Submit Search
Upload
IBM AIX System Administration - Course
•
2 likes
•
9,092 views
U
uwinpro_training
Follow
IBM AIX Training Detailed Course Layout www.uwinpro.com
Read less
Read more
Technology
Report
Share
Report
Share
1 of 9
Recommended
Aix overview
Aix overview
Raja Waseem Akhtar
Aix The Future of UNIX
Aix The Future of UNIX
xKinAnx
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
.Gastón. .Bx.
VIO LPAR Introduction | Basics | Demo
VIO LPAR Introduction | Basics | Demo
Kernel Training
Hacmp – high availability pdf
Hacmp – high availability pdf
asihan
Aix操作系统培训文档
Aix操作系统培训文档
lwj2012
Ibm aix
Ibm aix
mindmajixtrainings
Dell server basics v5 0713
Dell server basics v5 0713
James Samuel (Looking for New Opportunities)
Recommended
Aix overview
Aix overview
Raja Waseem Akhtar
Aix The Future of UNIX
Aix The Future of UNIX
xKinAnx
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
.Gastón. .Bx.
VIO LPAR Introduction | Basics | Demo
VIO LPAR Introduction | Basics | Demo
Kernel Training
Hacmp – high availability pdf
Hacmp – high availability pdf
asihan
Aix操作系统培训文档
Aix操作系统培训文档
lwj2012
Ibm aix
Ibm aix
mindmajixtrainings
Dell server basics v5 0713
Dell server basics v5 0713
James Samuel (Looking for New Opportunities)
Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2 problem determination
Yogesh Sharma
Informatica session
Informatica session
vinuthanallam
No sql databases
No sql databases
Vamshi Vangapally
Unix Administration 1
Unix Administration 1
Information Technology
Openstack Overview
Openstack Overview
rajdeep
Installing Aix
Installing Aix
Frederick James Rathweg
The Vision for the Future of Network Virtualization with VMware NSX
The Vision for the Future of Network Virtualization with VMware NSX
Scott Lowe
In-Memory Computing: How, Why? and common Patterns
In-Memory Computing: How, Why? and common Patterns
Srinath Perera
In memory databases presentation
In memory databases presentation
Michael Keane
Overview of v cloud case studies
Overview of v cloud case studies
solarisyougood
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
VibrantGroup
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
brettallison
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Banking at Ho Chi Minh city
IBMRedbook
IBMRedbook
Neelamegan Minor
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
More Related Content
Viewers also liked
Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2 problem determination
Yogesh Sharma
Informatica session
Informatica session
vinuthanallam
No sql databases
No sql databases
Vamshi Vangapally
Unix Administration 1
Unix Administration 1
Information Technology
Openstack Overview
Openstack Overview
rajdeep
Installing Aix
Installing Aix
Frederick James Rathweg
The Vision for the Future of Network Virtualization with VMware NSX
The Vision for the Future of Network Virtualization with VMware NSX
Scott Lowe
In-Memory Computing: How, Why? and common Patterns
In-Memory Computing: How, Why? and common Patterns
Srinath Perera
In memory databases presentation
In memory databases presentation
Michael Keane
Overview of v cloud case studies
Overview of v cloud case studies
solarisyougood
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
VibrantGroup
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
brettallison
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Banking at Ho Chi Minh city
IBMRedbook
IBMRedbook
Neelamegan Minor
Viewers also liked
(14)
Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2 problem determination
Informatica session
Informatica session
No sql databases
No sql databases
Unix Administration 1
Unix Administration 1
Openstack Overview
Openstack Overview
Installing Aix
Installing Aix
The Vision for the Future of Network Virtualization with VMware NSX
The Vision for the Future of Network Virtualization with VMware NSX
In-Memory Computing: How, Why? and common Patterns
In-Memory Computing: How, Why? and common Patterns
In memory databases presentation
In memory databases presentation
Overview of v cloud case studies
Overview of v cloud case studies
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
IBMRedbook
IBMRedbook
Recently uploaded
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Recently uploaded
(20)
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
IBM AIX System Administration - Course
1.
IBM AIX –
System Administration Course Details © UWINPro Inc.
2.
IBM AIX
At UWINPro, our expert IBM AIX trainers/consultants provide the best UNIX training. • Course Duration: 54 Hours (24+30) • Course Format: Weekends/Weekdays • Mode of Training: - Onsite/Classroom - Online © UWINPro Inc.
3.
Course Highlights
IBM AIX online access Hands on training Reference course related videos Training through slideshows /notes and exercises Case Study - Real time business scenario and a typical IBM AIX implementation case study AIX Quiz IBM AIX Certification material Sample of interview Questions for UNIX AIX Training Quality Feedback form How to use important IBM resources © UWINPro Inc.
