Pervasive Encryption on z/OS
- Course Code ESS10G
- Duration 3 days
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopIn this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.
In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS filesystems.
These exercises reinforce the concepts and technologies being covered in the lectures. This course consists of several inter-dependent modules. The modules, including the lab exercises, depend on the other previous modules content.
Course Schedule
Top-
- Delivery Format: Virtual Learning
- Date: 28-30 July, 2024
- Location: Virtual
-
- Delivery Format: Virtual Learning
- Date: 27-29 October, 2024
- Location: Virtual
-
- Delivery Format: Virtual Learning
- Date: 01-03 December, 2024
- Location: Virtual
Target Audience
TopThis class is intended for z/OS system programmers and security specialists in charge of designing, implementing and monitoring Pervasive Encryption on z/OS.
Course Objectives
TopIn this course, you will learn how to:
- Describe the components of Pervasive Encryption on z/OS
- Explain the role of encryption for data protection
- Implement hardware crypto on your z System
- Load and activate AES Master Keys
- Implement and start ICSF
- Understand the differences between secure keys clear keys and protected keys
- Describe how are key values used for encryption and decryption
- Generate, maintain and manage Keys
- Setup access to key labels
- Setup policy to supply key label (RACF SMS JCL)
- Access data in encrypted data sets
- Create encrypted data sets - Supplying key labels
- Convert existing data sets to encryption
- Verify encryption status
- Encrypt Data in Transit
- Encrypt Data at Rest
- Manage data sets, data keys, and key labels
Course Content
TopPlease see the course objectives
Course Prerequisites
TopYou should have the following prerequisites:
- General z/OS knowledge, including basic UNIX System Services skills
- Basic knowledge of RACF
- ESS10G
- Pervasive Encryption on z/OS
- Operating Systems
- Pervasive Encryption on z/OS
- IBM