|
Information Security Training
from the Henderson Group |
This page is: z/OS AUDIT TRAINING:HG64: |
Quick Links: HOME PAGE CONTACT US INFOSEC and RACF TRAINING
RACF USER NEWS (Describes next NYRUG Meeting NEWSLETTERS AND USER GROUPS ARTICLES
SECURITY AND AUDIT SERVICES FROM THE HENDERSON GROUP ABOUT US OTHER INFO SOURCES |
For more information on RACF seminar dates, locations, and hotels, and how to
register, please click here:
You will learn:
For more information on seminar dates, locations, and hotels, and how to
register, please click here:
Please note that you can save money by holding these classes in-house. Call
Stu at (301) 229-7187 for details.
Note also the classes we offer for Information Security Training, as
listed on the left under QUICK LINKS.
|
"Stu made mainframe controls easy to understand with matching real
life examples"
---Erika Kuhn, Deloitte & Touche
"This was my first Stu Henderson class - interesting and helpful
information that I know I will use again. He has a great method for
simplifying technology to make it easier to understand." |
Table of Contents and Class Outline: HG64: How to Audit MVS, RACF, ACF2, TopSecret, CICS, DB2, and MQ Series Security Page Number I Concepts and Keywords 5 A. Introduction 5 What is MVS? 7 What is RACF? 11 What is ACF2? 11 What is TopSecret (TSS)? 11 What is CICS? 12 What is DB2? 12 A Working Example 17 Audit Rules 18 B. How MVS Security Works With Security Software 31 II. Action Plan 41 A. MVS Security 41 A1. How MVS Security Works 41 Hardware Controls 42 Backdoors 66 A2. How to Audit MVS Security 100 MVS REFERENCE: SYS1.PARMLIB 126 B. RACF Security 147 B1. How RACF Security Works 147 B2. How to Audit RACF Security 180 a. Access to the System 184 b. Access to Data 205 c. Access to Resources 216 d. Authority to Change Rules 226 e. Separation of Authority 233 C. ACF2 Security 266 C1. How ACF2 Security Works 266 C2. How to Audit ACF2 Security 302 D. TopSecret (TSS) Security 360 D1. How TSS Security Works 360 D2. How to Audit TSS Security 371 E. CICS Security 410 E1. How CICS Security Works 410 E2. How to Audit CICS Security 430 CICS REFERENCE: DFHSIT Security Operands 488 F. DB2 Security 496 F1. How DB2 Security Works 496 F2. How to Audit DB2 Security 534 G. MQ Series (the Message Queue Manager) 569 G1. How MQ Series Security Works 569 G2. How to Audit MQ Series Security 575 H. Wrap-up, Working Papers, and Follow-Up 591 III Forms and Reference 593 A. Basic Security Model 594 B. Forms to Summarize MVS Images 599 C. SMF Data 604 D. DSNZPARM 608 E. DSN3@ATH AND DSN3@SGN 613 F. DB2 AUTHORIZATION TABLES 617 G. SMF Data and the RACFRW 630 H. RACF Database Unload Utility Guide 643 I. RACF Audit Checklist 647 J. RACF SETR LIST Guide 654 K. RACF DSMON Guide 668 INDEX 687
His most popular seminars provide: RACF training, mainframe audit training including MVS and z/OS audit training. His RACF seminars include: "Effective RACF Administration", "Advanced RACF Administration", and "UNIX (USS) for RACF Administrators".
His audit seminars include: "How to Audit MVS, RACF, ACF2, TopSecret, CICS, DB2, and MQ Series Security" and the follow-on "How to Audit z/OS with USS, TCP/IP, FTP, and the Internet"
Information on class location and schedules, as well as articles, links and other useful information sharing may be found on his website at www.stuhenderson.com