Suggested time commitment: 3 weeks of study, 3-4 hours/week
In this self-paced online course, you will learn how PI Identities and PI AF Identities are mapped to applications and active directory accounts and how custom permissions are configured for each of these identities. You will also learn how to meet OSIsoft best practices for a secure PI System.
There are 7 hands-on exercises tailored to apply the knowledge you've learned in the video lectures. By the end of the course, you will have a working knowledge and new skills to use toward securing your PI System.
PI System Administration for IT Professionals Workbook
This online course follows some of the same curricula as the "PI System Administration for IT Professionals" classroom training. Before start watching the lectures, download a copy of the pdf course workbook, available in 9 different languages, from our tech support download center> Training Materials. Some of the exercises and lessons may be useful while completing the course.
Note: This online course will only cover security modules of the classroom course. To learn more about PI System administration, please refer to the online course catalogue.
Below are the video lectures for this course. We have placed the topics in the same order as they would be presented in a live instructor-led course. However, feel free to view the videos in any order, spread over any interval. You can also rewind and rewatch parts of the videos that you need to view again. Also be sure to check out the Online Course Videos - Tips and Tricks if your videos look fuzzy!
0. Students without prior knowledge of the PI System should review Chapter 1: PI System Basics of the PI System Administration for IT Professionals workbook.
2. Introduction to PI Data Archive Security
3. Online Course's Example Security Model
4. Configuring Security
5. Troubleshooting Security Issues
6. Online Course Final Project
7. Additional Resources
Visit our learning paths to find out what's next for you. NEW
Tell us how we can improve
Creating a custom security plan for your organization
The course ends with a challenge to create a plan for applying everything you've learned to your own PI System. For your final project, you need to create a custom security plan for your organization and either
a) model it in the Configuring PI Data Archive Security - Cloud Environment OR
b) model it in your own development PI System.
You may use the same worksheet shown in Create a Custom Security Plan with our Online Course Security Plan Worksheet , or you may create your own map to record your domain users and groups, the PI Identities you'll associate with them, the permissions you'll assign to each PI Identity, along with any mappings or trusts you will configure.
Note: You do not need to include IP address or machine names in your spreadsheet if you plan on sharing it with your course facilitator.