Implementing Pervasive Encryption On Z/Os - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Implementing Pervasive Encryption On Z/Os (/Thread-Implementing-Pervasive-Encryption-On-Z-Os--669637) |
Implementing Pervasive Encryption On Z/Os - AD-TEAM - 11-15-2024 Implementing Pervasive Encryption On Z/Os Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 756.03 MB | Duration: 0h 31m IBM Mainframes [b]What you'll learn[/b] Identify which data can be encrypted in a z/OS environment Describe methods used to encrypt disk, tape, and coupling facility data Explain how in-flight data is encrypted Identify which data within your organization should be encrypted [b]Requirements[/b] Successful completion of Interskill's Cryptography course, or equivalent knowledge. [b]Description[/b] This course introduces and discusses the types of z/OS data you should consider encrypting and the levels of encryption available. It begins by looking at full disk encryption, then moving to methods used for encrypting individual disk data sets. Information on encrypting other at-rest data residing on tape and the coupling facility is presented, as well as how unique data such as JES2 spool data sets, and database data can be secured. A look at in-flight data and how that is encrypted is also discussed. This course is suitable for system programmers and security specialists that need to identify how organizational data on z/OS is secured using pervasive encryption techniques. This is just one of the courses that is part of the Cryptography curriculum at Interskill Learning. The entire curriculum can be accessed at Interskill Learning's website plus 300+ other courses related to IBM Mainframes. Interskill Learning has many other subjects related to IBM Mainframes and IBM Power System. Interskill Learning subjects for JCL, SDSF, AI, JES2, COBOL, Linux, Assembler, CICS, Db2, LinuxOne, Java, PL/1, REXX, TSO/ISPF, WebSphere, VSAM, z/VM, z/VSE, UNIX for z/OS, Zowe, z/OS Connect, Utilities, Python Parallel Sysplex, Application Performance, JES3 Plus, Quantum Computing and many more. Overview Section 1: Course Introduction Lecture 1 Course Introduction Lecture 2 Introduction to Cryptography Curriculum Section 2: At Rest: Disk and Dataset Lecture 3 At Rest: Disk and Dataset Lecture 4 At Rest: Disk and Dataset - Review Section 3: Disk Dataset Encryption Lecture 5 Disk Dataset Encryption Lecture 6 Disk Dataset Encryption - Review 1 Lecture 7 Disk Dataset Encryption - Review 2 Section 4: At Rest: Tape and Coupling Facility Lecture 8 At Rest: Tape and Coupling Facility Lecture 9 At Rest: Tape and Coupling Facility - Review Section 5: At Rest: Other Encryption Lecture 10 At Rest: Other Encryption Lecture 11 At Rest: Other Encryption - Review Section 6: At Rest: Choosing Encryption Lecture 12 At Rest: Choosing Encryption Lecture 13 At Rest: Choosing Encryption - Review Section 7: In-Flight Lecture 14 In-Flight Lecture 15 In-Flight - Review Section 8: At Rest: Disk and Dataset Lecture 16 At Rest: Disk and Dataset Lecture 17 At Rest: Disk and Dataset - Review Section 9: Final Review Quiz This course is suitable for system programmers and security specialists that need to identify how organizational data on z/OS is secured using pervasive encryption techniques.
FileAxa
DDownload RapidGator FileStore TurboBit |