What is required of a security system?; IBM's Resource Access Control Facility (RACF); Main RACF/MVS components; How does RACF work?; RACF Profiles; RACF classes; Controlling access; RACF commands.
Planning for RACFManagement commitment; Selecting a security planning and implementation team; Responsibilities of the implementation team; Deciding what to protect; Deciding how to protect data; Establishing ownership structures; Establishing who needs access.
RACF Group StructureRACF group structure; Group types; Data set owning groups; Users owning groups; General Resource groups; Concept of group and profile ownership; Administration delegation; Benefits of RACF groups; Defining RACF groups; Group CONNECT authority; Group profile contents; Group related commands.
Defining Users to RACFInformation on users; RACF user information; DFP segment information; TSO segment information; OPERPARM segment information; NETVIEW segment information; CICS segment information; OMVS segment information; Defining a new User; Prepare to create the user profile; Create the User Profile; Give user access to any RACF-protected areas; User-related commands; User attributes; Classifying users and data; Security categories and levels; Security labels.
Defining Data Sets to RACFData set related commands; Data set protection; Discrete profiles; Generic profiles; Rules for defining data set profiles; Naming Convention; Data set profile ownership; Defining Generic Profiles; Access authority for data sets; Adding data set profiles - ADDSD; Permitting access (PERMIT command).
Defining General ResourcesGeneral Resource related commands; Class Descriptor Table (CDT); IBM-defined Resource Classes; Steps for defining General Resource profiles; Granting access to a General Resource; Global Access Table (GAT).
Maintenance & HousekeepingMaintenance and housekeeping activities; SETROPTS command options; Options for initial setup; In-storage profiles; SETROPTS REFRESH Option; Maintaining the RACF database(s); Maintenance utilities; Maintaining the Started Task Table; Data Security Monitor (DSMON).
Experience live, interactive learning from the comfort of your home or office with Bilginç IT Academy's Online Instructor-Led Understanding RACF Training in Australia. Engage directly with expert trainers in a virtual environment that mirrors the energy and schedule of a physical classroom.
Immerse yourself in our most sought-after learning style for Understanding RACF Training in Australia. Our hand-picked classroom venues in Australia offer an invaluable human touch, providing a focused and interactive environment for professional growth.
Streamline your organization's training requirements with Bilginc IT Academy’s Onsite Understanding RACF Training in Australia. Experience expert-led learning at your own business premises, tailored to your corporate goals.
Join our public courses in our Australia facilities. Private class trainings will be organized at the location of your preference, according to your schedule.
Australia’s technology scene is a powerhouse of innovation in the Southern Hemisphere, with Sydney, Melbourne, and Brisbane acting as world-class centers for fintech, cloud computing, and software development. The nation’s digital economy is supported by top-tier academic institutions like the University of New South Wales (UNSW) and the University of Melbourne, which foster a culture of research excellence in Cybersecurity and Artificial Intelligence. Australia has become a global leader in mining-tech and sustainable energy software, requiring a workforce that is proficient in the latest DevOps and Data Science frameworks. Our training solutions in Australia are designed to meet these high industry standards, offering specialized certifications that empower professionals to lead digital transformation projects across the Oceania region. We provide the technical expertise necessary to excel in a highly competitive and digitally integrated market that consistently attracts global tech investment.