Information Security Training
from the Henderson Group
This page is: INFOSEC TRAINING:
HG17: Comprehensive z/OS Security

Quick Links:

HOME PAGE

CONTACT US

INFOSEC and RACF TRAINING

IT and z/OS AUDIT TRAINING

NEWSLETTERS AND USER GROUPS

ARTICLES

PRIVACY STATEMENT

ABOUT US

OTHER INFO
SOURCES


HG17: Comprehensive z/OS Security
[formerly: How to Be an Effective MVS (z/OS) Data Security Officer (DSO)]


(3 Days, 24 CPE Credits; $1290)



  • This class is currently not scheduled. It can be presented in-house or to ISACA chapters. You may want to consider HG64 which has similar material combined with other topics.

For more information on seminar dates and locations, and how to register, please click here:
Seminar Schedule/Registration/Locations



This class shows you how to control, integrate, and evaluate security for z/OS, including: MVS, JES, VTAM, DB2, and CICS.

You can take five different course to learn everything you need to know, or save time and money by just signing up for this one course and learn all the major security sub-systems on your mainframe! This course shows you how each of the system software components operates, how security options are set, how these options relate to other system software, including ACF2/RACF/TopSecret, and how you can verify and evaluate the quality of your mainframe's total security environment.

If you want to be a Data Security Officer, you need to understand MVS Security, JES Security, VTAM Security, DB2 Security, CICS Security, and how they all fit together. This course will teach you all of this, and what you need to do about it to be an effective Data Security Officer. You will learn to address MVS Security as an integrated whole, instead of trying to handle the different components piecemeal.

The 400+ page workbook will become one of the most useful reference manuals on your bookshelf.

Return to Top of Page

Return to Home Page


Who Should Attend HG17?

  • DSO's who want to maximize their effectiveness
  • ACF2/RACF/TopSecret administrators who want to address all of z/OS security
  • Auditors who want to audit MVS, JES, DB2, CICS, or VTAM
  • Anyone responsible for IBM mainframe security with z/OS or MVS

HG17: This Course Will Teach You
  • MVS security
  • JES security
  • DB2 security
  • VTAM security
  • CICS security
  • How to integrate and audit them for effective z/OS security

Please note that you can save money by holding these classes in-house. Call Stu at (301) 229-7187 for details.

Note also the classes we offer for Information Technology Audit Training, as listed on the left under QUICK LINKS.

Return to Top of Page

Return to Home Page

"A ton of information provided that when applied to our system will considerably tighten our security." --- Brian Miller, Southern Company

"Stu is very interesting and keeps your attention with his wit & humor and of course his vast knowledge."
--- Michael Brown, AT&T



                    HG17 SEMINAR TABLE OF CONTENTS

                                                                 Page
I   Concepts and Keywords                                           3
     A    Introduction                                              3
          Why We Are Here                                           4
          Security versus Integrity                                 8
          The Big 5 Questions and the Two Security Functions       10
          Two Functions Any Security Tool Must Support             14
          Need to Understand the Architecture                      15
          The Orange Book and the Need for a Standard              17
          Ways to Identify                                         18
          Two Key Concepts:  Protectall and Always-Call            21
          Different Places Where Options Can Be Set                22
          The Big Picture: What We Intend to Do and Why            24
     B    MVS System Software Components                           26
          Hardware Controls                                        27
          VTAM                                                    109
          JES2                                                    136
          Security Software                                       140
          TSO                                                     201
          CICS                                                    204
          DB2 Fundamentals                                        225
          SMF Data                                                260
II  Action Steps                                                  264
          Hardware Controls                                       264
          The MVS Operating System                                265
          VTAM                                                    278
          JES2                                                    288
          Security Software                                       291
          TSO                                                     342
          CICS                                                    343
          DB2                                                     376
          SUMMARY                                                 400

III Forms and Reference                                           405
          A)    SYS1.PARMLIB                                      406
          B)    HASPPARM                                          418
          C)    SYS1.VTAMLST                                      423
          D)    DSNZPARM                                          454
          E)    DSN3@ATH AND DSN3@SGN                             459
          F)    SEVEN DB2 AUTHORIZATION TABLES                    463


Return to Top of Page

Return to Home Page












Stu Henderson offers consulting, seminars, articles, and other information sharing related to information security and auditing. His consulting includes: security reviews, risk assessments, RACF implementation assistance, and Information Technology audit technical counseling.

His most popular seminars provide: RACF training, mainframe audit training including MVS and z/OS audit training. His RACF seminars include: "Effective RACF Administration", "Advanced RACF Administration", and "UNIX (USS) for RACF Administrators".

His audit seminars include: "How to Audit MVS, RACF, ACF2, TopSecret, CICS, DB2, and MQ Series Security" and the follow-on "How to Audit z/OS with USS, TCP/IP, FTP, and the Internet"

Information on class location and schedules, as well as articles, links and other useful information sharing may be found on his website at www.stuhenderson.com