Implementing Pervasive Encryption on z - OS

dkmdkm

U P L O A D E R
d957a0bff1088575ee57166117ec880f.jpg

Free Download Implementing Pervasive Encryption on z/OS
Published 10/2024
Created by Interskill Learning
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + subtitle | Duration: 17 Lectures ( 31m ) | Size: 607 MB

IBM Mainframes
What you'll learn
Identify which data can be encrypted in a z/OS environment
Describe methods used to encrypt disk, tape, and coupling facility data
Explain how in-flight data is encrypted
Identify which data within your organization should be encrypted
Requirements
Successful completion of Interskill's Cryptography course, or equivalent knowledge.
Description
This course introduces and discusses the types of z/OS data you should consider encrypting and the levels of encryption available. It begins by looking at full disk encryption, then moving to methods used for encrypting individual disk data sets. Information on encrypting other at-rest data residing on tape and the coupling facility is presented, as well as how unique data such as JES2 spool data sets, and database data can be secured. A look at in-flight data and how that is encrypted is also discussed. This course is suitable for system programmers and security specialists that need to identify how organizational data on z/OS is secured using pervasive encryption techniques. This is just one of the courses that is part of the Cryptography curriculum at Interskill Learning. The entire curriculum can be accessed at Interskill Learning's website plus 300+ other courses related to IBM Mainframes. Interskill Learning has many other subjects related to IBM Mainframes and IBM Power System. Interskill Learning subjects for JCL, SDSF, AI, JES2, COBOL, Linux, Assembler, CICS, Db2, LinuxOne, Java, PL/1, REXX, TSO/ISPF, WebSphere, VSAM, z/VM, z/VSE, UNIX for z/OS, Zowe, z/OS Connect, Utilities, Python Parallel Sysplex, Application Performance, JES3 Plus, Quantum Computing and many more.
Who this course is for
This course is suitable for system programmers and security specialists that need to identify how organizational data on z/OS is secured using pervasive encryption techniques.
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Screenshot







Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar

0e3d2774673e1d7fb11d62b898830a6b.jpg

Implementing Pervasive Encryption On Z/Os
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 756.03 MB | Duration: 0h 31m​

IBM Mainframes

What you'll learn

Identify which data can be encrypted in a z/OS environment

Describe methods used to encrypt disk, tape, and coupling facility data

Explain how in-flight data is encrypted

Identify which data within your organization should be encrypted

Requirements

Successful completion of Interskill's Cryptography course, or equivalent knowledge.

Description

This course introduces and discusses the types of z/OS data you should consider encrypting and the levels of encryption available. It begins by looking at full disk encryption, then moving to methods used for encrypting individual disk data sets. Information on encrypting other at-rest data residing on tape and the coupling facility is presented, as well as how unique data such as JES2 spool data sets, and database data can be secured. A look at in-flight data and how that is encrypted is also discussed. This course is suitable for system programmers and security specialists that need to identify how organizational data on z/OS is secured using pervasive encryption techniques. This is just one of the courses that is part of the Cryptography curriculum at Interskill Learning. The entire curriculum can be accessed at Interskill Learning's website plus 300+ other courses related to IBM Mainframes. Interskill Learning has many other subjects related to IBM Mainframes and IBM Power System. Interskill Learning subjects for JCL, SDSF, AI, JES2, COBOL, Linux, Assembler, CICS, Db2, LinuxOne, Java, PL/1, REXX, TSO/ISPF, WebSphere, VSAM, z/VM, z/VSE, UNIX for z/OS, Zowe, z/OS Connect, Utilities, Python Parallel Sysplex, Application Performance, JES3 Plus, Quantum Computing and many more.

Overview

Section 1: Course Introduction

Lecture 1 Course Introduction

Lecture 2 Introduction to Cryptography Curriculum

Section 2: At Rest: Disk and Dataset

Lecture 3 At Rest: Disk and Dataset

Lecture 4 At Rest: Disk and Dataset - Review

Section 3: Disk Dataset Encryption

Lecture 5 Disk Dataset Encryption

Lecture 6 Disk Dataset Encryption - Review 1

Lecture 7 Disk Dataset Encryption - Review 2

Section 4: At Rest: Tape and Coupling Facility

Lecture 8 At Rest: Tape and Coupling Facility

Lecture 9 At Rest: Tape and Coupling Facility - Review

Section 5: At Rest: Other Encryption

Lecture 10 At Rest: Other Encryption

Lecture 11 At Rest: Other Encryption - Review

Section 6: At Rest: Choosing Encryption

Lecture 12 At Rest: Choosing Encryption

Lecture 13 At Rest: Choosing Encryption - Review

Section 7: In-Flight

Lecture 14 In-Flight

Lecture 15 In-Flight - Review

Section 8: At Rest: Disk and Dataset

Lecture 16 At Rest: Disk and Dataset

Lecture 17 At Rest: Disk and Dataset - Review

Section 9: Final Review Quiz

This course is suitable for system programmers and security specialists that need to identify how organizational data on z/OS is secured using pervasive encryption techniques.

yg4JRIHw_o.jpg


FileAxa
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
DDownload
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
FileStore
TurboBit
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten