SlideShare a Scribd company logo
1 of 9
IBM AIX – System
   Administration

        Course Details




              © UWINPro Inc.
IBM AIX
    At UWINPro, our expert IBM AIX trainers/consultants provide the best
    UNIX training.



•   Course Duration: 54 Hours (24+30)



•   Course Format: Weekends/Weekdays



•   Mode of Training:
                     - Onsite/Classroom
                     - Online




                                                      © UWINPro Inc.
Course Highlights
   IBM AIX online access

   Hands on training

   Reference course related videos

   Training through slideshows /notes and exercises

   Case Study - Real time           business   scenario   and   a     typical    IBM   AIX
    implementation case study

   AIX Quiz

   IBM AIX Certification material

   Sample of interview Questions for UNIX AIX

   Training Quality Feedback form

   How to use important IBM resources



                                                                     © UWINPro Inc.
Course Details
                  IBM AIX – Part 1 (24 Hrs)

   AIX Tools & Architecture : Login to AIX machine, Introduction of AIX and Systems
    administrator roles, System Management Commands, Using SMIT, SMIT Special Characters and
    Keys, Smit.log and smit.script files, The smit Command, Web Based System Manager, The man
    Command,          InfoExplorer,      Web      Based     Documentation    Browser,     AIX
    Architecture, Filesystems, LVM, hdisks concepts, Labs




   Installation & User Group Management : AIX Software installation, Aix user and group
    management files, The /etc/passwd file, The /etc/security/passwd file, The /etc/group file, The
    /etc/security/group file, Group administrators, The /etc/security/user file, The /etc/security/limits
    file, The /etc/security/login.cfg file, User management tasks, Adding a new user, The
    /usr/lib/security/user.default file, Removing a user, Adding a group, Scheduling using crontab, Labs




                                                                               © UWINPro Inc.
Course Details

   Introduction to Volume Management                : The AIX approach to Disk Storage, Volume
    Groups,    Physical    Volumes    and    Logical      Volumes,      Volume     Group Descriptor
    Areas, Mirroring, Striping, Disk Placement Policies, Migrating Physical Volume data, Useful
    Commands, Creating, Extending and Mirroring a Logical Volume, Backup, Restore, Cloning, Paging
    space – creating and removing paging space, Installing application in AIX, Labs




   Error reporting, Networking, Printing and performance : Disk problem issue, Errpt
    – error reporting, Define TCP/IP Terminology, Define Routing (Static and Dynamic), TCP/IP
    Commands and Utilities, Configure TCP/IP for a Network Interface, Configure a Static
    Route, Printers and Queues, Queuing concepts in AIX, Spooling Control Directories, The QCONFIG
    File, Managing Print Queues, Queue Status Commands, AIX Security files, Performance
    commands, Labs




                                                                          © UWINPro Inc.
Course Details
                 IBM AIX – Part 2 (30 Hrs)

   Object Data Manager           : ODM Components and Commands, Object Classes, Descriptor
    Information, Objects, Searching The ODM, The ODM Database, Data Base File Names, ODM File
    Locations, cfgmgr And The ODM, The Predefined Database Files, Predefined Devices, Predefined
    Attributes, Customized Devices, Customized Attributes, System Startup And The Boot Process, The
    Bootlist And BLV, The Boot Logical Volume, Repairing The BLV, Using Bootlists, Boot Problems,
    Service Processors, Labs




   Disk Management : Local Volume Manager Review, AIX Disk Storage, Physical Volume And
    LVM, Volume Group Descriptor Areas, Physical And Logical Storage, Use Of Logical Volumes,
    Mirroring, Stripping, Volume Group Limits, Alternative Mirroring And Stripping With RAID, LVM
    Data, LVM Identifiers, VGDA, VGSA And LVCB Control Blocks, LVM and The ODM, Physical Volumes
    And The ODM, Volume Groups And The ODM, Logical Volumes And The ODM, LVM Problems In The
    ODM, The rvgrecover Script, VGDA And Quorum, Forcing a Varyon , Mirroring, Labs




                                                                          © UWINPro Inc.
Course Details


   Back up your system : Using mksysb, Creating a System Backup, mksysb Image Structure,
    Verifying a mksysb Tape, Preparing bosinst.data For Unattended Install, Cloning, Reducing a file
    System, Alternate Disk Installation, Installing a mksysb Image On Another Disk, Cloning The
    Running rootvg To Another Disk, Removing An Alternate Disk Installation, Backing up Non-Root
    Volume Groups, Using savevg, Backup From a Split Mirror, Labs




