Learn about different types of security incidents and how misconfiguration can have serious consequences.
AIX Security Basics Course
Table of Contents
Intruders and rogue employees alike are able to invisibly exploit weaknesses from the inside out. Browse the topics below to learn how to mitigate common threats to your AIX environment.
Learn how to limit the attack surface by eliminating extraneous services.
Learn how to find appropriate patches and backup your system before implementation.
Learn which groups should have read-write-execute privileges, and which should not.
Learn how to prevent malicious users from modifying system startup files.
Learn the appropriate uses for special permissions commands.
Learn how to secure services like FTP, mail, SMTP, SNMP, and Cron.