HG17: Comprehensive z/OS Security
- This class is available for in-house and on-request public sessions
Please click: Here for Registration Form
For more information on RACF seminar dates, locations, and hotels, and how to register, please click here:
Schedule/Registration/Locations/Hotels for RACF Training
This class shows you how to control, integrate, and evaluate security for z/OS, including: MVS, JES, VTAM, DB2, and CICS.
You can take five different course to learn everything you need to know, or save time and money by just signing up for this one course and learn all the major security sub-systems on your mainframe! This course shows you how each of the system software components operates, how security options are set, how these options relate to other system software, including ACF2/RACF/TopSecret, and how you can verify and evaluate the quality of your mainframe's total security environment.
If you want to be a Data Security Officer, you need to understand MVS Security, JES Security, VTAM Security, DB2 Security, CICS Security, and how they all fit together. This course will teach you all of this, and what you need to do about it to be an effective Data Security Officer. You will learn to address MVS Security as an integrated whole, instead of trying to handle the different components piecemeal.
The 400+ page workbook will become one of the most useful reference manuals on your bookshelf.
Who Should Attend HG17?
- DSO's who want to maximize their effectiveness
- ACF2/RACF/TopSecret administrators who want to address all of z/OS security
- Auditors who want to audit MVS, JES, DB2, CICS, or VTAM
- Anyone responsible for IBM mainframe security with z/OS or MVS
HG17: You Will Learn:
- MVS security
- JES security
- DB2 security
- VTAM security
- CICS security
- How to integrate and audit them for effective z/OS security
Class Outline
HG17 SEMINAR TABLE OF CONTENTS I Concepts and Keywords A Introduction Why We Are Here Security versus Integrity The Big 5 Questions and the Two Security Functions Two Functions Any Security Tool Must Support Need to Understand the Architecture The Orange Book and the Need for a Standard Ways to Identify Two Key Concepts: Protectall and Always-Call Different Places Where Options Can Be Set The Big Picture: What We Intend to Do and Why B MVS System Software Components Hardware Controls VTAM JES2 Security Software TSO CICS DB2 Fundamentals SMF Data II Action Steps Hardware Controls The MVS Operating System VTAM JES2 Security Software TSO CICS DB2 SUMMARY III Forms and Reference A) SYS1.PARMLIB B) HASPPARM C) SYS1.VTAMLST D) DSNZPARM E) DSN3@ATH AND DSN3@SGN F) SEVEN DB2 AUTHORIZATION TABLES
Please note that these seminars are available for In-House Sessions.
You can save more money by learning about our seminar Discounts
Return to Top of Page Return to Home Page
Stu Henderson offers consulting, seminars, articles, and other information sharing related to information security and auditing. His consulting includes: security reviews, risk assessments, RACF implementation assistance, and Information Technology audit technical counseling.
His most popular seminars provide: RACF training, mainframe audit training including MVS and z/OS audit training. His RACF seminars include: "Effective RACF Administration", "Advanced RACF Administration", and "UNIX (USS) for RACF Administrators".
His audit seminars include: "How to Audit MVS, RACF, ACF2, TopSecret, CICS, DB2, and MQ Series Security" and the follow-on "How to Audit z/OS with USS, TCP/IP, FTP, and the Internet" as well as "How to Audit UNIX and Windows Security" and "How to Audit TCP/IP Security".
Information on class location and schedules, as well as articles, links and other useful information sharing may be found on his website at www.stuhenderson.com