Order your ZCubed Technologies CICS WallChart Today

973.299.9669

  • Home
  • Education
    • CICS
    • MQSeries
    • z/OS
    • DB2
    • Application Development
    • IMS
    • Network
    • Security
    • Education Documents
    • Inquire about a class
  • Schedule
  • Training/Program Paths
  • Services
  • C\TREK™
    • What Is C\TREK™?
    • C\TREK™ Beta Program
    • C\TREK™ Screens & Videos
  • Company
    • About Us
    • Contact Us
    • Join Mailing /Career
  • More
    • Home
    • Education
      • CICS
      • MQSeries
      • z/OS
      • DB2
      • Application Development
      • IMS
      • Network
      • Security
      • Education Documents
      • Inquire about a class
    • Schedule
    • Training/Program Paths
    • Services
    • C\TREK™
      • What Is C\TREK™?
      • C\TREK™ Beta Program
      • C\TREK™ Screens & Videos
    • Company
      • About Us
      • Contact Us
      • Join Mailing /Career

973.299.9669

  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Education
    • CICS
    • MQSeries
    • z/OS
    • DB2
    • Application Development
    • IMS
    • Network
    • Security
    • Education Documents
    • Inquire about a class
  • Schedule
  • Training/Program Paths
  • Services
  • C\TREK™
    • What Is C\TREK™?
    • C\TREK™ Beta Program
    • C\TREK™ Screens & Videos
  • Company
    • About Us
    • Contact Us
    • Join Mailing /Career

Account


  • My Account
  • Sign out


  • Sign In
  • My Account
ZCubed Technologies

DB2 for z/os: Using RACF [DSR]

OVERVIEW

Today more and more organizations are using RACF to control all aspects of Db2 security, not just the system as in the past. Now all internal security needs at both the system and data levels, such as access to Db2 for z/OS objects and data, are managed via RACF.

COURSE DURATION & PRICE

1 Day

Hands-On

$855

Email at Info@zcubedtech.com to find out more

Dates & Enrollments

COURSE SYNOPSIS

  • Introduction to Db2 Security
  • Internal Db2 Security
  • Data Control Language & Privileges
  • Db2 Security Reporting and Auditing
  • RACF Security Overview
  • Defining the Db2 Subsystem to RACF
  • Defining Db2 Objects to RACF
  • Row & Column Level Access Control
  • Distributed Data Considerations 

COURSE OBJECTIVES

On completing this course, attendees will be able to:

  • Describe Db2 security
  • Understand terminology used with Db2 security
  • Use and structure Db2 security tables
  • Use primary, secondary, and CURRENT SQLID authorization ids used by Db2
  • Use SQL to control security using the GRANT and REVOKE statements
  • Describe the meaning of explicit, implicit and system privileges and administrative authorities
  • Explain ownership considerations with regard to Db2 objects
  • Control Db2 address space and data set authorization using RACF
  • Use RACF to control access to Db2 objects
  • Describe the RACF classes for Db2 objects
  • Create RACF profiles for Db2 objects
  • Understand the additional considerations when using Db2 in a distributed environment 

PREREQUISITES

A working knowledge of RACF and an understanding of Db2 for z/OS at a conceptual & terminological level.

Email at Info@zcubedtech.com to find out more

Dates & Enrollments

Boot Camp: RACF Security [RABC]

OVERVIEW

This comprehensive ten-day 'Boot Camp' course provides an accelerated learning approach to the mainframe RACF security environment. The course is ideal for both systems programmers & security Administrators. RACF is covered in great detail, along with its use with z/OS, DB2 and UNIX System Services. On successfully completing this boot camp, attendees will have reached the skill level needed to enable them to efficiently and effectively carry out the tasks required of a systems programmer or security administrator in a z/OS environment 

