Interskill Learning Mainframe Training

770-872-4278

The Online Mainframe Training Specialists
Search   Course Catalog   Live Chat!  
Return to Catalog Home

Security Curriculum 2.4

Course Title Duration
(Hours)
Description
Introduction to Mainframe Security Series 2.4
Introduction to Mainframe Security v2.4
5 This course provides the learner with a basic understanding of z/OS security. It introduces basic security concepts as they relate to z/OS, including the reasons for security, physical security and the Logon ID. It covers both traditional z/OS security issues such as data set protection and TSO/E, together with recent developments including LDAP and passphrases. Sections on security auditing, event recording, and a detailed explanation of the Authorized Program Facility (APF) are also covered.
RACF v2 for z/OS v2.4 Series
RACF – Introduction 2.4
3 This course introduces the learner to IBM’s RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of usThis course introduces the learner to IBM’s RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of user and group profiles and describes from a user perspective, RACF’s interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided.er and group profiles and describes from a user perspective, RACF’s interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided.
RACF - Defining and Managing Users 2.4
4 The “RACF - Defining and Managing Users in RACF” course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several interfaces.
RACF - Managing RACF Groups and Administrative Authorities 2.4
3 The “RACF - Managing RACF Groups and Administrative Authorities” course follows on from the “Defining Users to RACF” course describing how users can be connected to Group profiles and can be assigned special privileged access.
RACF - Protecting Data Sets Using RACF 2.4
3 The “RACF - Protecting Data Sets Using RACF” course describes how RACF is used to define access to z/OS data sets. Information on the profiles used to provide this access is also discussed in detail.
RACF - Protecting General Resources Using RACF 2.4
4 The “RACF - Protecting General Resources Using RACF” course describes how RACF is used to define access to system resources such as DASD and tape volumes, load modules (programs), and terminals. Details of the profiles used to provide access to these items is also discussed in detail.
RACF - RACF and z/OS UNIX 2.4
3 The “RACF - RACF and z/OS UNIX” course describes the requirements for configuring security in a z/OS UNIX environment using RACF. It covers the creation and use of UID and GID definitions as well as file and directory permission bits and access control lists that are referenced when accessing those z/OS UNIX resources.
RACF - Managing Digital Certificates 2.4
3 In the “RACF - Managing Digital Certificates” course you will see how encryption keys are used to securely manage data, and the standards that enforce encryption protocols. You will be introduced to various types of certificates and see how data that is stored in them. From a z/OS perspective you will see how IBM’s Digital Certificate Access Server (DCAS) provides password free access to that environment using a certificate. Commands used to generate and manipulate digital certificates, and keyrings is discussed in detail.
RACF - For System Programmers 2.4
3 The “RACF - For System Programmers 2.4” course describes how the RACF database is structured and configured, and the skills needed to ensure that it runs optimally.
RACF - For Auditors 2.4
4 The “RACF - For Auditors” course describes the various types of data center audits and discusses the role of an internal auditor when performing a RACF audit. It expands this to look at the general steps to ensure that RACF managed security is aligned with both organizational security standards, and external compliance regulations. RACF auditor privileges are discussed in detail describing how audit information is stored and the commands used to request the capture of specific events. The type of data that can be unloaded from SMF, and the RACF database, is explained along with details on how ICETOOL can be used to process this information to create audit reports.
CA ACF2 Security Server Series
CA-ACF2® - Introduction 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Defining Environment Controls 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting System Access 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting Data Integrity 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting General Resources 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Maintaining ACF2 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® For Auditors 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
Looking for more information about Interskill Learning Products?
Contact our Learning Consultants or call us at 770-872-4278