SlideShare a Scribd company logo
1 of 9
IBM AIX – System
   Administration

        Course Details




              © UWINPro Inc.
IBM AIX
    At UWINPro, our expert IBM AIX trainers/consultants provide the best
    UNIX training.



•   Course Duration: 54 Hours (24+30)



•   Course Format: Weekends/Weekdays



•   Mode of Training:
                     - Onsite/Classroom
                     - Online




                                                      © UWINPro Inc.
Course Highlights
   IBM AIX online access

   Hands on training

   Reference course related videos

   Training through slideshows /notes and exercises

   Case Study - Real time           business   scenario   and   a     typical    IBM   AIX
    implementation case study

   AIX Quiz

   IBM AIX Certification material

   Sample of interview Questions for UNIX AIX

   Training Quality Feedback form

   How to use important IBM resources



                                                                     © UWINPro Inc.
Course Details
                  IBM AIX – Part 1 (24 Hrs)

   AIX Tools & Architecture : Login to AIX machine, Introduction of AIX and Systems
    administrator roles, System Management Commands, Using SMIT, SMIT Special Characters and
    Keys, Smit.log and smit.script files, The smit Command, Web Based System Manager, The man
    Command,          InfoExplorer,      Web      Based     Documentation    Browser,     AIX
    Architecture, Filesystems, LVM, hdisks concepts, Labs




   Installation & User Group Management : AIX Software installation, Aix user and group
    management files, The /etc/passwd file, The /etc/security/passwd file, The /etc/group file, The
    /etc/security/group file, Group administrators, The /etc/security/user file, The /etc/security/limits
    file, The /etc/security/login.cfg file, User management tasks, Adding a new user, The
    /usr/lib/security/user.default file, Removing a user, Adding a group, Scheduling using crontab, Labs




                                                                               © UWINPro Inc.
Course Details

   Introduction to Volume Management                : The AIX approach to Disk Storage, Volume
    Groups,    Physical    Volumes    and    Logical      Volumes,      Volume     Group Descriptor
    Areas, Mirroring, Striping, Disk Placement Policies, Migrating Physical Volume data, Useful
    Commands, Creating, Extending and Mirroring a Logical Volume, Backup, Restore, Cloning, Paging
    space – creating and removing paging space, Installing application in AIX, Labs




   Error reporting, Networking, Printing and performance : Disk problem issue, Errpt
    – error reporting, Define TCP/IP Terminology, Define Routing (Static and Dynamic), TCP/IP
    Commands and Utilities, Configure TCP/IP for a Network Interface, Configure a Static
    Route, Printers and Queues, Queuing concepts in AIX, Spooling Control Directories, The QCONFIG
    File, Managing Print Queues, Queue Status Commands, AIX Security files, Performance
    commands, Labs




                                                                          © UWINPro Inc.
Course Details
                 IBM AIX – Part 2 (30 Hrs)

   Object Data Manager           : ODM Components and Commands, Object Classes, Descriptor
    Information, Objects, Searching The ODM, The ODM Database, Data Base File Names, ODM File
    Locations, cfgmgr And The ODM, The Predefined Database Files, Predefined Devices, Predefined
    Attributes, Customized Devices, Customized Attributes, System Startup And The Boot Process, The
    Bootlist And BLV, The Boot Logical Volume, Repairing The BLV, Using Bootlists, Boot Problems,
    Service Processors, Labs




   Disk Management : Local Volume Manager Review, AIX Disk Storage, Physical Volume And
    LVM, Volume Group Descriptor Areas, Physical And Logical Storage, Use Of Logical Volumes,
    Mirroring, Stripping, Volume Group Limits, Alternative Mirroring And Stripping With RAID, LVM
    Data, LVM Identifiers, VGDA, VGSA And LVCB Control Blocks, LVM and The ODM, Physical Volumes
    And The ODM, Volume Groups And The ODM, Logical Volumes And The ODM, LVM Problems In The
    ODM, The rvgrecover Script, VGDA And Quorum, Forcing a Varyon , Mirroring, Labs




                                                                          © UWINPro Inc.
Course Details


   Back up your system : Using mksysb, Creating a System Backup, mksysb Image Structure,
    Verifying a mksysb Tape, Preparing bosinst.data For Unattended Install, Cloning, Reducing a file
    System, Alternate Disk Installation, Installing a mksysb Image On Another Disk, Cloning The
    Running rootvg To Another Disk, Removing An Alternate Disk Installation, Backing up Non-Root
    Volume Groups, Using savevg, Backup From a Split Mirror, Labs




