Broadcom - Interskill Learning Mainframe Training

[email protected]

The Online Mainframe Training Specialists
Search   Course Catalog  
Return to Catalog Home     Return to Curriculum Listing

CA-ACF2® - Introduction

Duration

4 hours

Overview

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

Audience

Application programmers, systems programmers, database administrators, security administrators, and other personnel requiring knowledge of the use of CA ACF2™ Security Server on the z/OS platform.

Prerequisites

Knowledge of TSO, ISPF, data sets, and basic security issues

Objectives

    After completing this course, the student will be able to:
  • Describe how ACF2 users, data set rules, and resources rules are used
  • Identify the interfaces that are used to access ACF2
  • Log into ACF2
  • Identify and interpret logonid records
  • Define their logonid record

Course Content

Introduction to CA-ACF2 Security

ACF2 Introduction
ACF2 Administration Roles
ACF2 Reports

User Interfaces to CA-ACF2 Security

TSO/E and ISPF Interfaces
Batch, Operator, and Programming Interfaces

System Access Using CA-ACF2 Security

The Logon Process
The Logonid Record
The LIST ACF2 Command

CA-ACF2 - Introduction Mastery Test


Search our catalog