+48 22 208 28 61    szkolenia@cts.com.pl
Menu

IBM TechU IBM Z Encryption – tu00008gwpl

Course #: tu00008gwpl

Duration: 6.4 Hours

This learning theme covers a variety of topics about encryption on IBM Z Systems. You’ll get an introduction to the encryption pyramid and guidance to consider when choosing the elements of your system to encrypt and your overall encryption strategy. You’ll go deep on IBM Z15 cryptography capabilities. From there you can dive into encryption on z/OS including cryptographic key management fundamentals and protecting your data at rest with encryption. Finally you’ll go deep on IBM Security Key Lifecycle Manager (SKLM), how it works and how to use it as well as a demo.

Upon completion of the final assessment, you’ll receive the IBM Z Encryption Badge.

Course level: Intermediate

Time to complete: 6 hours

Objectives

After completing this course, you should be able to:

  • Understand the different levels of encryption and when to choose each type
  • Understand the key encryption and cryptographic features on IBM Z15
  • Understand the fundamentals of cryptographic keys and when to use operational vs master keys
  • Understand the benefits of key encryption and key considerations on migrating to encrypted data sets.
  • Understand what IBM Security Key Lifecycle Manager is, how it works and how to use it

Objectives

After completing this course, you should be able to:

  • Understand the different levels of encryption and when to choose each type
  • Understand the key encryption and cryptographic features on IBM Z15
  • Understand the fundamentals of cryptographic keys and when to use operational vs master keys
  • Understand the benefits of key encryption and key considerations on migrating to encrypted data sets.
  • Understand what IBM Security Key Lifecycle Manager is, how it works and how to use it

Audience

IBM Z and LinuxONE clients and Business Partners looking to secure their systems. Systems Programmers, Administrators, Architects, Systems Management, Security and other IT roles.

Topics

  • The encryption pyramid - Choosing the level that works for you
  • z/OS Cryptographic Key Management Fundamentals
  • z15 Crypto Update
  • E4S: Pervasive encryption: Protect your data at rest with z/OS data set encryption
  • Protecting data-at-rest with encryption: IBM SKLM
  • Demo: SKLM for z/OS Container Extensions

Contact us regarding the training