This 3-day course provides an insight as to how security can be imposed onto CICS and DB2 systems and to secure these important subsystems from unauthorized access. This course will explain the threats from both outside and inside these systems. Attendees will be able to describe the various exposures and ho they can be secured. RACF will be used as the security process and its examples will be used for illustration. However, the attendees will understand what needs to be secured regardless of which security system is used.
Copyright © 2002-2019 GlobaLINK Solutions Pte Ltd | contact us