Description
At Sixe Engineering we have been providing official IBM training around the world for over 12 years. Get the best training from our specialists in Europe. We have important discounts and offers for two or more students.
Course details
IBM course code: ESS10G | Category: z/OS / Security z/os |
Delivery: Online & on-site** | Course length in days: 3 |
Target audience
This class is intended for z/OS system programmers and security specialists in charge of designing, implementing and monitoring Pervasive Encryption on z/OS.
Desired Prerequisites:
General z/OS knowledge, including basic UNIX System Services skills
Basic knowledge of RACF
Curriculum relationship
o [ES66G]
Instructors
The great majority of the IBM courses we offer are taught directly by our engineers. This is the only way we can guarantee the highest quality. We complement all the training with our own materials and laboratories, based on our experience during the deployments, migrations and courses that we have carried out during all these years.
Added value
Our courses are deeply role oriented. To give an example, the needs for technology mastery are different for developer teams and for the people in charge of deploying and managing the underlying infrastructure. The level of previous experience is also important and we take it very seriously. That is why beyond (boring) commands and tasks, we focus on solving the problems that arise in the day to day of each team. Providing them with the knowledge, competencies and skills required for each project. In addition, our documentation is based on the latest version of each product.
Agenda and course syllabus
Describe the components of Pervasive Encryption on z/OS
Explain the role of encryption for data protection
2
Implement hardware crypto on your z System
Load and activate AES Master Keys
Implement and start ICSF
Understand the differences between secure keys clear keys and protected keys
Describe how are key values used for encryption and decryption
Generate, maintain and manage Keys
Setup access to key labels
Setup policy to supply key label (RACF SMS JCL)
Access data in encrypted data sets
Create encrypted data sets – Supplying key labels
Convert existing data sets to encryption
Verify encryption status
Encrypt Data in Transit
Encrypt Data at Rest
Manage data sets, data keys, and key labels
Do you need to adapt this syllabus to your needs? Are you interested in other courses? Ask us without obligation.
Locations for on-site delivery
- Austria: Vienna
- Belgium: Brussels, Ghent
- Denmark: Cophenhagen
- Estonia: Tallinn
- Finland: Helsinki
- France: Paris, Marseille, Lyon
- Germany: Berlin, Munich, Cologne, Hamburg
- Greece: Athens, Thessaloniki
- Italy: Rome
- Louxemburg: Louxembourg (city)
- Netherlands: Amsterdam
- Norway: Oslo
- Portugal: Lisbon, Braga, Porto, Coimbra
- Slovakia: Bratislava
- Slovenia: Bratislava
- Spain: Madrid, Sevilla, Valencia, Barcelona, Bilbao, Málaga
- Sweden: Stockholm
- Turkey: Ankara
- United Kingdom: London