IBM PowerSC Workshop

Code: AN80G

Description

This hands-on course is designed to provide students with a comprehensive understanding of IBM PowerSC, including its features, benefits, and how to install, configure, and manage it. 

We will cover the four main pillars of PowerSC: Security, Compliance, threat protection, and Multifactor Authentication (MFA).

File Integrity Monitoring (FIM), allow listing, block listing, endpoint detection and response (EDR) and anti-malware capabilities will also be covered.

Audience

Enrollment in this course is not restricted. Typical students may include:

  • Customers
  • Technical IBM personnel
  • Business partner technical personnel
  • IT consultants and architects

Prerequisites

null

Objectives

  • Describe the key features and capabilities of PowerSC across AIX, IBM i, and Linux
  • Perform the installation and initial configuration
  • Summarize the purpose and usage of security compliance profiles
  • Demonstrate how to manage and monitor endpoint security
  • Configure system scans, reporting, and alerting mechanisms
  • Explain the role and implementation of Multi-Factor Authentication (MFA)
  • Implement anti-malware features and verify their effectiveness
  • Configure allow lists using Trusted Execution and Fapolicyd for application security
  • Analyze file integrity monitoring reports using Real-Time Compliance and auditd

Topics

  • Unit 0: Course Introduction
  • Unit 1: Introduction to IBM PowerSC on IBM Power (covering AIX, IBM i and Linux)
  • Unit 2: Installation and Configuration of IBM PowerSC
  • Unit 3: Security Compliance profiles
  • Unit 4: Managing and Monitoring endpoint security
  • Unit 5: Configuring system scans, reporting and alerting
  • Unit 6: Introduction to MFA
  • Unit 7: Anti-malware
  • Unit 8: Allow List (Trusted Execution and Fapolicyd)
  • Unit 9: File Integrity Monitoring (Real Time Compliance and auditd)
  • Exercise 1. Accessing the lab environment
  • Exercise 2. PowerSC Installation and Configuration
  • Exercise 3. Working with Security Profiles
  • Exercise 4. Creating Custom Profiles and Run Compliance Scans
  • Exercise 5. Configuring MFA on AIX
  • Exercise 6. Configuring Anti-malware
  • Exercise 7. Allow List (Trusted Execution and fapolicyd)
  • Exercise 8. File Integrity Monitoring (Real Time Compliance and auditd)

     

Price (ex. VAT)

€ 2.460,00 per person

Duration

3 days

Schedule

  •  virtual
  •  07-07-2025 - 09-07-2025
  • register

  •  virtual
  •  25-08-2025 - 27-08-2025
  • register

  •  virtual
  •  13-10-2025 - 15-10-2025
  • register

Delivery methods

  • Classroom
  • On-site (at your location)
  • Virtual (instructor online)

Questions?

Write us and we will contact you to discuss your requirements
contact us