Skip to main Content

Pervasive Encryption on z/OS

  • Course Code ESS10G
  • Duration 3 days

Course Delivery

Public Classroom Price

Please call

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top

In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.

In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS filesystems.

These exercises reinforce the concepts and technologies being covered in the lectures. This course consists of several inter-dependent modules. The modules, including the lab exercises, depend on the other previous modules content.

Course Schedule

Top
    • Delivery Format: Virtual Learning
    • Date: 28-30 July, 2024
    • Location: Virtual
    Please call
    • Delivery Format: Virtual Learning
    • Date: 27-29 October, 2024
    • Location: Virtual
    Please call
    • Delivery Format: Virtual Learning
    • Date: 01-03 December, 2024
    • Location: Virtual
    Please call

Target Audience

Top

This class is intended for z/OS system programmers and security specialists in charge of designing, implementing and monitoring Pervasive Encryption on z/OS.

Course Objectives

Top

In this course, you will learn how to:

  • Describe the components of Pervasive Encryption on z/OS
  • Explain the role of encryption for data protection
  • Implement hardware crypto on your z System
  • Load and activate AES Master Keys
  • Implement and start ICSF
  • Understand the differences between secure keys clear keys and protected keys
  • Describe how are key values used for encryption and decryption
  • Generate, maintain and manage Keys
  • Setup access to key labels
  • Setup policy to supply key label (RACF SMS JCL)
  • Access data in encrypted data sets
  • Create encrypted data sets - Supplying key labels
  • Convert existing data sets to encryption
  • Verify encryption status
  • Encrypt Data in Transit
  • Encrypt Data at Rest
  • Manage data sets, data keys, and key labels

Course Content

Top

Please see the course objectives

Course Prerequisites

Top

You should have the following prerequisites:

  • General z/OS knowledge, including basic UNIX System Services skills
  • Basic knowledge of RACF