RACF Administration
Course: RACFAD01
Duration: 4 Days
Level: II
On our website at:
http://www.verhoef-training.com/courses/RACFAD01.html
Course Summary
This course introduces students to the concepts, terminology,
commands, and procedures involved in administering a RACF
secured system. All major aspects of RACF administration
are covered and these facilities will benefit the audit
process. The course can be run with either online labs
(if a suitable environment is available) or with paper
based labs (if online access is not available).
Topics Covered In This Course
What You Can Expect
- Identify the need for security in business information systems
- Understand how RACF meets business information systems security
needs
- Design a group structure to meet their installations requirements
- Describe the various ways in which RACF commands can be
issued
- Use the group related commands to administer the group structure
- Describe the effect of the various group profile related
parameters
- Use the user related commands to administer user profiles
- Use the various group authorities effectively
- Explain the management and use of the various non-RACF segments
in user profiles
- Describe the effect of the various user profiles related
parameters
- Connect users to groups and manage the assigned group authorities
- Describe the advantages and disadvantages of both discrete
and generic data set profiles
- Use the data set related commands to manage both discrete
and generic profiles
- Specify the appropriate auditing parameters for data set
profiles
- Provide users with the appropriate access to protected data
sets
- Use the general resource commands to manage general resources
- Describe how CICS transactions, load modules, secured sign-on,
and the started task table can be protected and controlled
- Describe how digital certificates, field level access checking,
and RACF variables can be protected and controlled
- Use the search command to locate specified profiles in the
database
- Use and explain the operation of the RVARY and SETROPTS
management commands
- Explain how RACF Remote Sharing operates and how it's use
can be controlled
- Identify how the operation of RACF changes when running
in a parallel sysplex
- Explain how to control RACF operation in a parallel sysplex
- Describe how to use the RACF Report Writer product to format
and print audit records
- Identify how to process RACF audit records within a DB2
database
- Use and interpret the output of the Data Security Monitor
- Use the database unload utility, cross reference utility,
remove userid utility, database verification utility, database
split/merge/extend utility, and the database block update
utility
Who Should Take This Course
This course will benefit RACF Administrators, RACF Auditors,
help desk personnel, and anyone requiring knowledge of
RACF administration principles and practices. It is of
particular benefit to those new to RACF administration
or RACF auditing.
Recommended Prerequisites
No previous RACF experience is required however delegates
should be fully familiar with the z/OS environment, and
have an understanding of TSO/E ISPF/PDF.
Training Style
Hands-on, Instructor-Led Training
Related Courses
Code |
Course Title |
Duration |
Level |
|
ZSECAD |
Effective IBM Tivoli zSecure Admin - Administration and Reporting |
2 Days |
I |
Details |
Every student attending a Verhoef Training class will receive
a certificate good for $100 toward their next public class taken
within a year.
You can also buy "Verhoef Vouchers" to get a discounted rate for a
single student in any of our public or web-based classes.
Contact your account manager or our sales office for details.