|
Information Security Training
from the Henderson Group |
This page is: INFOSEC TRAINING: |
Quick Links: HOME PAGE CONTACT US INFOSEC and RACF TRAINING
NEWSLETTERS AND USER GROUPS ARTICLES PRIVACY STATEMENT ABOUT US OTHER INFO SOURCES |
For more information on seminar dates and locations, and how to register, please
click here:
You can take five different course to learn everything you need to know, or
save time and money by just signing up for this one course and learn all the
major security sub-systems on your mainframe! This course shows you how each
of the system software components operates, how security options are set, how
these options relate to other system software, including ACF2/RACF/TopSecret,
and how you can verify and evaluate the quality of your mainframe's total
security environment.
If you want to be a Data Security Officer, you need to understand MVS
Security, JES Security, VTAM Security, DB2 Security, CICS Security, and how
they all fit together. This course will teach you all of this, and what you
need to do about it to be an effective Data Security Officer. You will learn
to address MVS Security as an integrated whole, instead of trying to handle
the different components piecemeal.
The 400+ page workbook will become one of the most useful reference manuals on
your bookshelf.
Please note that you can save money by holding these classes in-house. Call
Stu at (301) 229-7187 for details.
Note also the classes we offer for Information Technology Audit Training, as
listed on the left under QUICK LINKS.
|
"A ton of information provided that when applied to our system will
considerably tighten our security."
--- Brian Miller, Southern Company
"Stu is very interesting and keeps your attention with his wit &
humor and of course his vast knowledge." |
HG17 SEMINAR TABLE OF CONTENTS Page I Concepts and Keywords 3 A Introduction 3 Why We Are Here 4 Security versus Integrity 8 The Big 5 Questions and the Two Security Functions 10 Two Functions Any Security Tool Must Support 14 Need to Understand the Architecture 15 The Orange Book and the Need for a Standard 17 Ways to Identify 18 Two Key Concepts: Protectall and Always-Call 21 Different Places Where Options Can Be Set 22 The Big Picture: What We Intend to Do and Why 24 B MVS System Software Components 26 Hardware Controls 27 VTAM 109 JES2 136 Security Software 140 TSO 201 CICS 204 DB2 Fundamentals 225 SMF Data 260 II Action Steps 264 Hardware Controls 264 The MVS Operating System 265 VTAM 278 JES2 288 Security Software 291 TSO 342 CICS 343 DB2 376 SUMMARY 400 III Forms and Reference 405 A) SYS1.PARMLIB 406 B) HASPPARM 418 C) SYS1.VTAMLST 423 D) DSNZPARM 454 E) DSN3@ATH AND DSN3@SGN 459 F) SEVEN DB2 AUTHORIZATION TABLES 463
His most popular seminars provide: RACF training, mainframe audit training including MVS and z/OS audit training. His RACF seminars include: "Effective RACF Administration", "Advanced RACF Administration", and "UNIX (USS) for RACF Administrators".
His audit seminars include: "How to Audit MVS, RACF, ACF2, TopSecret, CICS, DB2, and MQ Series Security" and the follow-on "How to Audit z/OS with USS, TCP/IP, FTP, and the Internet"
Information on class location and schedules, as well as articles, links and other useful information sharing may be found on his website at www.stuhenderson.com