   Problem Solving tools          : Error Log Facility, Error Log Input Components, Error Reporting
    From SMIT, The errpt Command, Sample Summary/Intermediate/Detailed Report Output,
    Interpreting LVM Error Log Entries, Error Log Maintenance, Error Notification Facility, Notification
    Methods, The syslogd DAEMON, Diagnostics, The diag Command, Working With diag, AIX System
    Dumps, Addressing the Problem, Understanding The Workload And Bottlenecks, Identifying CPU
    Intensive Tasks, Identifying High Priority Processes, Monitoring CPU Usage With sar, Monitoring
    Memory Usage With vmstat, Monitoring Disk i/o Using iostat, Labs




                                                                              © UWINPro Inc.
Course Details


   Advance Security Features : The Auditing Subsystem, The Configuration Files, The Object
    File, The Event File, The Config File, Using Bin Mode, Using Stream Mode, The Audit
    Command, Authentication and Access Controls, Physical Security, Path Problems, Enhancing Login
    Security - Login Prompt, Enhancing Login Security - Restricted Shell, Customized Authentication
    Methods, Two Key Authentication, Access Control Lists, ACL Keywords And Format, Labs




                                                                          © UWINPro Inc.
THANK YOU !


To enroll for this course, contact us at: info@uwinpro.com

               For more info: www.uwinpro.com

                  Visit our    Channel




                                                 © UWINPro Inc.

More Related Content

Viewers also liked

Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2   problem determinationAix student guide system administrations part 2   problem determination
Aix student guide system administrations part 2 problem determinationYogesh Sharma
 
Openstack Overview
Openstack OverviewOpenstack Overview
Openstack Overviewrajdeep
 
The Vision for the Future of Network Virtualization with VMware NSX
The Vision for the Future of Network Virtualization with VMware  NSXThe Vision for the Future of Network Virtualization with VMware  NSX
The Vision for the Future of Network Virtualization with VMware NSXScott Lowe
 
In-Memory Computing: How, Why? and common Patterns
In-Memory Computing: How, Why? and common PatternsIn-Memory Computing: How, Why? and common Patterns
In-Memory Computing: How, Why? and common PatternsSrinath Perera
 
In memory databases presentation
In memory databases presentationIn memory databases presentation
In memory databases presentationMichael Keane
 
Overview of v cloud case studies
Overview of v cloud case studiesOverview of v cloud case studies
Overview of v cloud case studiessolarisyougood
 
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...VibrantGroup
 
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...brettallison
 
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...Banking at Ho Chi Minh city
 

Viewers also liked (14)

Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2   problem determinationAix student guide system administrations part 2   problem determination
Aix student guide system administrations part 2 problem determination
 
Informatica session
Informatica sessionInformatica session
Informatica session
 
No sql databases
No sql databasesNo sql databases
No sql databases
 
Unix Administration 1
Unix Administration 1Unix Administration 1
Unix Administration 1
 
Openstack Overview
Openstack OverviewOpenstack Overview
Openstack Overview
 
Installing Aix
Installing AixInstalling Aix
Installing Aix
 
The Vision for the Future of Network Virtualization with VMware NSX
The Vision for the Future of Network Virtualization with VMware  NSXThe Vision for the Future of Network Virtualization with VMware  NSX
The Vision for the Future of Network Virtualization with VMware NSX
 
In-Memory Computing: How, Why? and common Patterns
In-Memory Computing: How, Why? and common PatternsIn-Memory Computing: How, Why? and common Patterns
In-Memory Computing: How, Why? and common Patterns
 
In memory databases presentation
In memory databases presentationIn memory databases presentation
In memory databases presentation
 
Overview of v cloud case studies
Overview of v cloud case studiesOverview of v cloud case studies
Overview of v cloud case studies
 
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
 
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
 
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
 
IBMRedbook
IBMRedbookIBMRedbook
IBMRedbook
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

