/* Style the new user link */ .new_user_link { justify-content:flex-end; margin-left:10px; margin-right:0; margin-top:auto; margin-bottom:auto; #CD1CEE } /* START CSS to ensure page is fully loaded before displaying body. JS in Global Code toggles it on */ body {​​​​​​​ visibility: hidden; }​​​​​​​ body.show {​​​​​​​ visibility: visible; }​​​​​​​ /* END CSS to ensure page is fully loaded before displaying body. JS in Global Code toggles it on */
Assure Security V6.0 - PSC

Assure Security V6.0 - PSC

This course will introduce the student to Assure Security and its features. Gain hands on skills for implementing Assure Compliance Monitor, Assure Access Control, and Assure Data Privacy.

About this course

This course will introduce the student to Assure Security and its features. Gain hands on skills for implementing Assure Compliance Monitor, Assure Access Control, and Assure Data Privacy. The student will learn how to setup monitoring of IBM i journals for security incidents and how to setup monitoring for views of sensitive Db2 data. Gain experience on how to secure all points of entry into the IBM i, how to configure elevated authority, and enabling multi-factor authentication to strengthen login security. The student will learn how to implement encryption for sensitive data and how to automatically encrypt sensitive data being transferred to other servers.

Current schedule

Event Date Spaces left
Assure Security PSC - Instructor moderated 12
Assure Security PSC - Instructor moderated 12
Assure Security PSC - Instructor moderated 12
Assure Security PSC - Instructor moderated 12

Curriculum

  • Getting started
  • Getting started
  • Current credentials for testing connection
  • Precisely training partition access
  • Demonstration - Connecting to RDWEB environment
  • Agenda
  • Course dates
  • Current schedule
  • IBM i Security
  • Introduction to IBM i security
  • Installation
  • Installation of Assure Security
  • Assure Compliance Monitor
  • Assure compliance monitor
  • Lab - User and authority
  • Lab - Security console setup
  • Lab - Registering journals
  • Lab - Working with DB queries
  • Lab - Working with system audit journal queries
  • Lab - Working with system examiner queries
  • Lab - Work with field repository
  • Lab - Working with program repository
  • Lab - Working with condition lists
  • Lab - Reports and alerts
  • Lab - RUNQJ command to run queries
  • DB2 data monitor
  • Assure Access Control
  • Assure access control
  • Lab - Restoring standard configration for access control
  • Lab - Control FTP access to IBM i
  • Lab - Control ODBC access to IBM i
  • Lab - Control CMD access to IBM i
  • Lab - Using Console with Access Control
  • Lab - Elevated authority manager
  • Lab - Setting up subsystem for multifactor authentication
  • Lab - Setup multifactor authentication for signon
  • Lab - Working with security questions
  • Lab - Secure command access with multifactor authentication
  • Assure Data Privacy
  • Assure data privacy
  • Lab - Encryption users and keys
  • Lab - DB2 field encryption and masking
  • Lab - IFS encryption
  • Lab - Secure file transfer - library ftp
  • Lab - Secure file transfer - setup for SSH
  • Lab - Secure file transfer - Library using SSH
  • Lab - Secure file transfer Directory with SSH
  • Lab - Secure file transfer - setup email notifications
  • Lab - Secure file transfer - using AES encryption
  • Lab - Automatic tokenization
  • Lab - Recoverable tokenization

About this course

This course will introduce the student to Assure Security and its features. Gain hands on skills for implementing Assure Compliance Monitor, Assure Access Control, and Assure Data Privacy. The student will learn how to setup monitoring of IBM i journals for security incidents and how to setup monitoring for views of sensitive Db2 data. Gain experience on how to secure all points of entry into the IBM i, how to configure elevated authority, and enabling multi-factor authentication to strengthen login security. The student will learn how to implement encryption for sensitive data and how to automatically encrypt sensitive data being transferred to other servers.

Live events

Current schedule

Event Date Spaces left
Assure Security PSC - Instructor moderated 12
Assure Security PSC - Instructor moderated 12
Assure Security PSC - Instructor moderated 12
Assure Security PSC - Instructor moderated 12

Curriculum

  • Getting started
  • Getting started
  • Current credentials for testing connection
  • Precisely training partition access
  • Demonstration - Connecting to RDWEB environment
  • Agenda
  • Course dates
  • Current schedule
  • IBM i Security
  • Introduction to IBM i security
  • Installation
  • Installation of Assure Security
  • Assure Compliance Monitor
  • Assure compliance monitor
  • Lab - User and authority
  • Lab - Security console setup
  • Lab - Registering journals
  • Lab - Working with DB queries
  • Lab - Working with system audit journal queries
  • Lab - Working with system examiner queries
  • Lab - Work with field repository
  • Lab - Working with program repository
  • Lab - Working with condition lists
  • Lab - Reports and alerts
  • Lab - RUNQJ command to run queries
  • DB2 data monitor
  • Assure Access Control
  • Assure access control
  • Lab - Restoring standard configration for access control
  • Lab - Control FTP access to IBM i
  • Lab - Control ODBC access to IBM i
  • Lab - Control CMD access to IBM i
  • Lab - Using Console with Access Control
  • Lab - Elevated authority manager
  • Lab - Setting up subsystem for multifactor authentication
  • Lab - Setup multifactor authentication for signon
  • Lab - Working with security questions
  • Lab - Secure command access with multifactor authentication
  • Assure Data Privacy
  • Assure data privacy
  • Lab - Encryption users and keys
  • Lab - DB2 field encryption and masking
  • Lab - IFS encryption
  • Lab - Secure file transfer - library ftp
  • Lab - Secure file transfer - setup for SSH
  • Lab - Secure file transfer - Library using SSH
  • Lab - Secure file transfer Directory with SSH
  • Lab - Secure file transfer - setup email notifications
  • Lab - Secure file transfer - using AES encryption
  • Lab - Automatic tokenization
  • Lab - Recoverable tokenization