4.
Course Details
IBM AIX – Part 1 (24 Hrs) AIX Tools & Architecture : Login to AIX machine, Introduction of AIX and Systems administrator roles, System Management Commands, Using SMIT, SMIT Special Characters and Keys, Smit.log and smit.script files, The smit Command, Web Based System Manager, The man Command, InfoExplorer, Web Based Documentation Browser, AIX Architecture, Filesystems, LVM, hdisks concepts, Labs Installation & User Group Management : AIX Software installation, Aix user and group management files, The /etc/passwd file, The /etc/security/passwd file, The /etc/group file, The /etc/security/group file, Group administrators, The /etc/security/user file, The /etc/security/limits file, The /etc/security/login.cfg file, User management tasks, Adding a new user, The /usr/lib/security/user.default file, Removing a user, Adding a group, Scheduling using crontab, Labs © UWINPro Inc.
5.
Course Details
Introduction to Volume Management : The AIX approach to Disk Storage, Volume Groups, Physical Volumes and Logical Volumes, Volume Group Descriptor Areas, Mirroring, Striping, Disk Placement Policies, Migrating Physical Volume data, Useful Commands, Creating, Extending and Mirroring a Logical Volume, Backup, Restore, Cloning, Paging space – creating and removing paging space, Installing application in AIX, Labs Error reporting, Networking, Printing and performance : Disk problem issue, Errpt – error reporting, Define TCP/IP Terminology, Define Routing (Static and Dynamic), TCP/IP Commands and Utilities, Configure TCP/IP for a Network Interface, Configure a Static Route, Printers and Queues, Queuing concepts in AIX, Spooling Control Directories, The QCONFIG File, Managing Print Queues, Queue Status Commands, AIX Security files, Performance commands, Labs © UWINPro Inc.
6.
Course Details
IBM AIX – Part 2 (30 Hrs) Object Data Manager : ODM Components and Commands, Object Classes, Descriptor Information, Objects, Searching The ODM, The ODM Database, Data Base File Names, ODM File Locations, cfgmgr And The ODM, The Predefined Database Files, Predefined Devices, Predefined Attributes, Customized Devices, Customized Attributes, System Startup And The Boot Process, The Bootlist And BLV, The Boot Logical Volume, Repairing The BLV, Using Bootlists, Boot Problems, Service Processors, Labs Disk Management : Local Volume Manager Review, AIX Disk Storage, Physical Volume And LVM, Volume Group Descriptor Areas, Physical And Logical Storage, Use Of Logical Volumes, Mirroring, Stripping, Volume Group Limits, Alternative Mirroring And Stripping With RAID, LVM Data, LVM Identifiers, VGDA, VGSA And LVCB Control Blocks, LVM and The ODM, Physical Volumes And The ODM, Volume Groups And The ODM, Logical Volumes And The ODM, LVM Problems In The ODM, The rvgrecover Script, VGDA And Quorum, Forcing a Varyon , Mirroring, Labs © UWINPro Inc.
7.
Course Details
Back up your system : Using mksysb, Creating a System Backup, mksysb Image Structure, Verifying a mksysb Tape, Preparing bosinst.data For Unattended Install, Cloning, Reducing a file System, Alternate Disk Installation, Installing a mksysb Image On Another Disk, Cloning The Running rootvg To Another Disk, Removing An Alternate Disk Installation, Backing up Non-Root Volume Groups, Using savevg, Backup From a Split Mirror, Labs Problem Solving tools : Error Log Facility, Error Log Input Components, Error Reporting From SMIT, The errpt Command, Sample Summary/Intermediate/Detailed Report Output, Interpreting LVM Error Log Entries, Error Log Maintenance, Error Notification Facility, Notification Methods, The syslogd DAEMON, Diagnostics, The diag Command, Working With diag, AIX System Dumps, Addressing the Problem, Understanding The Workload And Bottlenecks, Identifying CPU Intensive Tasks, Identifying High Priority Processes, Monitoring CPU Usage With sar, Monitoring Memory Usage With vmstat, Monitoring Disk i/o Using iostat, Labs © UWINPro Inc.
8.
Course Details
Advance Security Features : The Auditing Subsystem, The Configuration Files, The Object File, The Event File, The Config File, Using Bin Mode, Using Stream Mode, The Audit Command, Authentication and Access Controls, Physical Security, Path Problems, Enhancing Login Security - Login Prompt, Enhancing Login Security - Restricted Shell, Customized Authentication Methods, Two Key Authentication, Access Control Lists, ACL Keywords And Format, Labs © UWINPro Inc.
9.
THANK YOU ! To
enroll for this course, contact us at: info@uwinpro.com For more info: www.uwinpro.com Visit our Channel © UWINPro Inc.