|
Information Security Training
from the Henderson Group |
This page is: |
Quick Links: HOME PAGE CONTACT US INFOSEC TRAINING
NEWSLETTERS AND USER GROUPS ARTICLES
ABOUT US OTHER INFO SOURCES |
You will learn:
For more information on seminar dates, locations, and hotels, and how to
register, please click here:
Please note that you can save money by holding these classes in-house. Call
Stu at (301) 229-7187 for details.
Note also the classes we offer for Information Security Training, as
listed on the left under QUICK LINKS.
|
"I thought I knew CICS security until I took this class. Gave me the
hidden knowledge that I need."
---Nina Isla,Blue Cross Blue Shield of Florida
"Stu made me feel very comfortable coming into the class. I learned a lot from the class. I'm looking forward
to going back to the office and applying what I learned." |
Table of Contents and Class Outline: HG73: How to Audit CICS I Keywords and Concepts A. Introduction B. What Is CICS and How Does It Work C. Basic CICS Concepts and How They Fit Together D. The Life of a CICS Transaction E. How Two CICS Regions Can Interconnect F. How to Find Out How CICS is Used in Your Organization G. Control Objectives H. The Audit Program II Action Plan A. Scoping, Planning, and Basic Data-Gathering B. Evaluation of CICS Security for a Single Region C. Evaluation of CICS Security Across Regions E. Wrap-up, Working Papers, Follow-up III Forms and Reference A. Basic Security Model B. Forms to Document CICS Regions C. Audit Plan D. Model Documents E. DFHSIT Operands for Security F. SYS1.VTAMLST INDEX