Information Security Training
from the Henderson Group
This page is:
AUDIT TRAINING: HG73: CICS

Quick Links:

HOME PAGE

CONTACT US

INFOSEC TRAINING

IT AUDIT TRAINING

NEWSLETTERS AND USER GROUPS

ARTICLES PRIVACY STATEMENT

ABOUT US

OTHER INFO SOURCES


HG73: How to Audit CICS


(1 Day, 8 CPE Credits; $410)



  • This class is currently not scheduled. It can be presented in-house or to ISACA chapters. You may want to consider HG64 which has similar material combined with other topics.
This class shows you how to audit CICS (Customer Information Control System), the most widely used online transaction management software on IBM mainframe computers. You will learn what CICS is, how its security works, and how to audit it.

You will learn:

  • How CICS is used (a typical application as a reference example)
  • How CICS works
  • Recent developments in CICS security
  • Where the control points are in CICS and how to evaluate them
  • What data to collect and how to interpret it
  • How to conduct the audit, from planning and scoping through follow-up
  • What all the related buzzwords and acronyms mean
  • How to conduct the audit rapidly and efficiently, with maximum benefit to your organization

The workbook is a valuable reference, and includes a complete audit program.

For more information on seminar dates, locations, and hotels, and how to register, please click here:
Schedule/Registration/Locations/Hotels

Return to Top of Page

Return to Home Page





Who Should Attend HG73?
  • Information Techology auditors who will be auditing CICS or CICS-based applications
  • Financial auditors who want to learn more about IT auditing

Please note that you can save money by holding these classes in-house. Call Stu at (301) 229-7187 for details.

Note also the classes we offer for Information Security Training, as listed on the left under QUICK LINKS.
Return to Top of Page

Return to Home Page

"I thought I knew CICS security until I took this class. Gave me the hidden knowledge that I need." ---Nina Isla,Blue Cross Blue Shield of Florida

"Stu made me feel very comfortable coming into the class. I learned a lot from the class. I'm looking forward to going back to the office and applying what I learned."
---Jackie Fisher, GEICO


       Table of Contents and Class Outline: HG73: How to Audit CICS

I     Keywords and Concepts

        A.  Introduction
        B.  What Is CICS and How Does It Work
        C.  Basic CICS Concepts and How They Fit Together  
        D.  The Life of a CICS Transaction
        E.  How Two CICS Regions Can Interconnect
        F.  How to Find Out How CICS is Used in Your Organization
        G.  Control Objectives
        H.  The Audit Program


II    Action Plan

        A.  Scoping, Planning, and Basic Data-Gathering
        B.  Evaluation of CICS Security for a Single Region
        C.  Evaluation of CICS Security Across Regions
        E.  Wrap-up, Working Papers, Follow-up


III   Forms and Reference

        A.  Basic Security Model
        B.  Forms to Document CICS Regions
        C.  Audit Plan
        D.  Model Documents
        E.  DFHSIT Operands for Security
        F.  SYS1.VTAMLST

INDEX



Return to Top of Page

Return to Home Page