Interskill Learning Mainframe Training

770-872-4278

The Online Mainframe Training Specialists
Search   Course Catalog   Live Chat!  
Return to Catalog Home

Security Curriculum

Course Title Duration Description
Introduction to Mainframe Security Series
Introduction to Mainframe Security 5 This course provides the learner with a basic understanding of z/OS security. It introduces basic security concepts as they relate to z/OS, including the reasons for security, physical security and the Logon ID. It covers both traditional z/OS security issues such as data set protection and TSO/E, together with recent developments including LDAP and passphrases. Sections on security auditing, event recording, and a detailed explanation of the Authorized Program Facility (APF) are also covered.
CA ACF2 Security Server Series
CA-ACF2® - Introduction 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Defining Environment Controls 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting System Access 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting Data Integrity 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting General Resources 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Maintaining ACF2 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® For Auditors 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
RACF Series
Defining Users to RACF 6 The Defining Users to RACF course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users and groups system security access.
Protecting System Resources Using RACF 6 The Protecting System Resources Using RACF course describes how RACF is used to define access to data sets. Details of the profiles used to provide access to general resources and UNIX resources is also explained.
RACF for System Administrators and Auditors 4 The RACF for System Adminstrators and Auditors course describes the skills needed to audit security access in an RACF controlled system. It includes setting up auditing options and interpreting audit data.
Looking for more information about Interskill Learning Products?
Contact our Learning Consultants or call us at 770-872-4278