COURSE DURATION & PRICE

10 Days

Hands-On

Private-Only

Email at Info@zcubedtech.com to find out more

Private-Only Inquire

COURSE SYNOPSIS

  • Introduction to RACF
  • z/OS Technical Overview
  • The RACF Database
  • SETROPTS and RVARY
  • RACF in a Sysplex
  • The RACF Manuals
  • Planning for Security
  • The RACF Commands
  • RACF Modules
  • Group Structure
  • Defining RACF Groups
  • Defining Users
  • Connecting Users to Groups
  • Defining TSO Users
  • Data Set Profiles
  • General Resource Profiles
  • Introduction to UNIX System Services 
  • Users & Groups
  • Superusers & UID/GID Management 
  • Application Identity Mapping
  • z/OS UNIX File Security
  • Access Control Lists (ACLs)
  • Security for Daemons & Servers
  • Interpreting Messages
  • RACF & Digital Certificates
  • Advanced General Resources 
  • RACF & JES2/SDSF
  • RACF Remote Sharing Facility
  • Introduction to Db2 Security
  • Defining the Db2 Subsystem to RACF
  • Defining Db2 Objects to RACF 
  • CICS Overview
  • Setting up CICS RACF Security 
  • IBM MQ Security Overview 
  • MQ Access Control and RACF  
  • Overview of WebSphere for z/OS
  • WebSphere & J2EE Security Overview 
  • Understanding the RACF Jobs  
  • RACF Utilities  
  • Auditing RACF 
  • Auditing UNIX System Services Security Events 
  • RACF Control Blocks
  • RACF Macros
  • RACF Exits

COURSE OBJECTIVES

  • Explain the need for security in business information systems
  • Describe how RACF meets business information systems security needs
  • Design a group structure to meet their installation's requirements
  • Explain & use RACF commands
  • Describe the effect of the various group profile related parameters
  • Explain the management and use of the various non-RACF segments in user profiles
  • Connect users to groups and manage the assigned group authorities
  • Use the data set related commands to manage both discrete and generic profiles
  • Manage general resources
  • Use and explain the operation of the basic setropts management commands
  • Use and interpret the output of the Data Security Monitor
  • Use the database unload utility, cross reference utility, remove id utility, database verification utility, database split/merge/extend utility, and the database block update utility
  • Run and interpret auditing reports
  • Describe and explain in detail the RACF architecture, its components and facilities
  • Understand and use the SETROPTS and RVARY command to manipulate the RACF options and database
  • Use Advanced General Resources classes
  • Define users to use TSO and SDSF
  • Define the parameters needed to set up security for JES2
  • Describe the facilities provided by RRSF
  • Describe the B1 Security parameters including Security labels, levels and categories
  • List what facilities RACF provides for Digital Certificates
  • Customize RACF to meet the requirements of their organization and its environment
  • Describe how RACF interacts with USS, Db2 for z/OS and CICS
  • Describe and use all of the RACF Utilities
  • Identify how the operation of RACF changes when running in a parallel sysplex
  • Describe and explain the IPL process and the security issues associated with facilities such as APF, PPT, System Exits and Linklist
  • Describe the components of the RACF database
  • Describe the necessary requirements to implement a secure UNIX System Services environment
  • Administer file access
  • List the RACF UNIX System Services General Resource Classes
  • Move around the UNIX System Services environment and describe the use of shell
  • Implement UNIX System Services commands
  • Use file systems and ACLs
  • Mount and un-mount HFS files
  • Understand the use of superuser and UID(0)
  • Describe Db2 security
  • Understand terminology used with Db2 security
  • Describe the necessary requirements to implement a secure RACF CICS environment
  • Describe how CICS and Db2 security work together
  • Describe the necessary requirements to implement a secure RACF WebSphere environment
  • Describe the necessary requirements to implement a RACF MQ application

PREREQUISITES

A firm grounding in the mainframe computing environment, including skills in TSO and JCL

Email at Info@zcubedtech.com to find out more

Private-Only Inquire

Copyright © 2025 ZCubed Technologies - All Rights Reserved.

  • Education Documents
  • Inquire about a class
  • Schedule
  • CICS WallChart
  • About Us
  • Join Mailing /Career
  • Student Portal

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept