Implementing IMS Security

Learn implementation for Information Management System (IMS) using Resource Access Control Facility (RACF) as the external security manager, and the installation provided security exit routines. Apply classroom lectures with security workshop exercises in which you setup the security definitions. This course is taught in a Web conference medium with live instructor audio, and Internet Web conference materials. You have chat type Question and Answer (Q and A) ability, plus live audio. The course is taught 10:00 a.m. to 12 noon and 1:00 p.m. to 3:00 p.m. Central time for eight work days over a two week period. Since the class is taught live using Web conferencing methods, you can attend from your home or work. Class durations are approximately one-half day so you can still accommodate daily work responsibilities.

Course syllabus:

  1. Introduction to IMS Security

  2. IMS Security Facilities

  3. IMS Security Options

  4. Introduction to RACF

  5. User ID and Sign On Verification

  6. Securing the IMS Control Region

  7. IMS Transaction Security

  8. IMS Command Security

  9. Security for Time Controlled Operations

  10. IMS Resource Access Security (RAS)

  11. IMS Database Security

  12. IMS Data Set Security

  13. Common Service Layer Security

  14. Security in an IMS Database Control Environment

  15. IMS and DB2 Security