan and to create an execution environment for an application system.

Approximate Study Time for the Entire Series: 14-20 hours

Audience

This series should be taken by security officers and other personnel who are responsible for designing and implementing a system security plan. The audience also includes system administrators, programmers, managers, and users who will participate in security planning for the system as a whole or for one or more applications.

Prerequisites

All courses in this series assume that you are familiar with the concepts and basic operations of IBM i systems. You can satisfy these prerequisites by successfully completing the courses in the following series:

The courses in this series also assume that you have some knowledge of security issues as they apply to a computer installation. You may also have obtained these skills by taking other courses or through relevant work experience.