Course Description
Learn how to plan for, implement, and manage the ongoing operations of an IBM i.
TARGET AUDIENCE:This is an intermediate course intended for IBM i system administrators, data processing managers and other individuals who implement and manage security, backup and recovery, system software and problem determination. This course is not recommended for s
COURSE OBJECTIVES:Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security
Develop a security plan for your Power Systems with IBM i
Describe the options to implement security auditing
Develop a plan to audit security on your Power Systems with IBM i
Describe the IBM i availability products and features and choose the option(s) that best fit your company requirements
Describe how to backup and recover user, IBM and full system data on your Power Systems with IBM i
Develop a backup and recovery plan for your Power Systems with IBM i
Describe the system diagnostics and problem determination procedures available on your Power Systems with IBM i
Agenda
Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security
Develop a security plan for your Power Systems with IBM i
Describe the options to implement security auditing
Develop a plan to audit security on your Power Systems with IBM i
Describe the IBM i availability products and features and choose the option(s) that best fit your company requirements
Describe how to backup and recover user, IBM and full system data on your Power Systems with IBM i
Develop a backup and recovery plan for your Power Systems with IBM i
Describe the system diagnostics and problem determination procedures available on your Power Systems with IBM i
Class administration and introductions
IBM i overview and concepts
Management central overview
Security concepts and overview
System values
User security
Resource security
Security auditing
Designing security
IBM i availability overview
Disk management
Backup and recovery strategy using Save/Restore
Journal management
Commitment control overview
Backup and recovery planning
Problem determination
Overview of Systems Director Navigator for i
Introduction to BRMS
Audience
This is an intermediate course intended for IBM i system administrators, data processing managers and other individuals who implement and manage security, backup and recovery, system software and problem determination. This course is not recommended for s