> Formations > IBM Basics of z/OS RACF Administration (ES19G)
Publication date : 12/10/2024
Course : IBM Basics of z/OS RACF Administration (ES19G)Official IBM course
Practical course - 5d
- 35h00 - Ref. ES9
|
![]() | Understand the basic functions and concepts of the zSeries architecture and the z/OS operating system |
![]() | Describe the dataset allocation process in the z/OS environment |
![]() | Understanding how programs access data sets |
![]() | Identify the security requirements of a z/OS system |
![]() | Use basic RACF facilities and functions |
![]() | Define new users and groups for RACF |
![]() | Use RACF to protect z/OS datasets and general resources |
![]() | Select a set of basic options to customize RACF |
![]() | Understand how RACF safety interacts with this process |
Intended audience
Anyone new to z/OS and RACF, responsible for security administration using the RACF elements of the z/OS security server.
Prerequisites
Knowledge of z/OS system functionalities.
Practical details
Teaching methods
Training in French. Official course material in digital format and in English. Good understanding of written English.
Course schedule
1 Review of z/Architecture and z/OS
- Describe z/Architecture.
- Provide an overview of z/OS and its components.
- Explain the concept of virtual storage and how it works in z/OS.
- List the different types of data sets and discuss how they are managed in z/OS.
- Name the main z/OS end-user interfaces.
2 Introduction to ISPF and ISPF/PDF
- Name and describe the components of the ISPF.
- Connect to z/OS system.
- Se déconnecter du système z/OS.
- Démarrer ISPF/PDF.
- Provide an overview of the ISPF/PDF panel structure.
- Modify ISPF/PDF parameters.
- Use ISPF/PDF to display a data set.
3 Introduction to data sets
- Describe data management concepts.
- Explain the data set allocation process.
- Describe the catalog structure.
- Explain how data sets are defined and used.
- Allocate a new data set.
- Modify a dataset using ISPF/PDF.
- Delete a data set.
- Use the list of ISPF/PDF data sets.
4 Batch processing
- Name and explain the processing phases of JES2 (Job Entry Subsystem 2) jobs.
- Describe the general layout of a job.
- List and describe the components of a JCL (Job Control Language) instruction.
- Submit batch processing to z/OS.
- Utiliser ISPF 3.8 et SDSF pour gérer la sortie de la tâche.
5 Safety and RACF presentation
- Explain the role of RACF in data security.
- List the four main functions of the RACF.
- Explain how RACF authorizes or denies a user access to a resource.
- Define the terms Universal Access Authority (UACC), access list, user profile and resource profile.
- Describe the role of the security administrator and auditor.
- Explain the characteristics of the RRSF.
6 Group and user administration
- Describe the group structure in RACF.
- Create a group structure by defining appropriate RACF group profiles.
- Define new users for RACF.
- Set up a centralized or decentralized administrative structure.
7 Protection of z/OS data sets
- State the differences between generic and discrete data set profiles.
- Explain the process used by RACF to grant or deny user access to a data set.
- Use RACF controls or panels to define dataset profiles.
8 Introduction to general resources
- Add a UNIX system service user to RACF.
- Configure a user assistance function.
9 RACF options
- Understand the impact of RACF options on an installation.
- Identify options that require special planning before activation.
- Identify a set of basic options suitable for an installation.
10 Other facilities and administrative features
- Describe the use of the global access table.
- Describe the purpose of the table procedure.
- Define a protected user.
- Explain the use of the Restricted User attribute.
- Use the RACF database download utility to document the RACF system.
- Describe how to map a digital certificate to an RACF user ID.
PARTICIPANTS
Anyone new to z/OS and RACF, responsible for security administration using the RACF elements of the z/OS security server.
PREREQUISITES
Knowledge of z/OS system functionalities.
TRAINER QUALIFICATIONS
The experts who lead the training courses are specialists in the subjects covered. They are approved by the publisher and certified for the course. They have also been validated by our teaching teams in terms of both professional knowledge and teaching skills for each course they teach. They have at least three to ten years of experience in their field and hold or have held positions of responsibility in companies.
TERMS AND DEADLINES
Registration must be completed 24 hours before the start of the training course.
ACCESSIBILITY FOR PEOPLE WITH DISABILITIES
Do you have specific accessibility requirements? Contact Ms FOSSE, disability advisor, at the following address: psh-accueil@orsys.fr so that we can assess your request and its feasibility.
Anyone new to z/OS and RACF, responsible for security administration using the RACF elements of the z/OS security server.
PREREQUISITES
Knowledge of z/OS system functionalities.
TRAINER QUALIFICATIONS
The experts who lead the training courses are specialists in the subjects covered. They are approved by the publisher and certified for the course. They have also been validated by our teaching teams in terms of both professional knowledge and teaching skills for each course they teach. They have at least three to ten years of experience in their field and hold or have held positions of responsibility in companies.
ASSESSMENT TERMS
Assessment of targeted skills prior to training.
Assessment by the participant, at the end of the training course, of the skills acquired during the training course.
Validation by the trainer of the participant's learning outcomes, specifying the tools used: multiple-choice questions, role-playing exercises, etc.
At the end of each training course, ITTCERT provides participants with a course evaluation questionnaire, which is then analysed by our teaching teams. Participants also complete an official evaluation of the publisher.
An attendance sheet for each half-day of attendance is provided at the end of the training course, along with a certificate of completion if the participant has attended the entire session.
Assessment of targeted skills prior to training.
Assessment by the participant, at the end of the training course, of the skills acquired during the training course.
Validation by the trainer of the participant's learning outcomes, specifying the tools used: multiple-choice questions, role-playing exercises, etc.
At the end of each training course, ITTCERT provides participants with a course evaluation questionnaire, which is then analysed by our teaching teams. Participants also complete an official evaluation of the publisher.
An attendance sheet for each half-day of attendance is provided at the end of the training course, along with a certificate of completion if the participant has attended the entire session.
TEACHING AIDS AND TECHNICAL RESOURCES
The teaching resources used are the publisher's official materials and practical exercises.
The teaching resources used are the publisher's official materials and practical exercises.
TERMS AND DEADLINES
Registration must be completed 24 hours before the start of the training course.
ACCESSIBILITY FOR PEOPLE WITH DISABILITIES
Do you have specific accessibility requirements? Contact Ms FOSSE, disability advisor, at the following address: psh-accueil@orsys.fr so that we can assess your request and its feasibility.
Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class
Dernières places
Date garantie en présentiel ou à distance
Session garantie
Download in PDF format
Share this course by email
