IBM PowerSC Workshop (AN80G)

Overview

This hands-on course is designed to provide students with a comprehensive understanding of IBM PowerSC, including its features, benefits, and how to install, configure, and manage it. 

We will cover the four main pillars of PowerSC: Security, Compliance, threat protection, and Multifactor Authentication (MFA).

File Integrity Monitoring (FIM), allow listing, block listing, endpoint detection and response (EDR) and anti-malware capabilities will also be covered.

Audience

Enrollment in this course is not restricted. Typical students may include:

  • Customers
  • Technical IBM personnel
  • Business partner technical personnel
  • IT consultants and architects

Prerequisites

null

Objective

  • Describe the key features and capabilities of PowerSC across AIX, IBM i, and Linux
  • Perform the installation and initial configuration
  • Summarize the purpose and usage of security compliance profiles
  • Demonstrate how to manage and monitor endpoint security
  • Configure system scans, reporting, and alerting mechanisms
  • Explain the role and implementation of Multi-Factor Authentication (MFA)
  • Implement anti-malware features and verify their effectiveness
  • Configure allow lists using Trusted Execution and Fapolicyd for application security
  • Analyze file integrity monitoring reports using Real-Time Compliance and auditd
Geef details weer

Course Outline

  • Unit 0: Course Introduction
  • Unit 1: Introduction to IBM PowerSC on IBM Power (covering AIX, IBM i and Linux)
  • Unit 2: Installation and Configuration of IBM PowerSC
  • Unit 3: Security Compliance profiles
  • Unit 4: Managing and Monitoring endpoint security
  • Unit 5: Configuring system scans, reporting and alerting
  • Unit 6: Introduction to MFA
  • Unit 7: Anti-malware
  • Unit 8: Allow List (Trusted Execution and Fapolicyd)
  • Unit 9: File Integrity Monitoring (Real Time Compliance and auditd)
  • Exercise 1. Accessing the lab environment
  • Exercise 2. PowerSC Installation and Configuration
  • Exercise 3. Working with Security Profiles
  • Exercise 4. Creating Custom Profiles and Run Compliance Scans
  • Exercise 5. Configuring MFA on AIX
  • Exercise 6. Configuring Anti-malware
  • Exercise 7. Allow List (Trusted Execution and fapolicyd)
  • Exercise 8. File Integrity Monitoring (Real Time Compliance and auditd)