IBM AIX System Administration - Course

  • 1. IBM AIX – System Administration Course Details © UWINPro Inc.
  • 2. IBM AIX At UWINPro, our expert IBM AIX trainers/consultants provide the best UNIX training. • Course Duration: 54 Hours (24+30) • Course Format: Weekends/Weekdays • Mode of Training: - Onsite/Classroom - Online © UWINPro Inc.
  • 3. Course Highlights  IBM AIX online access  Hands on training  Reference course related videos  Training through slideshows /notes and exercises  Case Study - Real time business scenario and a typical IBM AIX implementation case study  AIX Quiz  IBM AIX Certification material  Sample of interview Questions for UNIX AIX  Training Quality Feedback form  How to use important IBM resources © UWINPro Inc.
  • 4. Course Details IBM AIX – Part 1 (24 Hrs)  AIX Tools & Architecture : Login to AIX machine, Introduction of AIX and Systems administrator roles, System Management Commands, Using SMIT, SMIT Special Characters and Keys, Smit.log and smit.script files, The smit Command, Web Based System Manager, The man Command, InfoExplorer, Web Based Documentation Browser, AIX Architecture, Filesystems, LVM, hdisks concepts, Labs  Installation & User Group Management : AIX Software installation, Aix user and group management files, The /etc/passwd file, The /etc/security/passwd file, The /etc/group file, The /etc/security/group file, Group administrators, The /etc/security/user file, The /etc/security/limits file, The /etc/security/login.cfg file, User management tasks, Adding a new user, The /usr/lib/security/user.default file, Removing a user, Adding a group, Scheduling using crontab, Labs © UWINPro Inc.
  • 5. Course Details  Introduction to Volume Management : The AIX approach to Disk Storage, Volume Groups, Physical Volumes and Logical Volumes, Volume Group Descriptor Areas, Mirroring, Striping, Disk Placement Policies, Migrating Physical Volume data, Useful Commands, Creating, Extending and Mirroring a Logical Volume, Backup, Restore, Cloning, Paging space – creating and removing paging space, Installing application in AIX, Labs  Error reporting, Networking, Printing and performance : Disk problem issue, Errpt – error reporting, Define TCP/IP Terminology, Define Routing (Static and Dynamic), TCP/IP Commands and Utilities, Configure TCP/IP for a Network Interface, Configure a Static Route, Printers and Queues, Queuing concepts in AIX, Spooling Control Directories, The QCONFIG File, Managing Print Queues, Queue Status Commands, AIX Security files, Performance commands, Labs © UWINPro Inc.
  • 6. Course Details IBM AIX – Part 2 (30 Hrs)  Object Data Manager : ODM Components and Commands, Object Classes, Descriptor Information, Objects, Searching The ODM, The ODM Database, Data Base File Names, ODM File Locations, cfgmgr And The ODM, The Predefined Database Files, Predefined Devices, Predefined Attributes, Customized Devices, Customized Attributes, System Startup And The Boot Process, The Bootlist And BLV, The Boot Logical Volume, Repairing The BLV, Using Bootlists, Boot Problems, Service Processors, Labs  Disk Management : Local Volume Manager Review, AIX Disk Storage, Physical Volume And LVM, Volume Group Descriptor Areas, Physical And Logical Storage, Use Of Logical Volumes, Mirroring, Stripping, Volume Group Limits, Alternative Mirroring And Stripping With RAID, LVM Data, LVM Identifiers, VGDA, VGSA And LVCB Control Blocks, LVM and The ODM, Physical Volumes And The ODM, Volume Groups And The ODM, Logical Volumes And The ODM, LVM Problems In The ODM, The rvgrecover Script, VGDA And Quorum, Forcing a Varyon , Mirroring, Labs © UWINPro Inc.
  • 7. Course Details  Back up your system : Using mksysb, Creating a System Backup, mksysb Image Structure, Verifying a mksysb Tape, Preparing bosinst.data For Unattended Install, Cloning, Reducing a file System, Alternate Disk Installation, Installing a mksysb Image On Another Disk, Cloning The Running rootvg To Another Disk, Removing An Alternate Disk Installation, Backing up Non-Root Volume Groups, Using savevg, Backup From a Split Mirror, Labs  Problem Solving tools : Error Log Facility, Error Log Input Components, Error Reporting From SMIT, The errpt Command, Sample Summary/Intermediate/Detailed Report Output, Interpreting LVM Error Log Entries, Error Log Maintenance, Error Notification Facility, Notification Methods, The syslogd DAEMON, Diagnostics, The diag Command, Working With diag, AIX System Dumps, Addressing the Problem, Understanding The Workload And Bottlenecks, Identifying CPU Intensive Tasks, Identifying High Priority Processes, Monitoring CPU Usage With sar, Monitoring Memory Usage With vmstat, Monitoring Disk i/o Using iostat, Labs © UWINPro Inc.
  • 8. Course Details  Advance Security Features : The Auditing Subsystem, The Configuration Files, The Object File, The Event File, The Config File, Using Bin Mode, Using Stream Mode, The Audit Command, Authentication and Access Controls, Physical Security, Path Problems, Enhancing Login Security - Login Prompt, Enhancing Login Security - Restricted Shell, Customized Authentication Methods, Two Key Authentication, Access Control Lists, ACL Keywords And Format, Labs © UWINPro Inc.
  • 9. THANK YOU ! To enroll for this course, contact us at: info@uwinpro.com For more info: www.uwinpro.com Visit our Channel © UWINPro Inc.