This course describes the security facilities available to protect IMS resources and the activities required to implement and manage them.
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Syllabus
- Identify IMS resources that must be protected
- Implement security for each resource using an appropriate security facility
- Code the security definitions in IMS and RACF to protect transactions, commands, data, dependent regions, PSBs, and terminals