   Problem Solving tools          : Error Log Facility, Error Log Input Components, Error Reporting
    From SMIT, The errpt Command, Sample Summary/Intermediate/Detailed Report Output,
    Interpreting LVM Error Log Entries, Error Log Maintenance, Error Notification Facility, Notification
    Methods, The syslogd DAEMON, Diagnostics, The diag Command, Working With diag, AIX System
    Dumps, Addressing the Problem, Understanding The Workload And Bottlenecks, Identifying CPU
    Intensive Tasks, Identifying High Priority Processes, Monitoring CPU Usage With sar, Monitoring
    Memory Usage With vmstat, Monitoring Disk i/o Using iostat, Labs




                                                                              © UWINPro Inc.
Course Details


   Advance Security Features : The Auditing Subsystem, The Configuration Files, The Object
    File, The Event File, The Config File, Using Bin Mode, Using Stream Mode, The Audit
    Command, Authentication and Access Controls, Physical Security, Path Problems, Enhancing Login
    Security - Login Prompt, Enhancing Login Security - Restricted Shell, Customized Authentication
    Methods, Two Key Authentication, Access Control Lists, ACL Keywords And Format, Labs




                                                                          © UWINPro Inc.
THANK YOU !


To enroll for this course, contact us at: info@uwinpro.com

               For more info: www.uwinpro.com

                  Visit our    Channel




                                                 © UWINPro Inc.

More Related Content

Viewers also liked

Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2   problem determinationAix student guide system administrations part 2   problem determination
Aix student guide system administrations part 2 problem determination
Yogesh Sharma
 
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Banking at Ho Chi Minh city
 

Viewers also liked (14)

Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2   problem determinationAix student guide system administrations part 2   problem determination
Aix student guide system administrations part 2 problem determination
 
Informatica session
Informatica sessionInformatica session
Informatica session
 
No sql databases
No sql databasesNo sql databases
No sql databases
 
Unix Administration 1
Unix Administration 1Unix Administration 1
Unix Administration 1
 
Openstack Overview
Openstack OverviewOpenstack Overview
Openstack Overview
 
Installing Aix
Installing AixInstalling Aix
Installing Aix
 
The Vision for the Future of Network Virtualization with VMware NSX
The Vision for the Future of Network Virtualization with VMware  NSXThe Vision for the Future of Network Virtualization with VMware  NSX
The Vision for the Future of Network Virtualization with VMware NSX
 
In-Memory Computing: How, Why? and common Patterns
In-Memory Computing: How, Why? and common PatternsIn-Memory Computing: How, Why? and common Patterns
In-Memory Computing: How, Why? and common Patterns
 
In memory databases presentation
In memory databases presentationIn memory databases presentation
In memory databases presentation
 
Overview of v cloud case studies
Overview of v cloud case studiesOverview of v cloud case studies
Overview of v cloud case studies
 
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
 
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
 
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
 
IBMRedbook
IBMRedbookIBMRedbook
IBMRedbook
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

