English
+386 31 748 428 training@compedu.si

OL19

OL19: IBM i System Administration

DURATION: 5 days

SCHEDULED DATES: TBD – Contact Us for more Information

PURPOSE

Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Emphasis is on security, system availability, backup and recovery, system software management, and problem determination. Also, get an introduction to the architecture and terminology of the IBM i.

AUDIENCE

This is an intermediate course intended for IBM i system administrators, data processing managers and other individuals who implement and manage security, backup and recovery, system software and problem determination. This course is not recommended for system operators.

PREREQUISITES

Before attending this course the student should:
complete System Operator Workshop for IBM i (AS24G)
have responsibility for implementing the security features available for IBM i
have responsibility for the implementation of a backup and recovery plan and system availability for your Power Systems with IBM i

OBJECTIVES

After attending this class, the student should be able to:

Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security
Develop a security plan for your Power Systems with IBM i
Describe the options to implement security auditing
Develop a plan to audit security on your Power Systems with IBM i
Describe the IBM i availability products and features and choose the option(s) that best fit your company requirements
Describe how to backup and recover user, IBM and full system data on your Power Systems with IBM i
Develop a backup and recovery plan for your Power Systems with IBM i
Describe the system diagnostics and problem determination procedures available on your Power Systems with IBM i

KEY TOPICS

Class administration and introductions
IBM i overview and concepts
Management central overview
Security concepts and overview
System values
User security
Resource security
Security auditing
Designing security
IBM i availability overview
Disk management
Backup and recovery strategy using Save/Restore
Journal management
Commitment control overview
Backup and recovery planning
Problem determination
Overview of Systems Director Navigator for i
Introduction to BRMS