Datatrain
Partners
Login
  Username
  Password
  Partner Login
 
Forgot Password?
Register Now!
Partners
Interskill Mainframe Training Newsletter - April ´17
Interskill Mainframe Training Newsletter - August ´16
Interskill Mainframe Training Newsletter - June ´15
Past Issues

Partners
Mainframe Links
Mainframe Facts - Did you know?



DidYouKnow


More facts...

Course Catalog » Security Curriculum » RACF Series

Protecting System Resources Using RACF

Duration
6 hours

Overview

Description

The Protecting System Resources Using RACF course describes how RACF is used to define access to data sets. Details of the profiles used to provide access to general resources and UNIX resources is also explained.

Audience

Application programmers, systems programmers, database administrators, security administrators and anyone requiring knowledge about the use of the Security Server (RACF) on the z/OS platform.

Prerequisites

Know how to use TSO and ISPF and have an understanding of data sets and basic security issues.

Objectives

After completing this course the student should be able to:

  • Describe the difference between Generic and Discrete Profiles and when they are used
  • Code the commands used to maintain Data Set Profiles.
  • Use the RACF ISPF Interface to Maintain Data Set Profiles
  • Describe the types of data set access that can be defined
  • Use the PERMIT command to define data set access lists
  • Use the RACF ISPF interface to define data set access lists
  • Maintain group profiles through the RACF ISPF Interface
  • Describe and identify RACF General Resources
  • Use the RACF General Resource Commands
  • Define access lists for RACF General Resources
  • Define and describe the use of UIDs and GIDs
  • Define and Maintain z/OS UNIX File Permissions
  • Invoke and use ISHELL to maintain z/OS UNIX file permissions

Course Content

Defining Data Set Profiles

Defining Data Set Profiles

Data Set Profile Commands

Using the ISPF Interface to Maintain Data Set Profiles

Controlling Access to Data Sets

Access Levels

Defining Access Lists

Using the ISPF Interface to Maintain Access Lists

Protecting and Controlling Access to General Resources

General Resource Profiles

General Resource Profile Commands

Defining Access Levels

Protecting UNIX Resources

Protecting z/OS UNIX Resources

File Permissions

Using the ISPF UNIX Shell to Protect UNIX Resources

Protecting System Resources Using RACF Mastery Test

Course Catalog » Security Curriculum » RACF Series
 
 
 
  © All rights reserved. Interskill Learning Pty Ltd.
website designed & developed by blueapple
  HomeAbout UsProductsDemonstrationCourse CatalogDistributorsSite Map
    AOL Logo Interskill IBM