CA-ACF2 Basic Administration
This course provides the student with a solid foundation of how to implement and administer the CA-ACF2 enterprise security product. The class begins with a high-level view of how all components of the IBM operating system, application software and the CA-ACF2 program interact. Students participate in workshop exercises that provide practical exercises of how to build new logonid records, establish dataset rules, define resource rules, and manage global options of the ACF2 security system. If the course is presented at the client site and access to the ACF2 system is provided by the client, the material may be presented with interactive sessions. Students will then be able to actually insert and delete records and view displays as they are discussed in class. At the end of the five days of training, the student will understand all that is required to work effectively as a security administrator in an ACF2 environment.
The course is primarily designed for those who will administer the logonids and rules of an ACF2 system. Although a good deal of information contained in this training would be helpful to those technicians who install ACF2, the course does focus on the details necessary to manage the security product once it has already been installed.
Session One: Overview of Host-Based Security Systems
Session Three: The User Identification String
Session Five: Protecting System Resources
Session Seven: System Options
Session Eight: Commands & Utilities
WORKSTATIONS ARE NEEDED FOR THIS SESSION.
LINUX UNIX z/OS ON-SITE TRAINING | IT SERVICES | CONTACT US | ISPF JCL REXX BOOKSTORE | HOME