This course describes audit concerns that IBMยฎ Security zSecure Audit reports.
The course explains auditing your RACFยฎ database and z/OS subsystems such as CICS, IMS, and DB2. You can measure your security and z/OS system settings against the security requirements of a selected policy level. Also, you learn about an Access Monitor data set containing historic RACF access decisions statistics.
This information is used to find profiles, permissions, or connections that are unused and can be removed from the RACF database. Furthermore, you learn reviewing the general SMF and RACF audit settings. This course explains how to use and interpret predefined SMF reports, and how to create customized SMF reports.
Finally, the Library and sequential data set status and change analysis functions are explained.
Unit 1: Introduction to RACF auditing
Unit 2: Auditing user IDs and passwords
Unit 3: Auditing sensitive resources
Unit 4: Auditing subsystems
Unit 5: Auditing SMF
Unit 6: Using Access Monitor and RACF-Offline
Unit 7: Analyzing libraries and sequential data sets
After this course participants should be able to:
Before taking this course, make sure that you have the following skills:
If applicable, you can achieve these skills by attending one or more of the following courses:
COURSE CONTENT: Day 1 Course Introduction MPLS VPNs โข MPLS VPNs โข Provider-Provisioned VPNs Layer 3 VPNsย โข Layer 3 VPN Terminology โข VPN-IPv4 Address Structure โข Operational Characteristics…
COURSE CONTENT: DAY 1 Course Introduction Juniper Connected Security โข Identify the high-level security challenges in todayโs network โข Describe basic network security design โข Identify the key factors…
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System โข Introducing the BIG-IP System โข Initially Setting Up the BIG-IP System โข Archiving the BIG-IP Configuration โข Leveraging F5…