{"id":3747,"date":"2021-12-01T10:20:00","date_gmt":"2021-12-01T09:20:00","guid":{"rendered":"https:\/\/grupoloyal.net\/curso-advanced-z-os-security-crypto-network-racf-and-your-enterprise-2\/"},"modified":"2021-12-01T10:20:00","modified_gmt":"2021-12-01T09:20:00","slug":"curso-advanced-z-os-security-crypto-network-racf-and-your-enterprise-2","status":"publish","type":"post","link":"https:\/\/grupoloyal.net\/curso-advanced-z-os-security-crypto-network-racf-and-your-enterprise-2\/","title":{"rendered":"Advanced z\/OS Security: Crypto, Network, RACF, and Your Enterprise"},"content":{"rendered":"
[et_pb_section fb_built=\u00bb1″ fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][et_pb_fullwidth_image src=\u00bbhttps:\/\/grupoloyal.net\/wp-content\/uploads\/2022\/02\/curso-e1645533395126.jpg\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ min_height=\u00bb223.3px\u00bb height=\u00bb530px\u00bb][\/et_pb_fullwidth_image][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ min_height=\u00bb106px\u00bb custom_padding=\u00bb12px||0px|||\u00bb background_color=\u00bb#eaeaea\u00bb hover_enabled=\u00bb0″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column _builder_version=\u00bb4.4.0″ type=\u00bb4_4″][et_pb_text _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n
System z continues to extend the value of the mainframe by leveraging robust security solutions to help meet the needs of today’s on demand, service-oriented infrastructures. System z servers have implemented leading-edge technologies, such as high-performance cryptography, multi-level security, large-scale digital certificate authority and life cycle management, improved Secure Sockets Layer (SSL) performance, advanced Resource Access Control Facility (RACF) function, and z\/OS Intrusion Detection Services. This advanced z\/OS security course presents the evolution of the current z\/OS security architecture and explores in detail the various technologies involved in z\/OS Cryptographic Services, z\/OS Resource Access Control Facility (RACF), and z\/OS Integrated Security Services.<\/p>\n
In the hands-on exercises, you begin with your own z\/OS HTTP Server in a TCP\/IP environment. Throughout the exercises, you make changes to the configuration to implement authentication via RACF, SSL, and use of digital certificates. Use is made of facilities such as RACDCERT to manage digital certificates, PKI Services, and RACF auto registration. You will also implement different scenario to implement ssl security for a typical tcpip application, FTP: SSL, TLS, server authentication, client certificates, and AT-TLS. These exercises reinforce the concepts and technologies being covered in the lectures.
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_padding=\u00bb52px|||||\u00bb][et_pb_row column_structure=\u00bb3_5,2_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_blurb title=\u00bbObjetivos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-objetivos.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ header_font_size=\u00bb19px\u00bb]
\nDescribe the components of network security, platform security, and transaction security on z\/OS
\nDescribe how RACF supports UNIX users and groups
\nDescribe web server security flow on z\/OS
\nExplain the contents and use of a digital certificate
\nExplain the difference between asymmetric and symmetric cryptographic techniques
\nExplain SSL V3 client authentication
\nExplain the basics of WebSphere Application Server and web services security
\nUtilize the RACDCERT command
\nDiscuss the OCSF service providers
\nExplain VPN (IPSec), SSL\/TSL, and AT-TLS and the differences between them
\nDiscuss the z\/OS Communication Server policy agent, IDS, and IP filtering
\nDescribe and utilize System SSL
\nExplain how TN3270 and FTP SSL support works
\nExplain how IBM secure hardware cryptographic co-processors work
\nExplain how Kerberos authentication works
\nExplain the LDAP terms of DN, objectclass, attribute, schema, back end, and directory
\nExplain how to setup, customize, and operate z\/OS PKI Services
\n[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.4.0″][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-palabras-clave-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n
so<\/strong><\/p>\n [\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-elearning-300×194.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n Disponible en formato e-learning<\/strong><\/p>\n [\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-presencial.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n Disponible en formato presencial<\/strong><\/p>\n [\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n Disponible en formato a distancia<\/strong><\/p>\n [\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n