Broadcom - Interskill Learning Mainframe Training

[email protected]

The Online Mainframe Training Specialists
Search   Course Catalog  
Return to Catalog Home     Return to Curriculum Listing

CA-ACF2® - Protecting Data Integrity

Duration

5 hours

Overview

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

Audience

Application programmers, systems programmers, database administrators, security administrators, and other personnel requiring knowledge about the use of the CA ACF2™ Security Server (ACF2) on the z/OS platform.

Prerequisites

Completion of the "CA ACF2™ Introduction" course and knowledge of TSO, ISPF, data sets, and basic security requirements.

Objectives

    After completing this course, the student will be able to:
  • Identify how system data is protected by using data set rules
  • Define data set rules
  • Code Role Based Access Rules
  • Recognize data set rule parameters
  • Identify how data set rules are maintained by using ACF2 commands and ISPF panels

Course Content

Defining Basic Data Set Rules

Defining Data Set Names Rules
Defining Access Permissions

Control Statements and Other Parameters

Conditional Parameters
Control Statements and Parameters
Protecting Special Data Sets

Maintaining Data Set Rules Using ACF2 Commands

Compile Commands
Commands to Create, Modify, and Delete

Maintaining Data Set Rules Using ISPF Panels

Create Data Set Rules
List and Modify Data Set Rules
Delete Data Set Rules

CA-ACF2 - Protecting Data Integrity Mastery Test


Search our catalog