Pervasive Encryption on z/OS (ESS10G) – Perfil

Esquema Detallado del Curso

  • Describe the components of Pervasive Encryption on z/OS
  • Explain the role of encryption for data protection

2

  • Implement hardware crypto on your z System
  • Load and activate AES Master Keys
  • Implement and start ICSF
  • Understand the differences between secure keys clear keys and protected keys
  • Describe how are key values used for encryption and decryption
  • Generate, maintain and manage Keys
  • Setup access to key labels
  • Setup policy to supply key label (RACF SMS JCL)
  • Access data in encrypted data sets
  • Create encrypted data sets - Supplying key labels
  • Convert existing data sets to encryption
  • Verify encryption status
  • Encrypt Data in Transit
  • Encrypt Data at Rest
  • Manage data sets, data keys, and key labels