IBM AIX System Administration - Course

  • 1. IBM AIX – System Administration Course Details © UWINPro Inc.
  • 2. IBM AIX At UWINPro, our expert IBM AIX trainers/consultants provide the best UNIX training. • Course Duration: 54 Hours (24+30) • Course Format: Weekends/Weekdays • Mode of Training: - Onsite/Classroom - Online © UWINPro Inc.
  • 3. Course Highlights  IBM AIX online access  Hands on training  Reference course related videos  Training through slideshows /notes and exercises  Case Study - Real time business scenario and a typical IBM AIX implementation case study  AIX Quiz  IBM AIX Certification material  Sample of interview Questions for UNIX AIX  Training Quality Feedback form  How to use important IBM resources © UWINPro Inc.
  • 4. Course Details IBM AIX – Part 1 (24 Hrs)  AIX Tools & Architecture : Login to AIX machine, Introduction of AIX and Systems administrator roles, System Management Commands, Using SMIT, SMIT Special Characters and Keys, Smit.log and smit.script files, The smit Command, Web Based System Manager, The man Command, InfoExplorer, Web Based Documentation Browser, AIX Architecture, Filesystems, LVM, hdisks concepts, Labs  Installation & User Group Management : AIX Software installation, Aix user and group management files, The /etc/passwd file, The /etc/security/passwd file, The /etc/group file, The /etc/security/group file, Group administrators, The /etc/security/user file, The /etc/security/limits file, The /etc/security/login.cfg file, User management tasks, Adding a new user, The /usr/lib/security/user.default file, Removing a user, Adding a group, Scheduling using crontab, Labs © UWINPro Inc.
  • 5. Course Details  Introduction to Volume Management : The AIX approach to Disk Storage, Volume Groups, Physical Volumes and Logical Volumes, Volume Group Descriptor Areas, Mirroring, Striping, Disk Placement Policies, Migrating Physical Volume data, Useful Commands, Creating, Extending and Mirroring a Logical Volume, Backup, Restore, Cloning, Paging space – creating and removing paging space, Installing application in AIX, Labs  Error reporting, Networking, Printing and performance : Disk problem issue, Errpt – error reporting, Define TCP/IP Terminology, Define Routing (Static and Dynamic), TCP/IP Commands and Utilities, Configure TCP/IP for a Network Interface, Configure a Static Route, Printers and Queues, Queuing concepts in AIX, Spooling Control Directories, The QCONFIG File, Managing Print Queues, Queue Status Commands, AIX Security files, Performance commands, Labs © UWINPro Inc.
  • 6. Course Details IBM AIX – Part 2 (30 Hrs)  Object Data Manager : ODM Components and Commands, Object Classes, Descriptor Information, Objects, Searching The ODM, The ODM Database, Data Base File Names, ODM File Locations, cfgmgr And The ODM, The Predefined Database Files, Predefined Devices, Predefined Attributes, Customized Devices, Customized Attributes, System Startup And The Boot Process, The Bootlist And BLV, The Boot Logical Volume, Repairing The BLV, Using Bootlists, Boot Problems, Service Processors, Labs  Disk Management : Local Volume Manager Review, AIX Disk Storage, Physical Volume And LVM, Volume Group Descriptor Areas, Physical And Logical Storage, Use Of Logical Volumes, Mirroring, Stripping, Volume Group Limits, Alternative Mirroring And Stripping With RAID, LVM Data, LVM Identifiers, VGDA, VGSA And LVCB Control Blocks, LVM and The ODM, Physical Volumes And The ODM, Volume Groups And The ODM, Logical Volumes And The ODM, LVM Problems In The ODM, The rvgrecover Script, VGDA And Quorum, Forcing a Varyon , Mirroring, Labs © UWINPro Inc.
  • 7. Course Details  Back up your system : Using mksysb, Creating a System Backup, mksysb Image Structure, Verifying a mksysb Tape, Preparing bosinst.data For Unattended Install, Cloning, Reducing a file System, Alternate Disk Installation, Installing a mksysb Image On Another Disk, Cloning The Running rootvg To Another Disk, Removing An Alternate Disk Installation, Backing up Non-Root Volume Groups, Using savevg, Backup From a Split Mirror, Labs  Problem Solving tools : Error Log Facility, Error Log Input Components, Error Reporting From SMIT, The errpt Command, Sample Summary/Intermediate/Detailed Report Output, Interpreting LVM Error Log Entries, Error Log Maintenance, Error Notification Facility, Notification Methods, The syslogd DAEMON, Diagnostics, The diag Command, Working With diag, AIX System Dumps, Addressing the Problem, Understanding The Workload And Bottlenecks, Identifying CPU Intensive Tasks, Identifying High Priority Processes, Monitoring CPU Usage With sar, Monitoring Memory Usage With vmstat, Monitoring Disk i/o Using iostat, Labs © UWINPro Inc.
  • 8. Course Details  Advance Security Features : The Auditing Subsystem, The Configuration Files, The Object File, The Event File, The Config File, Using Bin Mode, Using Stream Mode, The Audit Command, Authentication and Access Controls, Physical Security, Path Problems, Enhancing Login Security - Login Prompt, Enhancing Login Security - Restricted Shell, Customized Authentication Methods, Two Key Authentication, Access Control Lists, ACL Keywords And Format, Labs © UWINPro Inc.
  • 9. THANK YOU ! To enroll for this course, contact us at: info@uwinpro.com For more info: www.uwinpro.com Visit our Channel © UWINPro Inc.