home 
 
 
 
nlfr
 
Home
About ABIS
Services
Courses
Resources
Contact
MyABIS
All CoursesbalkjeGeneral Soft skills Introduction to HW & SW TracksOperating systems MVS - z/OS UNIX - Linux - AIX Mac OS X iPad and iPhone iOSDatabases, transaction systems and middleware DB2 for z/OS DB2 UDB for Linux, UNIX and Windows Oracle SQL Server MySQL IMS CICS WebSphere MQ WebSphere Application Server Data warehouse, business analytics and big dataApplication development Methods and techniques TOGAF PRINCE2 Agile development and Scrum Programming languages Internet development Object Oriented systems Java IBM development tools SAS XML SOA & web servicesSystems management ITIL SecuritybalkjePractical informationRegistration 
Understanding RACF

Intended for

This course is recommended for anyone working in RACF.

Background

To benefit from this course, participants need: a working knowledge of TSO/ISPF and an understanding of JCL and job submission (cf. courses ISPF/PDF basics, MVS and z/OS overview and JCL).

Training method

Lecturing and exercises.

Course leader

RSM Technology.

Duration

1 day.

Schedule

datelanguageplacepriceremarks
27/06/2014EHigh Wycombe425 GBP
Legend
  • You can enrol by clicking on the dates in the calendar.
  • N: Dutch; F: French; E: English; No code: language depends on the participants.
  • All prices are VAT excluded.
  • Countries:
    Belgium 
    Netherlands 
    Elsewhere 

Objectives

This introduces students to the functions and facilities of the RACF product and shows them how to use RACF to protect their own programs and data. Students also learn how to interpret access violation messages so that they can communicate more efficiently with their RACF administrator.

Students learn to:

  • Understand the need for properly managed security procedures;
  • Identify those areas, in their own environment where security is required;
  • Understand the structure of RACF including: profiles, resource classes, groups, access authority, audit levels;
  • Effectively use RACF to protect their own programs and data;
  • Use the RACF auditing facilities to monitor access to their own programs and data;
  • Interpret the RACF access violation messages;
  • Understand the role of: the RACF administrator and the RACF auditor.

Main topics

  • The need for properly managed security procedures
  • Identification of those areas, in their own environment, where security is required
  • The structure of RACF including: profiles • resource classes • groups • access authority • audit levels
  • Effective use of RACF to protect their own programs and data
  • Use of the RACF auditing facilities to monitor access to their own programs and data
  • Interpretation of the RACF access violation messages
  • The role of the RACF administrator and the RACF auditor