Detaillierter Kursinhalt
- Describe the components of Pervasive Encryption on z/OS
 - Explain the role of encryption for data protection
 
2
- Implement hardware crypto on your z System
 - Load and activate AES Master Keys
 - Implement and start ICSF
 - Understand the differences between secure keys clear keys and protected keys
 - Describe how are key values used for encryption and decryption
 - Generate, maintain and manage Keys
 - Setup access to key labels
 - Setup policy to supply key label (RACF SMS JCL)
 - Access data in encrypted data sets
 - Create encrypted data sets - Supplying key labels
 - Convert existing data sets to encryption
 - Verify encryption status
 - Encrypt Data in Transit
 - Encrypt Data at Rest
 - Manage data sets, data keys, and key labels