home 
 
 
 
ennl
 
Home
A propos
Services
Cours
Ressources
Contacts
MyABIS
C
Tous les coursbalkjeGénéralités » Introduction HW & SW » Soft skills » Cycles completsSystèmes d’exploitation » MVS - z/OS » UNIX - Linux - AIX » Mac OS X » iPad et iPhone iOSBases de données et middleware » Relational databases & SQL » DB2 for z/OS » DB2 for LUW » Oracle » SQL Server » MySQL & MariaDB » IMS » CICS » IBM MQ » WebSphere » Big data et analyticsDéveloppement d’applications » Méthodiques et techniques » TOGAF » PRINCE2 » Agile et Scrum » Les langages de programmation » Internet development » Object Oriented systems » Java » Development tools » SAS » XML » SOA & web servicesGestion de système » ITIL » SecuritybalkjeEn pratiqueInscriptions 
Cette page n'est pas disponible en français.
Understanding RACF

Objectives

This introduces students to the functions and facilities of the RACF product and shows them how to use RACF to protect their own programs and data. Students also learn how to interpret access violation messages so that they can communicate more efficiently with their RACF administrator.

Students learn to:

  • Understand the need for properly managed security procedures;
  • Identify those areas, in their own environment where security is required;
  • Understand the structure of RACF including: profiles, resource classes, groups, access authority, audit levels;
  • Effectively use RACF to protect their own programs and data;
  • Use the RACF auditing facilities to monitor access to their own programs and data;
  • Interpret the RACF access violation messages;
  • Understand the role of: the RACF administrator and the RACF auditor.

Main topics

  • The need for properly managed security procedures
  • Identification of those areas, in their own environment, where security is required
  • The structure of RACF including: profiles • resource classes • groups • access authority • audit levels
  • Effective use of RACF to protect their own programs and data
  • Use of the RACF auditing facilities to monitor access to their own programs and data
  • Interpretation of the RACF access violation messages
  • The role of the RACF administrator and the RACF auditor
 

Intended for

This course is recommended for anyone working in RACF.

Background

To benefit from this course, participants need: a working knowledge of TSO/ISPF and an understanding of JCL and job submission (cf. courses ISPF/PDF basics, MVS and z/OS overview and JCL).

Training method

Lecturing and exercises.

Course leader

RSM Technology.

Duration

1 day.

Schedule

Vous pouvez vous inscrire en cliquant sur une date
dateduréelang.  lieu  prix
19 May1Eweb based 570 EUR  (excl. TVA) 
16 Jun1Eweb based 570 EUR  (excl. TVA) 
14 Sep1Eweb based 570 EUR  (excl. TVA)