This course describes the security facilities available to protect IMS resources and the activities required to implement and manage them.
Overview
Build a Learning Habit
Download Class Central's free printable study calendar
Download for Free
Syllabus
- Identify IMS resources that must be protected
- Implement security for each resource using an appropriate security facility
- Code the security definitions in IMS and RACF to protect transactions, commands, data, dependent regions, PSBs, and terminals