Interskill Learning Mainframe Training

770-872-4278

The Online Mainframe Training Specialists
Search   Course Catalog   Live Chat!  
Return to Catalog Home

Security Curriculum

Course Title Duration
(Hours)
Description
Introduction to Mainframe Security Series 2.3
Introduction to Mainframe Security v2.3
5 This course provides the learner with a basic understanding of z/OS security. It introduces basic security concepts as they relate to z/OS, including the reasons for security, physical security and the Logon ID. It covers both traditional z/OS security issues such as data set protection and TSO/E, together with recent developments including LDAP and passphrases. Sections on security auditing, event recording, and a detailed explanation of the Authorized Program Facility (APF) are also covered.
RACF v2 Series
RACF Introduction
3 This course introduces the learner to IBM’s RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of user and group profiles and describes from a user perspective, RACF’s interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided.
RACF - Defining and Managing Users
4 The “RACF - Defining and Managing Users” course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several interfaces.
RACF - Managing RACF Groups and Administrative Authorities
3 The “RACF - Managing RACF Groups and Administrative Authorities” course follows on from the “RACF -Defining and Managing Users” course describing how users can be connected to group profiles and can be assigned special privileged access.
RACF for System Programmers
3 The “RACF for System Programmers” course describes how the RACF database is structured and configured, and the skills needed to ensure that it runs optimally.
Protecting Data Sets Using RACF
3 The “RACF - Protecting Data Sets Using RACF” course describes how RACF is used to define access to z/OS data sets. Information on the profiles used to provide this access is also discussed in detail.
RACF - Protecting General Resources Using RACF
4 The “RACF - Protecting General Resources Using RACF” course describes how RACF is used to define access to system resources such as DASD and tape volumes, load modules (programs), and terminals. Details of the profiles used to provide access to these items is also discussed in detail.
RACF - RACF and z/OS UNIX
3 The “RACF - RACF and z/OS UNIX” course describes the requirements for configuring security in a z/OS UNIX environment using RACF. It covers the creation and use of UID and GID definitions as well as file and directory permission bits and access control lists that are referenced when accessing those z/OS UNIX resources.
Managing Digital Certificates
3 The “Managing Digital Certificates” course discusses how digital certificates are used to provide authentication in a z/OS environment, with initial content describing how to plan for their use. Details discussing how digital certificates are created and managed are then provided.
RACF for Auditors
4 The RACF for System Auditors course describes the purpose of an audit and provides an overview of steps used when planning one. Following this, more in-depth RACF audit commands and controls are discussed along with the types of reports that can be produced.
CA ACF2 Security Server Series
CA-ACF2® - Introduction 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Defining Environment Controls 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting System Access 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting Data Integrity 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Protecting General Resources 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® - Maintaining ACF2 4 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
CA-ACF2® For Auditors 5 These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
Looking for more information about Interskill Learning Products?
Contact our Learning Consultants or call us at 770-872-4278