Implementing Pervasive Encryption on z-OS



Free Download Implementing Pervasive Encryption on z/OS
Published 10/2024
Created by Interskill Learning
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + subtitle | Duration: 17 Lectures ( 31m ) | Size: 607 MB


IBM Mainframes
What you’ll learn
Identify which data can be encrypted in a z/OS environment
Describe methods used to encrypt disk, tape, and coupling facility data
Explain how in-flight data is encrypted
Identify which data within your organization should be encrypted
Requirements
Successful completion of Interskill’s Cryptography course, or equivalent knowledge.
Description
This course introduces and discusses the types of z/OS data you should consider encrypting and the levels of encryption available. It begins by looking at full disk encryption, then moving to methods used for encrypting individual disk data sets. Information on encrypting other at-rest data residing on tape and the coupling facility is presented, as well as how unique data such as JES2 spool data sets, and database data can be secured. A look at in-flight data and how that is encrypted is also discussed. This course is suitable for system programmers and security specialists that need to identify how organizational data on z/OS is secured using pervasive encryption techniques. This is just one of the courses that is part of the Cryptography curriculum at Interskill Learning. The entire curriculum can be accessed at Interskill Learning’s website plus 300+ other courses related to IBM Mainframes. Interskill Learning has many other subjects related to IBM Mainframes and IBM Power System. Interskill Learning subjects for JCL, SDSF, AI, JES2, COBOL, Linux, Assembler, CICS, Db2, LinuxOne, Java, PL/1, REXX, TSO/ISPF, WebSphere, VSAM, z/VM, z/VSE, UNIX for z/OS, Zowe, z/OS Connect, Utilities, Python Parallel Sysplex, Application Performance, JES3 Plus, Quantum Computing and many more.
Who this course is for
This course is suitable for system programmers and security specialists that need to identify how organizational data on z/OS is secured using pervasive encryption techniques.
Homepage

https://www.udemy.com/course/implementing-pervasive-encryption-on-zos/

Screenshot

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me

No Password – Links are Interchangeable