Pervasive Encryption on z/OS
- Code training ESS10G
- Duur 3 dagen
- Taal Engels
Andere trainingsmethoden
Methode
Deze training is in de volgende formats beschikbaar:
-
Klassikale training
Klassikaal leren
-
Virtueel leren
Virtueel leren
Vraag deze training aan in een andere lesvorm.
Trainingsbeschrijving
Naar bovenIn this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.
In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS filesystems.
These exercises reinforce the concepts and technologies being covered in the lectures. This course consists of several inter-dependent modules. The modules, including the lab exercises, depend on the other previous modules content.
Virtueel en Klassikaal™
Virtueel en Klassikaal™ is een eenvoudig leerconcept en biedt een flexibele oplossing voor het volgen van een klassikale training. Met Virtueel en Klassikaal™ kunt u zelf beslissen of u een klassikale training virtueel (vanuit huis of kantoor )of fysiek op locatie wilt volgen. De keuze is aan u! Cursisten die virtueel deelnemen aan de training ontvangen voor aanvang van de training alle benodigde informatie om de training te kunnen volgen.
Data
Naar bovenDoelgroep
Naar bovenThis class is intended for z/OS system programmers and security specialists in charge of designing, implementing and monitoring Pervasive Encryption on z/OS.
Trainingsdoelstellingen
Naar bovenIn this course, you will learn how to:
- Describe the components of Pervasive Encryption on z/OS
- Explain the role of encryption for data protection
- Implement hardware crypto on your z System
- Load and activate AES Master Keys
- Implement and start ICSF
- Understand the differences between secure keys clear keys and protected keys
- Describe how are key values used for encryption and decryption
- Generate, maintain and manage Keys
- Setup access to key labels
- Setup policy to supply key label (RACF SMS JCL)
- Access data in encrypted data sets
- Create encrypted data sets - Supplying key labels
- Convert existing data sets to encryption
- Verify encryption status
- Encrypt Data in Transit
- Encrypt Data at Rest
- Manage data sets, data keys, and key labels
Inhoud training
Naar bovenPlease see the course objectives
Voorkennis
Naar bovenYou should have the following prerequisites:
- General z/OS knowledge, including basic UNIX System Services skills
- Basic knowledge of RACF
- #000000
- ESS10G
- Pervasive Encryption on z/OS
- Operating Systems
- Pervasive Encryption on z/OS
- IBM