Instructoradmin
TypeOnsite Course
DateSep 16, 2019 - Sep 20, 2019
Time5 Days
PlaceNew York
Seat0/0
Certificate80% of quiz marks
Price$3650
Buy NowBook Now

Course Overview

The Protecting System Resources Using RACF course describes how RACF is used to define access to data sets. Details of the profiles used to provide access to general resources and UNIX resources is also explained.


Audience

Application programmers, systems programmers, database administrators, security administrators and anyone requiring knowledge about the use of the Security Server(RACF) on the z/OS platform.


Prerequisites

Know how to use TSO and ISPF and have an understanding of data sets and basic security issues.


Objectives

After completing this course, the student will be able to:

  • Describe the difference between Generic and Discrete Profiles and when they are used
  • Code the commands used to maintain Data Set Profiles.
  • Use the RACF ISPF Interface to Maintain Data Set Profiles
  • Describe the types of data set access that can be defined
  • Use the PERMIT command to define data set access lists
  • Use the RACF ISPF interface to define data set access lists
  • Maintain group profiles through the RACF ISPF Interface
  • Describe and identify RACF General Resources
  • Use the RACF General Resource Commands
  • Define access lists for RACF General Resources
  • Define and describe the use of UIDs and GIDs
  • Define and Maintain z/OS UNIX File Permissions
  • Invoke and use ISHELL to maintain z/OS UNIX file permissions

Course Content

Module 1 – Protecting Data Set Profiles Module 2 – Controlling Access to Data Sets
  • Defining Data Set Profiles
  • Data Set Profile Commands
  • Using the ISPF Interface to Maintain Data Set Profiles
  • Access Levels
  • Defining Access Lists
  • Using the ISPF Interface to Maintain Access Lists
Module 3 – Protecting and Controlling Access to General Resources Module 4 – Protecting UNIX Resources
  • General Resource Profiles
  • General Resource Profile Commands
  • Defining Access Levels
  • Protecting z/OS UNIX Resources
  • File Permissions
  • Using the ISPF UNIX Shell to Protect UNIX Resources
Module 5 – Protecting System Resources Using RACF Mastery Test

 

Leave a Reply