Home | About Us | Courses | Schedules | Our Clients | News and Events | Contact Us | Careers  
Verhoef  Training

z/OS :: RACF Administration

"Going the extra mile with ICT"

PO Box 2466, Cape Town 8000, South Africa
tel: 0861-102017 • fax: +27 21 856-0042 • e-mail: training@verhoef.co.za


Related Courses
» z/OS Fundamentals
» MVS Adv. JCL Workshop
» z/OS Architecture

Curricula Info
» MVS - z/OS - z/VM
» DB2 - SQL
» Programming
» UNIX - Linux
» Networking
» Web Technologies
» Business Skills

» IBM Support
» IBM Redbooks
» Mainframe Month
» Mainframes.com
» z/Journal
» CIO Magazine
» Search390.com
» Linux Links
» XML Writer

» CICS Central
» Programmer's Heaven
» Develoment Guru
» COBOL Centre
» COBOL User Groups
» XML.com

Verhoef Sites:
» Verhoef USA
» Verhoef UK


Curriculum Description | Curriculum Roadmap | Curriculum Schedule | Course Enrolment
4 days   *   Intermediate   *   Lecture and Labs

Course Summary:
This course introduces students to the concepts, terminology, commands, and procedures involved in administering a RACF secured system. All major aspects of RACF administration are covered and these facilities will benefit the audit process.

Target Audience:
This course will benefit RACF Administrators, RACF Auditors, help desk personnel, and anyone requiring a knowledge of RACF administration principles and practices. It is of particular benefit to those new to RACF administration or RACF auditing.

Recommended Prerequisites:
No previous RACF experience is required, however delegates should be fully familiar with the z/OS environment and have an understanding of TSO/E ISPF/PDF.

Course Objectives:
After completing this course, the student should be able to:

  • Identify the need for security in business information systems
  • Understand how RACF meets business information systems security needs
  • Design a group structure to meet their installations requirements
  • Describe the various ways in which RACF commands can be issued
  • Use the group related commands to administer the group structure
  • Describe the effect of the various group profile related parameters
  • Use the user related commands to administer user profiles
  • Explain the management and use of the various non-RACF segments in user profiles
  • Describe the effect of the various user profiles related parameters
  • Connect users to groups and manage the assigned group authorities
  • Describe the advantages and disadvantages of both discrete and generic data set profiles
  • Use the data set related commands to manage both discrete and generic profiles
  • Specify the appropriate auditing parameters for data set profiles
  • Provide users with the appropriate access to protected data sets
  • Use the general resource commands to manage general resources
  • Describe how CICS transactions, load modules, secured sign-on, and the started task table can be protected and controlled
  • Describe how digital certificates, field level access checking, and RACF variables can be protected and controlled
  • Use the search command to locate specified profiles in the database
  • Explain how RACF Remote Sharing operates and how it's use can be controlled
  • Identify how the operation of RACF changes when running in a parallel sysplex
  • Explain how to control RACF operation in a parallel sysplex
  • Describe how to use the RACF Report Writer product to format and print audit records
  • Identify how to process RACF audit records within a DB2 database
  • Use and interpret the output of the Data Security Monitor

    Key Topics:

  • Positioning RACF with SAF and Operating System
  • Where to start with Security
  • Identifying Business Groups
  • The RACF Commands
  • Defining/Deleting RACF Groups
  • Defining Users
  • User Profile Commands
  • Connecting Users to Groups
  • Data set Profiles
  • General Resource Profiles
  • Special RACF Features
  • RACF Remote Sharing Facility
  • RACF and Sysplex
  • Auditing RACF
  • RACF Utility Programs

    Last modified: 05-Jan-2016

  • Site Map

      •-- About Us
      |----Our Mission
      |----BEE Strategy
      |----PAIA manual
      •-- Courses
      •-- Schedules
      •-- Our Clients
      •-- News and Events
      •-- Contact Us
      •-- Your Privacy
      •-- MVS - z/OS - z/VM
      •-- DB2 - SQL
      •-- CICS TS
      •-- IBM MQ
      •-- Programming
      •-- UNIX - Linux
      •-- Networking
      •-- Web Technologies
      •-- Business Skills

    Home | About Us | Courses | Schedules | Our Clients | News and Events | Contact Us
    to top
    © 2004-2019 Verhoef Training. All Rights Reserved.

    This Site Tracked by OneStat.com