Description
Course: IBM PowerSC Workshop
At SIXE, we have over 15 years of experience delivering official IBM training worldwide. Our IBM PowerSC Workshop is designed to provide a comprehensive understanding of IBM PowerSC, including its features, benefits, and how to install, configure, and manage it in AIX, IBM i, and Linux environments.
Course Details of IBM PowerSC
IBM Course Code: AN80G | Category / Subcategory: IBM Power Systems / Security and Compliance |
Format: Online and in-person | Duration: 3 days |
Target Audience
This course is aimed at:
- IBM Power Systems customers.
- IBM technical personnel.
- Technical staff from IBM business partners.
- IT consultants and architects.
Prerequisites
- Basic knowledge of operating system administration (AIX, IBM i, Linux).
- Familiarity with security and compliance concepts.
Instructors
Our IBM courses are delivered directly by certified engineers specializing in security and system architecture. This ensures the highest quality. We complement all training with materials and labs developed by us, based on our experience in real-world implementations and practical cases.
Added Value
Our IBM PowerSC Workshop is deeply role-oriented. We focus on solving real-world problems related to security, compliance, and threat protection in IBM Power environments. We provide the knowledge, skills, and competencies needed to manage and protect critical infrastructures. Additionally, our documentation is based on the latest versions of each product.
Agenda and course outline for the workshop of IBM PowerSC
- Introduction to IBM PowerSC
- Overview of IBM PowerSC and its benefits.
- The four main pillars: Security, Compliance, Threat Protection, and Multi-Factor Authentication (MFA).
- Installation and Initial Configuration
- Preparing the environment for PowerSC installation.
- Performing installation and initial configuration.
- Security and Compliance Management
- Purpose and use of security compliance profiles.
- Configuring system scans, reporting, and alert mechanisms.
- Threat Protection
- File Integrity Monitoring (FIM):
- Configuring and analyzing file integrity monitoring.
- Allow and Block Listing:
- Using Trusted Execution and Fapolicyd for application control.
- Endpoint Detection and Response (EDR):
- Real-time threat detection and response.
- Anti-Malware:
- Implementing and verifying anti-malware capabilities.
- File Integrity Monitoring (FIM):
- Multi-Factor Authentication (MFA)
- Explaining the role and implementation of MFA.
- Configuring multi-factor authentication policies.
Need to customize this syllabus? Interested in other courses? Contact us without obligation.
In-Person Training Locations
- Spain: Madrid, Seville, Valencia, Barcelona, Bilbao, Malaga
- Argentina: Buenos Aires, Córdoba
- Bolivia: La Paz
- Chile: Santiago de Chile
- Colombia: Bogotá, Medellín, Cartagena, Cali
- Costa Rica: San José
- Ecuador: Quito
- Mexico: Mexico City, Guadalajara, Monterrey
- Paraguay: Asunción
- Peru: Lima
- Portugal: Lisbon, Braga, Porto
- Uruguay: Montevideo