Manta Introduces New IBM i Work Management and Security Class

Certification / Training
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

The class begins with a detailed discussion of system values and then describes how to create and manage subsystems, job descriptions, classes, and output queues.

Manta Technologies has announced a new 4.5-day class covering two key system administration topics: work management and IBM i security.

During the first two days of the class, students will learn how to perform key work management tasks required for an IBM i system. The class begins with a detailed discussion of system values. You will learn the purpose of each system value and how to change them. The class then describes how to create and manage subsystems, job descriptions, classes, and output queues. It also shows how to manage journals and enable the job accounting capabilities of your IBM i system. You will learn techniques for streamlining IBM i operations, including scheduling jobs automatically, having the system automatically respond to selected messages, having commands entered automatically at IPL, and creating simplified versions of IBM i commands. The second day ends with a discussion of how to monitor and tune the performance of your system.

Beginning on the third day, the remaining time is spent learning about the security facilities that are built into the IBM i operating system. IBM i security is described at three levels: physical security, user profile security, and resource security. Physical security controls who can access the hardware, including the system unit and devices such as workstations and printers. Under the topic of user profile security, you will see how the security officer can control system access through the use of system values and user profile options. Under the topic of resource security, you will see how to restrict access to system resources and secure sensitive data. Tools for controlling resource security include object ownership, public authority, private authority, group profiles, primary group authority, authorization lists, and adopted authority. You will see how these are used and how to select the best security mechanism for a given security requirement. You will also learn to use IBM i commands and panels to establish and modify your security plan and to create an execution environment for an application system.

The class ends with a discussion of single sign-on, the ability to access multiple computer systems within an organization after signing on only once. This course will show you how to implement a single sign-on for a network containing systems running both Windows and IBM i.

The seminar costs $2,595 per person. Students can also enroll for just the work management component or the security component for $1,295. You can view detailed class information and register at the Manta web site, www.mantatech.com. Or, call Manta at (800) 406-2682.

Manta Technologies has announced a new 4.5-day class covering two key system administration topics: work management and IBM i security.

During the first two days of the class, students will learn how to perform key work management tasks required for an IBM i system. The class begins with a detailed discussion of system values. You will learn the purpose of each system value and how to change them. The class then describes how to create and manage subsystems, job descriptions, classes, and output queues. It also shows how to manage journals and enable the job accounting capabilities of your IBM i system. You will learn techniques for streamlining IBM i operations, including scheduling jobs automatically, having the system automatically respond to selected messages, having commands entered automatically at IPL, and creating simplified versions of IBM i commands. The second day ends with a discussion of how to monitor and tune the performance of your system.

Beginning on the third day, the remaining time is spent learning about the security facilities that are built into the IBM i operating system. IBM i security is described at three levels: physical security, user profile security, and resource security. Physical security controls who can access the hardware, including the system unit and devices such as workstations and printers. Under the topic of user profile security, you will see how the security officer can control system access through the use of system values and user profile options. Under the topic of resource security, you will see how to restrict access to system resources and secure sensitive data. Tools for controlling resource security include object ownership, public authority, private authority, group profiles, primary group authority, authorization lists, and adopted authority. You will see how these are used and how to select the best security mechanism for a given security requirement. You will also learn to use IBM i commands and panels to establish and modify your security plan and to create an execution environment for an application system.

The class ends with a discussion of single sign-on, the ability to access multiple computer systems within an organization after signing on only once. This course will show you how to implement a single sign-on for a network containing systems running both Windows and IBM i.

The seminar costs $2,595 per person. Students can also enroll for just the work management component or the security component for $1,295. You can view detailed class information and register at the Manta web site, www.mantatech.com. Or, call Manta at (800) 406-2682.

BLOG COMMENTS POWERED BY DISQUS