Manta alt


You must allow the browser to execute JavaScript programs if you want to view product information. If your browser is set up to execute JavaScript programs, the problem is that the product ID was incorrect. Use the menu bar above to find the desired product.


This Competency Exam tests your mastery of the objectives for the courses that make up the IBM i Security series:

  • Introduction to IBM i Security
  • Granting Object Authority
  • Controlling Application Security
  • System Security Considerations
  • Creating an Application Environment
  • Creating and Maintaining User Profiles
  • Security-Related System Values
  • IBM i Security Using System i Navigator

The exam is divided into separate parts, one for each course in the series. Successfully completing all parts of the exam demonstrates your proficiency in the operational skills required to develop a security plan for your IBM i system.

Approximate time to complete all parts of the exam: 2.5 hours

Recommended Uses

This Competency Exam was designed as a mastery test for the IBM i Security series. We recommend that you take the exam after you complete the series. Alternatively, you can take the corresponding portion of the exam when you complete each course.

Another use for the Competency Exam is as a pretest. Depending on your previous experience and training, you may feel that you already know the material covered by a given course. If this is the case, you should take the exam corresponding to that course. If you successfully complete the exam, you can skip the course, confident that you have already mastered the skills it teaches.


The exam automatically evaluates your performance and reports how you did. To "pass" the exam, you must successfully work at least 80% of the exercises corresponding to each topic. If you score less than 80%, you will be directed to the appropriate course for review.


The IBM i Security series, including this exam, should be taken by security officers and other personnel who are responsible for designing and implementing a system security plan. The audience also includes system administrators, programmers, managers, and users who will participate in security planning for the system as a whole or for one or more applications.


All courses in this series assume that you are familiar with the concepts and basic operations of IBM i systems. You can satisfy these prerequisites by successfully completing the courses in the following series:

The courses in this series also assume that you have some knowledge of security issues as they apply to a computer installation. You may also have obtained these skills by taking other courses or through relevant work experience.